Play ransomware continues to be a formidable cybersecurity threat, with over 300 successful attacks reported globally since its first detection in 2022. Named for the “.PLAY” extension it appends to encrypted files, this ransomware has been linked to Andariel,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Malicious GitHub PoC Exploit Spreads Infostealer Malware
A malicious GitHub repository disguises a proof-of-concept (PoC) exploit for CVE-2024-49113, also known as “LDAPNightmare,” delivering infostealer malware that sends sensitive data to an external FTP server. Disguised as a legitimate PoC, the exploit tricks users into executing malware.…
Meta’s AI Bots on WhatsApp Spark Privacy and Usability Concerns
WhatsApp, the world’s most widely used messaging app, is celebrated for its simplicity, privacy, and user-friendly design. However, upcoming changes could drastically reshape the app. Meta, WhatsApp’s parent company, is testing a new feature: AI bots. While some view this…
HexaLocker V2: A More Sophisticated Threat in the Ransomware Landscape
On August 9th, the HexaLocker ransomware group announced the release of HexaLocker V2, a significantly advanced version of its Windows-based ransomware. Developed using the Go programming language, this new version is reportedly supported by contributors from notorious hacking…
Rajasthan Police Arrest 30 in ₹30 Crore Cyber Fraud Under ‘Operation Cyber Shield’
In a significant crackdown on cybercrime, Rajasthan Police arrested 30 individuals involved in cyber fraud on Saturday, January 11, 2025. The arrests were the result of coordinated raids conducted across 40 locations in five police station areas in Jaipur.…
Researchers Hijack Hacker Backdoors Through Abandoned Infrastructure
Shadow IT has long been a pressing concern for Chief Information Security Officers (CISOs). Forgotten systems, infrastructure, or hardware connected to enterprise networks often resurface as entry points for data breaches or compromises years later. However, new findings from…
New Crypto Threat: Transaction Simulation Spoofing Leads to $460,000 Ethereum Theft
Cybercriminals are employing a sophisticated technique called “transaction simulation spoofing” to steal cryptocurrency, with a recent attack resulting in the theft of 143.45 Ethereum (ETH), valued at nearly $460,000. This exploit, identified by blockchain security platform ScamSniffer, targets vulnerabilities…
New Version of Banshee Malware Targets macOS Users
According to the latest study published this week, a new variant of the info-stealing malware known as “Banshee” has been targeting macOS users’ passwords, cryptocurrency wallets, browser credentials, and other data for at least the past four months. Check…
U.S. soldier linked to BSNL data breach: Arrest reveals cybercrime
The arrest of Cameron John Wagenius, a U.S. Army communications specialist, has unveiled potential connections to a significant data breach targeting India’s state-owned telecom provider, BSNL. The breach highlights the global reach of cybercrime networks and raises concerns about…
Ensuring Governance and Control Over Shadow AI
AI has become almost ubiquitous in software development, as a GitHub survey shows, 92 per cent of developers in the United States use artificial intelligence as part of their everyday coding. This has led many individuals to participate in…
Navigating 2025: Emerging Security Trends and AI Challenges for CISOs
Security teams have always needed to adapt to change, but 2025 is poised to bring unique challenges, driven by advancements in artificial intelligence (AI), sophisticated cyber threats, and evolving regulatory mandates. Chief Information Security Officers (CISOs) face a rapidly…
How Hackers Sell Access to Corporate Systems Using Stolen Credentials
In the cybercrime world, Initial Access Brokers (IABs) are essential for facilitating attacks. These specific hackers break into company systems, steal login credentials, and then sell access to other criminals who use it to launch their own attacks. They…
Millions of People’s ‘Intimate’ Location Data Compromised in Apparent Hack
Major apps worldwide are potentially being exploited by rogue members within the advertising sector to collect sensitive location data extensively, which subsequently is transferred to a location data firm whose subsidiary has previously sold global location data to US…
GDPR Violation by EU: A Case of Self-Accountability
There was a groundbreaking decision by the European Union General Court on Wednesday that the EU Commission will be held liable for damages incurred by a German citizen for not adhering to its own data protection legislation. As a…
Medusind Data Breach Exposes Health and Personal Information of 360,000+ Individuals
Medusind, a major provider of billing and revenue management services for healthcare organizations, recently disclosed a data breach that compromised sensitive information of over 360,000 individuals. The breach, which occurred in December 2023, was detected more than a year…
This Phishing Trend is Exploiting YouTube URLs Through O365 Expiry Themes
A recent surge in phishing campaigns has revealed attackers leveraging cleverly obfuscated URLs and Microsoft 365 password expiry warnings to trick users into surrendering their credentials. Here’s a breakdown of the latest findings: The phishing emails consistently use subject…
How Trust Can Drive Web3 Adoption and Growth
Web3 technology promises to transform the internet, making it decentralized, secure, and transparent. However, many people hesitate to adopt it due to a lack of trust in the technology. Building this trust requires clear explanations, user-friendly experiences, and a…
PowerSchool Breach Compromises Student and Teacher Data From K–12 Districts
PowerSchool, a widely used software serving thousands of K–12 schools in the United States, has suffered a major cybersecurity breach. The Breach has left several schools worried about the potential exposure of critical student and faculty data. With over…
ICAO Investigates Potential Data Breach Amid Cybersecurity Concerns
The International Civil Aviation Organization (ICAO), a United Nations agency tasked with creating global aviation standards, has disclosed an investigation into a potential cybersecurity incident. Established in 1944, ICAO works with 193 member states to develop and implement aviation-related…
$494 Million Stolen in Cryptocurrency Wallet Breaches This Year
As a result of the churning threat landscape, new threats are always emerging while others disappear or fade into irrelevance. Wallet drainers trick their victims into signing malicious transactions in order to steal their assets. As the name implies,…