In the past, automotive sophistication was measured in mechanical terms. Conversations centered around engine calibration, refinement of drivetrains, suspension geometry, and steering feedback were centered around engine calibration. The shorthand used to describe innovation was horsepower output, torque delivery,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
UK Construction Company’s Windows Server Infiltrated by Prometei Botnet
In January 2026, a construction company in the United Kingdom found an unwelcome presence inside one of its Windows servers. Cybersecurity analysts from eSentire’s Threat Response Unit (TRU) determined that the intruder was a long-running malware network known as…
Urgent Alert for Irish Homes as Massive Cyberattacks Exploit Smart TVs and IoT Devices
An urgent cybersecurity alert has been issued to households across Ireland amid warnings of “large scale” cyberattacks that could compromise everyday home devices. Grant Thornton Ireland has cautioned that devices such as Android TV boxes and TV streaming hardware…
SolarWinds Web Help Desk Compromised for RCE Multi Stage
SolarWinds compromised The threat actors used internet-exposed SolarWinds Web Help Desk (WHD) instances to gain initial access and then proceed laterally across the organization’s network to other high-value assets, according to Microsoft’s disclosure of a multi-stage attack. However, it is…
How HesabPay and Algorand Are Enabling Humanitarian Aid and Financial Inclusion in Afghanistan
A sudden shift unfolded across Afghanistan once American and NATO troops left in August 2021. Power structures backed by Washington vanished almost overnight; chaos spread quickly through regions. Instead, authority shifted back into the hands of the Taliban – two…
Flickr Reveals Data Breach Originating From Third Party Systems
A security incident affecting the user data of popular photo sharing platform Flickr has been confirmed to be the result of a compromise within a third-party service integrated into Flickr’s operation, rather than the company’s core infrastructure. According to…
Singapore Telecoms Hit by China-Linked Cyber Espionage
Singapore’s cyber watchdog has disclosed that an advanced cyber espionage group — UNC3886, with which APT10 and Red October have been linked — was behind attacks that targeted the four major telecom operators last year. The affected companies were Singtel,…
Cybersecurity Breaches Emerge as top Business Risk for Indian Companies
Cybersecurity breaches and attacks have become the leading threat to business performance for Indian companies, with 51% of senior executives identifying them as their primary risk, according to a new survey released by FICCI and EY. The FICCI-EY Risk…
Birmingham Mental Health Authority Alerts More than 30,000 People to Ransomware-linked Data Breach
A public mental health authority in Birmingham, Alabama has notified more than 30,000 individuals that their personal and medical information may have been exposed in a data breach linked to a ransomware attack late last year. The informed 30,434…
Ukraine Increases Control Over Starlink Terminals
New Starlink verification system Ukraine has launched a new authentication system for Starlink satellite internet terminals used by the public and the military after verifying that Russia state sponsored hackers have started using the technology to attack drones. The government…
Student Founders Establish Backed Program to Help Peers Build Startups
Two students affiliated with Stanford University have raised $2 million to expand an accelerator program designed for entrepreneurs who are still in college or who have recently graduated. The initiative, called Breakthrough Ventures, focuses on helping early-stage founders move…
CISA Warns of Actively Exploited SmarterMail Flaw Used in Ransomware Attacks
CISA includes a fresh SmarterMail weakness in its KEV list – this marks the third such addition linked to the messaging system within fourteen days. Identified as CVE-2026-24423, the security gap faces real-world abuse during ransom operations. Evidence points…
Sandworm Hackers Fail in DynoWiper Attack on Poland’s Power Grid
A recently disclosed cyberattack against Poland’s energy infrastructure has been linked to the Russian state-backed hacking group Sandworm, highlighting the persistent threat facing Europe’s critical sectors. The incident occurred between December 29 and 30, 2025, and reportedly targeted elements…
ShinyHunters Targets Okta and Microsoft SSO in Data Breach
Several voice-based social engineering attacks have prompted renewed scrutiny of single sign-on ecosystem security assumptions. The cybercrime collective ShinyHunters has publicly announced that it has carried out an extensive campaign to harvest SSO credentials from approximately 100 organizations, signaling…
La Sapienza University’s Digital Systems Remain Shut After Cyber Intrusion Disrupts Services
Rome’s La Sapienza University is continuing to experience major operational disruption after a cyber intrusion forced administrators to take its digital infrastructure offline as a safety measure. The shutdown began on February 2 and has affected core online services…
A New Twist on Old Cyber Tricks
Germany’s domestic intelligence and cybersecurity agencies have warned of a covert espionage campaign that turns secure messaging apps into tools of surveillance without exploiting any technical flaws. The Federal Office for the Protection of the Constitution and the Federal…
US Cybersecurity Strategy Shifts Toward Prevention and AI Security
Early next month, changes to how cyber breaches are reported will begin to surface, alongside a broader shift in national cybersecurity planning. Under current leadership, federal teams are advancing a more proactive approach to digital defense, focusing on risks…
CISA Confirms Active Exploitation of Four Critical Enterprise Software Flaws
CISA has confirmed active exploitation of four critical vulnerabilities in widely used enterprise software, urging immediate action from federal agencies and organizations worldwide. These flaws, now added to the agency’s Known Exploited Vulnerabilities (KEV) catalog, affect products from Versa,…
YouTube’s New GenAI Feature in Tools Coming Soon
Youtube is planning something new for its platform and content creators in 2026. The company plans to integrate AI into its existing and new tools. The CEO said that content creators will be able to use GenAI for shorts. While…
Widespread Cyber Espionage Campaign Breaches Infrastructure in 37 Countries
Research over the past year indicates that a newly identified cyberespionage threat actor operating in Asia has been conducting a sustained and methodical cyberespionage campaign that is characterized both by its operational scale and technical proficiency. A fully adaptive…