OpenAI has officially entered the web-browsing market with ChatGPT Atlas, a new browser built on Chromium: the same open-source base that powers Google Chrome. At first glance, Atlas looks and feels almost identical to Chrome or Safari. The key…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Western Sydney University Hit by Major Cyberattack
Western Sydney University has suffered a significant cyberattack, marking the latest in a series of incidents targeting the institution since 2023. Sensitive data belonging to students, staff, and alumni—including tax file numbers, bank account details, passport and driver license…
AWS Apologizes for Massive Outage That Disrupted Major Platforms Worldwide
Amazon Web Services (AWS) has issued an apology to customers following a widespread outage on October 20 that brought down more than a thousand websites and services globally. The disruption affected major platforms including Snapchat, Reddit, Lloyds Bank, Venmo,…
Growing VPN Exploits Trigger Fresh Ransomware Crisis in APAC
Despite the growing cyber risk landscape in Asia-Pacific, ransomware operations continue to tighten their grip on India and the broader region, as threat actors more often seek to exploit network vulnerabilities and target critical sectors in order to get…
New Vidar Variant Uses API Hooking to Steal Data Before Encryption
A recent investigation by Aryaka Threat Research Labs has revealed a new version of the Vidar infostealer that demonstrates how cybercriminals are refining existing malware to make it more discreet and effective. Vidar, which has circulated for years through…
Iran Attacks Israeli Cybersecurity Infrastructure
The National Cyber Directorate found a series of cyberattacks that targeted Israeli organisations that offer IT services to companies in the country, and might be linked to Iran. Earlier this month, the failed cyberattack against Shamir Medical Center on Yom…
TikTok ‘Free Photoshop’ Scam Steals User Data via Malicious Commands
A sophisticated scam targeting TikTok users is exploiting the platform’s reach to steal personal data by promising free access to expensive software like Adobe Photoshop. Cybercriminals are using a social engineering technique called ClickFix to trick victims into executing…
Online Identity Is Evolving: From Data Storage to Proof-Based Verification with zkTLS
The next phase of online identity is shifting from data storage to proof-based verification. Today, the internet already contains much of what verification and compliance teams require — from academic credentials and payment confirmations to loyalty program details. The…
How to Make Zoom Meetings More Secure and Protect Your Privacy
Zoom calls remain an essential part of remote work and digital communication, but despite their convenience, they are not entirely private. Cybercriminals can exploit vulnerabilities to steal sensitive information, intercept conversations, or access meeting data. However, several practical measures…
Proxy Servers: How They Work and What They Actually Do
When browsing online, your device usually connects directly to a website’s server. However, in certain cases, especially for privacy, security, or access control — a proxy server acts as a go-between. It stands between your device and the internet, forwarding…
The Growing Role of Cybersecurity in Protecting Nations
It is becoming increasingly complex and volatile for nations to cope with the threat landscape facing them in an age when the boundaries between the digital and physical worlds are rapidly dissolving. Cyberattacks have evolved from isolated incidents of…
North Korean Hackers Steal Billions Through Crypto Heists and Fake Remote Jobs to Fund Nuclear Program, Report Reveals
North Korean hackers have siphoned off billions of dollars by breaching cryptocurrency exchanges and using false identities to secure remote tech jobs abroad, according to a new international assessment of the country’s cyber operations. The 138-page report, released by…
Analysts Place JLR Hack at Top of UKs Most Costly Cyber Incidents
It has been said by experts that Jaguar Land Rover (JLR) has found itself at the epicentre of the biggest cyber crisis in UK history, an event that has been described as a watershed moment for British industrial resilience.…
FinWise Data Breach Exposes Insider Threats, Highlights Need for Strong Encryption and Key Management
The 2024 FinWise data breach underscores the rising risk of insider threats within financial institutions. Unlike cyberattacks initiated by external hackers, this breach resulted from unauthorized access by a former employee who retained system credentials after leaving the company.…
Cybercrime Gang Busted for Massive Fake Welfare Portal Scam in India
A massive inter-state cybercrime syndicate targeting government welfare schemes in India was busted by police under an operation code-named “Shutterdown,” revealing one of the largest frauds of recent years involving over 36 arrests and millions siphoned off from government…
Google’s Quantum Breakthrough Rekindles Concerns About Bitcoin’s Long-Term Security
Google has announced a verified milestone in quantum computing that has once again drawn attention to the potential threat quantum technology could pose to Bitcoin and other digital systems in the future. The company’s latest quantum processor, Willow, has…
Prosper Marketplace Cybersecurity Breach Exposes Data of 17 Million Users, Sparks Renewed Fintech Security Concerns
Prosper Marketplace has confirmed a major cybersecurity breach that compromised the personal data of over 17 million users, underscoring the persistent challenges faced by financial institutions in protecting sensitive consumer information. According to the peer-to-peer lending firm, an unauthorized…
Madras High Court says cryptocurrencies are property, not currency — what the ruling means for investors
Chennai, India — In a paradigm-shifting judgment that reshapes how India’s legal system views digital assets, the Madras High Court has ruled that cryptocurrencies qualify as property under Indian law. The verdict, delivered by Justice N. Anand Venkatesh, establishes…
AI Poisoning: How Malicious Data Corrupts Large Language Models Like ChatGPT and Claude
Poisoning is a term often associated with the human body or the environment, but it is now a growing problem in the world of artificial intelligence. Large language models such as ChatGPT and Claude are particularly vulnerable to this…
Volkswagen Faces Cybersecurity Concerns Amid Ransomware Claims
According to a report by the German media, Volkswagen has experienced an unexpected halt to its global operations following the alleged occurrence of a major cybersecurity incident that has rippled through one of the world’s largest automotive networks. According…