Google has formally begun rolling out a comprehensive verification framework for Android developers, a move aimed at tackling the persistent problem of malicious applications being distributed by actors who operate without revealing their identity. The company’s decision reflects growing…
Category: CySecurity News – Latest Information Security and Hacking Incidents
North Korean Hackers Target Softwares that Support Online Services
Hackers target behind-the-scenes softwares Hackers associated with North Korea hacked the behind-the-scenes software that operates various online functions to steal login credentials that could trigger cyber operations, according to Google. Threat actors hacked Axios, a program that links apps and…
Mazda Data Breach Exposes Employee, Partner Records
Mazda Motor Corporation, a leading Japanese automaker producing over 1.2 million vehicles annually, recently disclosed a significant security breach affecting its internal systems. The incident, detected in mid-December 2025, involved unauthorized access to a warehouse management system handling parts…
X Faces Global Outage Twice in Hours, Thousands of Users Report Access Issues
Hours apart, fresh disruptions hit X – once called Twitter – as glitches blocked entry for countless people across regions. Though brief, these lapses fuel unease over stability under Musk’s control, following a trail of prior breakdowns just lately.…
Russia promotes Max platform as questions grow over user data security
Russian daily communication has been disrupted in recent weeks, as familiar digital channels are experiencing problems under mounting regulatory pressure, disrupting the rhythms of everyday communication. What appears at first glance to be a technical inconvenience is in fact…
DeepLoad Malware Found Stealing Browser Data Using ClickFix
A contemporary cyber campaign is using a deceptive method known as ClickFix to distribute a previously undocumented malware loader called DeepLoad, raising fresh concerns about newly engineered attack techniques. Researchers from ReliaQuest report that the malware is designed with…
Delve Faces Allegations of Fake Compliance Reports and Security Gaps Amid Customer Backlash
A whistleblower-style article on Substack has thrust Delve into scrutiny, alleging it misrepresented its alignment with key privacy frameworks like GDPR and HIPAA. Though unverified, the claims suggest numerous clients were led to believe they met regulatory requirements when…
Google Maps’ Biggest Overhaul in a Decade: 8 Key Navigation Upgrades
Google has unveiled its most significant Google Maps overhaul in a decade, introducing eight key enhancements to streamline navigation and enhance user experience for commuters worldwide. This comprehensive update, rolled out across Android and iOS platforms, focuses on smarter…
Chinese Tech Leaders See 66 Billion Erased as AI Pressures Intensify
Throughout the past year, artificial intelligence has served more as a compelling narrative than a defined revenue stream – one that has steadily inflated expectations across global technology markets. As Alibaba Group Holdings Ltd and Tencent Holdings Ltd encountered…
Europol Takes Down Large Dark Web Scam Network
European law enforcement has dismantled an extensive Dark Web operation that was built to deceive users seeking illegal content and cybercrime services. According to Europol, a 35-year-old man based in China is suspected of creating a network of 373,000 Dark…
Trivy Scanner Hit by Major Supply Chain Attack
Aqua Security’s popular open-source vulnerability scanner, Trivy, has been compromised in an ongoing supply chain attack that began in late February 2026 and escalated dramatically by mid-March. Threat actors exploited misconfigurations in Trivy’s GitHub Actions workflows, stealing privileged tokens…
Security Alerts or Scams? How to Spot Fake Login Warnings and Protect Your Accounts
Your phone buzzes with a notification: “Unusual login activity detected on your account.” It’s enough to make anyone uneasy. But is it a genuine alert about a hacking attempt, or could the message itself be a trap? Notifications from…
AI-Driven Phishing Campaign Exploits Railway to Breach Microsoft Cloud Accounts at Scale
Security experts at Huntress report a fast-changing phishing operation using AI tools and cloud systems to breach Microsoft accounts in hundreds of companies. This activity ties back to improper use of Railway, a service that helps people launch apps…
Cybersecurity Faces New Threats from AI and Quantum Tech
The rapid surge in artificial intelligence since the launch of systems like ChatGPT by OpenAI in late 2022 has pushed enterprises into accelerated adoption, often without fully understanding the security implications. What began as a race to integrate AI into…
Signal Phishing Campaign Attributed to Russian Intelligence FBI Says
As part of a pair of advisory reports issued Friday, federal authorities outlined a pattern of foreign cyber activity that is increasingly exploiting the trust users place in everyday communication tools as a means of infiltration. According to the…
Perseus Malware Scans Android Notes for Passwords
A malicious new Android malware called Perseus is targeting users by scanning personal notes for sensitive information like passwords and cryptocurrency recovery phrases. Discovered by cybersecurity firm ThreatFabric, this threat evolves from earlier malware families such as Cerberus and…
International Crackdown Disrupts IoT Botnets Powering Large-Scale DDoS Attacks
Early results came through cooperation among U.S., German, and Canadian agencies targeting major digital threats like Aisuru, KimWolf, JackSkid, and Mossad. Systems once used to manage attacks now stand inactive after teams disrupted central control points across borders. Instead…
Meta Builds Privacy Focused Chatbot After AI Agents Reveal Confidential Data
Rather than being a malicious incident, what transpired was a routine technical inquiry within a company in which automated systems have become an increasingly integral part of engineering workflows. When a developer sought guidance, he turned to an internal…
Government Remains Primary Target as Cyberattacks Grow in 2025
Government institutions were the most heavily targeted sector in 2025, according to newly published research from HPE Threat Labs, which documented 1,186 active cyberattack campaigns throughout the year. The dataset reflects activity tracked between January 1 and December 31,…
MiniMax Unveils Self-Evolving M2.7 AI: Handles 50% of RL Research
Chinese AI startup MiniMax has unveiled its latest proprietary model, M2.7, touted as the industry’s first “self-evolving” AI capable of independently handling 30% to 50% of reinforcement learning research workflows. According to a VentureBeat report, this breakthrough positions M2.7…