Digital warfare targeting the GPS location After the U.S and Israel’s “pre-emptive” strikes against Iran last month, research firm Kpler found vessels in the Persian Gulf going off course. The location data from ships in the Gulf showed vessels maneuvering…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Quantum Computing: The Silent Killer of Digital Encryption
Quantum computing poses a greater long-term threat to digital security than AI, as it could shatter the encryption underpinning modern systems. While AI grabs headlines for ethical and societal risks, quantum advances quietly erode the foundations of data protection,…
Anthropic Claude Code Leak Sparks Frenzy Among Chinese Developers
A fresh wave of interest emerged worldwide after Anthropic’s code surfaced online, drawing sharp focus from tech builders across China. This exposure came through a misstep – shipping a tool meant for coding tasks with hidden layers exposed, revealing…
UNC1069 Uses Social Engineering to Hijack Axios npm Package via Maintainer
A sophisticated social engineering operation by UNC1069 has led to the compromise of the widely used Axios npm package, raising serious concerns across the JavaScript ecosystem. The attack targeted a member of the Axios project’s maintainer team by masquerading…
Dutch Court Issues Order Against X and Grok Over Sexual Abuse Content
A court in the Netherlands has taken strict action against the platform X and its artificial intelligence system Grok, directing both to stop enabling the creation of sexually explicit images generated without consent, as well as any material involving…
Port of Vigo Operations Interrupted by Significant Cyberattack
Upon finding its digital backbone compromised by a calculated act of cyber extortion, the Port of Vigo found itself in the midst of the morning rhythms of one of Spain’s most strategically located maritime gateways. Early in the morning…
US Lawmakers Question VPN Surveillance, Seek Transparency on Privacy Risks
Now under scrutiny: demands from American legislators for clearer rules on state tracking of online tools like virtual private networks. Backed by six congressional Democrats – including Ron Wyden – a letter reaches out to intelligence chief Tulsi Gabbard,…
Why Single-Signal Fraud Detection Fails Against Modern Multi-Stage Cyber Attacks
A Modern fraud operations resemble a coordinated relay, where multiple tools and actors manage different stages—from account creation to final cash-out. Focusing on just one indicator, such as IP address or email, leaves gaps that attackers can easily exploit…
China-based TA416 Targets European Businesses via Phishing Campaigns
Chinese state-sponsored attacks A China-based hacker is targeting European government and diplomatic entities; the attack started in mid-2025, after a two-year period of no targeting in the region. The campaign has been linked to TA416; the activities coincide with DarkPeony,…
Microsoft Identifies Cookie Driven PHP Web Shells Maintaining Access on Linux Servers
Server-side intrusions are experiencing a subtle but consequential shift in their anatomy, where visibility is no longer obscured by complexity, but rather clearly visible. Based on recent findings from Microsoft Defender’s Security Research Team, there is evidence of a…
NoVoice Android Malware Infects 2.3 Million Devices on Google Play
Cybersecurity firm McAfee has uncovered a dangerous new threat called NoVoice, a sophisticated Android malware campaign that infiltrated the Google Play Store and infected over 2.3 million devices. Disguised within more than 50 seemingly legitimate apps—ranging from system cleaners…
Netherlands Ministry of Finance Cyberattack Exposes Gaps in Government Security Defenses
A fresh wave of worry now surrounds how well government digital safeguards really hold up, after hackers struck the Dutch Ministry of Finance. Fast response by authorities limited immediate damage – yet the event peeled back layers on long-standing…
Attackers Exploit Critical Flaw to Breach 766 Next.js Hosts and Steal Data
Credential-stealing operation A massive credential-harvesting campaign was found abusing the React2Shell flaw as an initial infection vector to steal database credentials, shell command history, Amazon Web Services (AWS) secrets, GitHub, Stripe API keys. Cisco Talos has linked the campaign to…
Hackers Use Fake Legal Emails to Spread Casbaneiro Malware
A coordinated phishing operation is targeting Spanish-speaking users in both Latin America and Europe, using layered infection methods to deploy banking malware on Windows systems. The campaign delivers the Casbaneiro trojan, also referred to as Metamorfo, and relies on…
The Middle East Conflict Is Redefining Global Cybersecurity Priorities
It has gradually permeated a far more diffuse and consequential arena, the global digital ecosystem, which is now at the forefront of the conflict unfolding across the Middle East. During this phase of confrontation, conventional force is not merely…
Cybercriminals Exploit Telnyx Package in Latest Supply Chain Attack
A cybercriminal group previously associated with a supply chain compromise involving the Trivy vulnerability scanner has launched another attack, this time targeting developers through manipulated Telnyx packages on the Python Package Index (PyPI). According to findings from Ox Security,…
Why Email Aliases Are Important for Every User
Email spam was once annoying in the digital world. Recently, email providers have improved overflowing inboxes, which were sometimes confused with distractions and unwanted mail, such as hyperbolic promotions and efforts to steal user data. But the problem has not…
AI Coding Assistants Expose New Cyber Risks, Undermining Endpoint Security Defenses
Not everyone realizes how much artificial intelligence shapes online safety today – yet studies now indicate it might be eroding essential protection layers. At the RSAC 2026 gathering in San Francisco, insights came sharply into focus when Oded Vanunu…
Yanluowang Access Broker Gets 81 Months in Prison
A Russian national has been sentenced to 81 months in prison for acting as an initial access broker for Yanluowang ransomware attacks, in a case that highlights how criminal access markets fuel major extortion campaigns . Prosecutors said the…
Security Flaw in Popular Python Library Threatens User Machines
The software ecosystem experienced a brief but significant breach on March 24, 2026 that went almost unnoticed, underscoring how fragile even well-established development pipelines have become. As a result of a threat actor operating under the name TeamPCP successfully…