Over recent years, Virtual Private Networks (VPNs) have surged in popularity as users look to bypass online censorship, secure their data, and access restricted content. Leading names like ProtonVPN, NordVPN, ExpressVPN, and Surfshark are often the go-to tools —…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Cybercriminals Exploit Unprecedented Data Exposure in 141 Million File Leak
Digital transformation has transformed cybersecurity from a technical safeguard to a strategic imperative for business continuity, consumer trust, and national security, particularlyin an era wofrapid digital transformation With the rise of digital infrastructure and the advent of data as the…
Mozilla Alerts Extension Developers About Phishing Scam on Add-ons Platform
Mozilla has issued a warning to developers who publish browser extensions on its official platform, addons.mozilla.org (AMO), about a new phishing campaign targeting their accounts. The attackers are reportedly sending emails that falsely claim to be from the Mozilla…
Open-source Autoswagger Exposes API Authorisation Flaws
Autoswagger is a free, open-source tool designed to scan OpenAPI-documented APIs for broken authorization vulnerabilities. These vulnerabilities remain common, even among organizations with strong security postures, and pose a significant risk as they can be exploited easily. Key features…
Lock Down Your USB Drive: 5 Powerful Ways to Keep Your Data Safe
In a world where we lock our phones, PCs, and even smart fridges, it’s surprising how many people still overlook the security of something as portable and vulnerable as a USB drive. A lost thumbstick can quickly turn into…
Shuyal Malware Targets 19 Browsers with Advanced Data Theft and Evasion Capabilities
A newly discovered infostealing malware named “Shuyal” has entered the cyber threat landscape, posing a serious risk to users by targeting a wide range of web browsers and deploying sophisticated evasion methods. Identified by researchers at Hybrid Analysis, Shuyal…
Market Trends Reveal Urgent Emerging Cybersecurity Requirements
During an era of unprecedented digital acceleration and hyperconnectivity, cybersecurity is no longer the sole responsibility of IT departments — it has now become a crucial strategic pillar for businesses of all sizes in an age of hyperconnectivity. Recent…
Vietnam Launches NDAChain for National Data Security and Digital Identity
Vietnam has launched NDAChain, a new blockchain network that allows only approved participants to join. The move is aimed at locking down Vietnam’s government data. About NDAChain The network is built by the National Data Association and managed by the…
A Massive 800% Rise in Data Breach Incidents in First Half of 2025
Cybersecurity experts have warned of a significant increase in identity-based attacks, following the revelation that 1.8 billion credentials were stolen in the first half of 2025, representing an 800% increase compared to the previous six months. Data breach attacks are…
Amazon Customers Face Surge in Phishing Attacks Through Fake Emails and Texts
Cybercriminals are actively targeting Amazon users with a sharp increase in phishing scams, and the company is sounding the alarm. Fraudsters are sending deceptive emails that appear to originate from Amazon, prompting users to log in via a counterfeit…
Here’s Why We Need Child Influencer Laws in a Monetised Content Society
The increasing urgency around safeguarding children who are featured as influencers or content creators online is a concerning trend that has grown rapidly in recent years. Earlier, U.S. child labor laws like the Coogan Law were designed to protect…
Amazon Accounts Targeted by New Phishing Scam — Here’s How to Stay Safe
A wave of phishing scams is currently targeting Amazon users, putting millions of accounts at risk. Criminals are sending fake emails and text messages that appear to come from Amazon, tricking users into clicking on links that lead to fraudulent…
Hackers Compromise French Submarine Engineering Company
One of the most chilling reminders of how threat landscapes are evolving even to the most fortified sectors is a major cyber breach that has hit the core of France’s naval defence ecosystem, the Naval Group. Naval Group—widely regarded as…
AI-supported Cursor IDE Falls Victim to Prompt Injection Attacks
Experts have found a bug called CurXecute that is present in all variants of the AI-supported code editor Cursor and can be compromised to run remote code execution (RCE), along with developer privileges. About the bug The security bug is…
Misconfigured Firewalls Plague Enterprises, Exposing Critical Security Gaps
In a troubling revelation for enterprise cybersecurity, a new report from FireMon has found that 60% of corporate firewalls fail critical compliance checks right out of the gate, raising alarms over the state of firewall governance in modern organisations. An…
FBI Issues Urgent Warning: Millions of Android Devices Compromised by Malware Operation
A dangerous malware campaign known as BadBox 2.0 has infected more than 10 million Android-powered devices, according to a recent alert from the FBI and major cybersecurity researchers. Users are being advised to immediately disconnect any suspicious smart devices…
Luxembourg Probes Cyberattack Behind Telecom Outage, Cites “Exceptionally Sophisticated” Assault
The Luxembourg government has launched a formal investigation into a major nationwide telecom outage that occurred on July 23, following what officials say was a deliberate cyberattack. The disruption, which lasted over three hours, knocked out the country’s 4G…
FBI Warns Chrome Users Against Unofficial Updates Downloading
If you use Windows, Chrome is likely to be the default browser. Despite Microsoft’s ongoing efforts to lure users to the Edge and the rising threat of AI browsers, Google’s browser remains dominant. However, Chrome is a victim of…
Ransomware Defence Begins with Fundamentals Not AI
The era of rapid technological advancements has made it clear that artificial intelligence isn’t only influencing cybersecurity, it is fundamentally redefining its boundaries and capabilities as well. The transformation was evident at the RSA Conference in San Francisco in…
Singapore Companies Struggle to Recover from Ransomware Despite Paying Hackers
Many businesses in Singapore continue to face prolonged and expensive recovery periods after ransomware attacks, even when they choose to pay the ransom. A new report from cybersecurity firm Sophos reveals that 50% of local organizations affected by ransomware…