A data breach usually does not lend itself to straightforward comparisons, as each occurrence is characterized by distinctive circumstances and carries different consequences for those involved. It is common for headlines to emphasize the scale of an attack, the prominence…
Category: CySecurity News – Latest Information Security and Hacking Incidents
VPN Surge: Americans Bypass Age Verification Laws
Americans are increasingly seeking out VPNs as states enact stringent age verification laws that limit what minors can see online. These regulations compel users to provide personal information — like government issued IDs — to verify their age, leading to concerns…
US DoJ Charges 54 Linked to ATM Jackpotting Scheme Using Ploutus Malware, Tied to Tren de Aragua
The U.S. Department of Justice (DoJ) has revealed the indictment of 54 people for their alleged roles in a sophisticated, multi-million-dollar ATM jackpotting operation that targeted machines across the United States. According to authorities, the operation involved the use…
Iranian Infy Prince of Persia Cyber Espionage Campaign Resurfaces
Security researchers have identified renewed cyber activity linked to an Iranian threat actor known as Infy, also referred to as Prince of Persia, marking the group’s re-emergence nearly five years after its last widely reported operations in Europe and…
RansomHouse Develops More Complex Encryption for Recent Attacks
The ransomware group known as RansomHouse has recently enhanced the encryption mechanism used in its attacks, moving away from a basic, single-step process to a more advanced, multi-layered approach. This change reflects a deliberate effort to strengthen the effectiveness…
Lead Generation Sector Faces Scrutiny Following 16TB Data Exposure
In the wake of a massive unsecured MongoDB database, researchers have rekindled their interest in the risks associated with corporate intelligence and lead generation ecosystems. Researchers discovered that the MongoDB instance had been exposed, containing about 16 terabytes of…
£1.8bn BritCard: A Security Investment Against UK Fraud
The UK has debated national ID for years, but the discussion has become more pointed alongside growing privacy concerns. Two decades ago Tony Blair could sing the praises of ID cards and instead of public hysteria about data held by government,…
LinkedIn Profile Data Among Billions of Records Found in Exposed Online Database
Cybersecurity researchers recently identified a massive online database that was left publicly accessible without any security protections, exposing a vast collection of professional and personal information. The database contained more than 16 terabytes of data, representing over 4.3 billion…
CountLoader and GachiLoader Malware Campaigns Target Cracked Software Users
Cybersecurity analysts have uncovered a new malware campaign that relies on cracked software download platforms to distribute an updated variant of a stealthy and modular loader known as CountLoader. According to researchers from the Cyderes Howler Cell Threat Intelligence…
Clop Ransomware Targets Internet-Facing Gladinet CentreStack Servers in New Data Theft Campaign
The Clop ransomware group, also known as Cl0p, has launched a new extortion campaign aimed at Gladinet CentreStack file servers that are exposed to the internet. Gladinet CentreStack is a file-sharing solution that allows organizations to securely access and…
Lugano: Swiss Crypto Hub Where Bitcoin Pays for Everything
The Swiss city of Lugano, located in the Italian-speaking canton of Ticino, has turned itself into the European capital for cryptocurrency through its bold “Plan ₿” scheme, which lets citizens and businesses transact in Bitcoin and Tether for almost everything.…
Microsoft 365 Users Targeted by Russia-Linked Device Code Phishing Operations
The global network infrastructure is experiencing a wave of sophisticated cyber intrusions as states-sponsored and financially motivated hackers are increasingly exploiting a legitimate Microsoft authentication mechanism to seize control of enterprise accounts in a broad range of sectors. There has…
Wi-Fi Jammers Pose a Growing Threat to Home Security Systems: What Homeowners Can Do
Wi-Fi technology powers most modern home security systems, from surveillance cameras to smart alarms. While this connectivity offers convenience, it also opens the door to new risks. One such threat is the growing use of Wi-Fi jammers—compact devices that…
Adobe Brings Photo, Design, and PDF Editing Tools Directly Into ChatGPT
Adobe has expanded how users can edit images, create designs, and manage documents by integrating select features of its creative software directly into ChatGPT. This update allows users to make visual and document changes simply by describing what they…
Amazon and Microsoft AI Investments Put India at a Crossroads
Major technology companies Amazon and Microsoft have announced combined investments exceeding $50 billion in India, placing artificial intelligence firmly at the center of global attention on the country’s technology ambitions. Microsoft chief executive Satya Nadella revealed the company’s largest-ever…
AI Avatars Trialled to Ease UK Teacher Crisis
In the UK, where teacher recruitment and retention is becoming increasingly dire, schools have started experimenting with new and controversial technology – including AI-generated “deepfake” avatars and remote teaching staff. Local media outlets are tracking these as answers to the…
Aadhaar Verification Rules Amended as India Strengthens Data Compliance
It is expected that India’s flagship digital identity infrastructure, the Aadhaar, will undergo significant changes to its regulatory framework in the coming days following a formal amendment to the Aadhaar (Targeted Determination of Services and Benefits Management) Regulations, 2.0.…
Trusted Browser Extensions Turn Rogue in ShadyPanda Malware Campaign Affecting Chrome and Edge
Malicious browser extensions sometimes slip into official marketplaces like the Chrome Web Store by disguising themselves as genuine tools. Detecting them becomes even harder when they behave legitimately at first, only turning harmful after users have grown to trust…
AI in Cybercrime: What’s Real, What’s Exaggerated, and What Actually Matters
Artificial intelligence is increasingly influencing the cyber security infrastructure, but recent claims about “AI-powered” cybercrime often exaggerate how advanced these threats currently are. While AI is changing how both defenders and attackers operate, evidence does not support the idea…
OpenAI Warns Future AI Models Could Increase Cybersecurity Risks and Defenses
Meanwhile, OpenAI told the press that large language models will get to a level where future generations of these could pose a serious risk to cybersecurity. The company in its blog postingly admitted that powerful AI systems could eventually…