A security alert now circulates among ScreenConnect users – critical exposure lurks within older builds. Versions released before 26.1 carry a defect labeled CVE-2026-3564. Unauthorized entry becomes possible through this gap, alongside elevated permissions. ConnectWise urges immediate awareness around…
Category: CySecurity News – Latest Information Security and Hacking Incidents
DarkSword Exploit Kit Targets iPhones, Steals Crypto Wallet and Personal Data
A newly identified exploit kit named “DarkSword” is being used to target iOS devices and extract a wide range of sensitive user information, including data from cryptocurrency wallet applications. The threat specifically impacts iPhones running iOS versions 18.4 to…
Large Scale Ransomware Attack at Marquis Compromises Data of 672000 People
Marquis, a Texas-based provider of analytics and visualization solutions to hundreds of U.S. banks, recently disclosed a ransomware intrusion that took place in August 2025 resulted in a large-scale compromise of highly sensitive customer information, demonstrating the systemic vulnerability…
Cyber Operations Expand as Iran Conflict Extends into Digital Warfare
Cyberattacks are increasingly being used alongside conventional military actions in the ongoing conflict involving Iran, with both state-linked actors and loosely organised hacker groups targeting systems in the United States and Israel. A recent incident involving Stryker illustrates the…
Nvidia DLSS 5 Sparks Backlash as AI Graphics Divide Gaming Industry
Despite fanfare at a Silicon Valley event, Nvidia’s latest graphics innovation, DLSS 5, has stirred debate among industry observers. Promoted as a leap toward lifelike visuals in gaming, the system leans heavily on artificial intelligence. Set for release before…
Govt, RBI Tighten Grip on Fraudulent Loan Apps
The Government of India and the Reserve Bank of India (RBI) have intensified efforts to combat fraudulent digital loan apps that exploit vulnerable borrowers. In a recent Rajya Sabha response, Minister of State for Finance Pankaj Chaudhary outlined coordinated…
AI Agents Are Reshaping Cyber Threats, Making Traditional Kill Chains Less Relevant
In September 2025, Anthropic disclosed a case that highlights a major evolution in cyber operations. A state-backed threat actor leveraged an AI-powered coding agent to conduct an automated cyber espionage campaign targeting 30 organizations globally. What stands out is…
FBI Escalates Enforcement Against Thai Fraud Rings Targeting US Individualsa
Digital exchanges that begin with a polite greeting, an apparent genuine conversation, or a quiet offer of companionship increasingly become entry points into a far more calculated form of transnational fraud. For many Americans, these interactions are not merely…
Mazda Reports Limited Data Exposure After Warehouse System Breach
Early reports indicate Mazda Motor Corporation faced a data leak following suspicious activity uncovered in its systems during December 2025. Information belonging to staff members, along with details tied to external partners, became accessible due to the intrusion. Investigation…
24.5 Million Dollar Hack Exposes Vulnerabilities in Resolv DeFi
The concept of stability is fundamental to the architecture of decentralized finance – it is the foundation upon which trust is built. A stablecoin brings parity with the dollar to the decentralized finance system, providing a quiet assurance that…
LeakNet Ransomware Uses ClickFix and Deno for Stealthy Attacks
LeakNet ransomware has changed its approach by pairing ClickFix social-engineering lures with a Deno-based loader, making its intrusion chain harder to spot. The group is using compromised websites to trick users into running malicious commands, then executing payloads in…
“Unhackable” No More: Researcher Demonstrates Hardware-Level Exploit on Xbox One
For years, the Xbox One was widely viewed as one of the few gaming systems that had resisted successful hacking. That perception has now changed after a new hardware-based attack method was publicly demonstrated. At the RE//verse 2026 event, security…
AI-Driven Phishing Campaign Exploits Device Permissions to Steal Biometric and Personal Data
A fresh wave of digital deception, driven by machine learning tools, shifts how hackers grab personal information — no longer relying on password theft but diving into deeper system controls. Spotted by analysts at Cyble Research & Intelligence Labs…
Russian Troops Rage Over Telegram Crackdown
Russian soldiers are increasingly frustrated as the Kremlin tightens control on Telegram, which has become the backbone of military communication, logistics and morale. The restrictions have sparked some unusual criticism from pro-war commentators, who argue that the move risks undermining…
Stryker Attack Prompts Scrutiny of Enterprise Device Management Tools
A significant shift has occurred in the strategic calculus behind destructive cyber operations in recent years, expanding beyond the confines of traditional critical infrastructures into lesser-noticed yet equally vital ecosystems underpinning modern economies. State-aligned threat actors are increasingly focusing their…
North Korean Hackers Turn VS Code Projects Into Silent Malware Triggers
Opening a project in a code editor is supposed to be routine. In this case, it is enough to trigger a full malware infection. Security researchers have linked an ongoing campaign associated with North Korean actors, tracked as Contagious…
China-Linked Hackers Exploit Middle East Conflict to Launch Cyberattacks on Qatar
A recent investigation by Check Point Research has uncovered a surge in cyberattacks targeting Qatar, orchestrated by China-linked threat actors such as the Camaro Dragon group. These campaigns are cleverly disguised as breaking news related to escalating tensions in…
AWS Bedrock Security Risks Exposed as Researchers Identify Eight Key Attack Vectors
Unexpectedly, Amazon Web Services’ Bedrock – built for crafting AI-driven apps – is drawing sharper attention from cybersecurity experts. Several exploit routes have emerged, threatening to reveal corporate infrastructure. Although the system smooths links between artificial intelligence models and…
Cybercriminals Misuse Microsoft Azure Monitor Alerts for Phishing Operations
Using trusted enterprise monitoring systems as a tool for credentialing their deception, threat actors have begun to make a subtle but highly effective shift in phishing tradecraft. Through the use of Microsoft Azure Monitor alerting mechanisms, attackers are orchestrating callback…
Microsoft Alerts 29,000 Users Hit by IRS-Themed Phishing Wave
Microsoft is warning of a major IRS‑themed phishing wave that hit 29,000 users in a single day, using tax‑season panic to steal credentials and deploy remote access malware. The campaigns piggyback on the urgency of the U.S. tax season,…