A new technology developed by researchers at La Sapienza University of Rome could transform how individuals are identified in connected environments and reignite urgent debates over privacy. In a breakthrough that bypasses traditional biometrics, the research team has demonstrated…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Top 5 Ways CISOs Can Shift to a Proactive Cybersecurity Strategy
In today’s threat-filled digital ecosystem, being one step ahead of attackers is no longer a luxury—it’s a requirement. Yet, 81% of security leaders report being pushed by regulations and business needs to move toward a preventative approach, even as…
Insurance Provider Reports June Cyber Breach
Philadelphia Indemnity Insurance Company has confirmed that customer information was exposed during a cyber incident that occurred in June. The company shared the update through a recent filing with California’s Attorney General, marking the latest in a growing number…
Hackers Stole 384 Crore From Bengaluru Cryptocurrency Firm
In what is arguably the biggest cyberattack on an Indian cryptocurrency company, Neblio Technologies Private Limited, located in Bengaluru, was allegedly robbed off Rs. 384 crore. The company owns CoinDCX, a cryptocurrency exchange platform. The company claims that someone…
How to Stay Safe on Public Wi-Fi: Myths, Real Risks, and Smart Habits
Many people view public Wi-Fi as an open invitation for hackers to steal their personal data, but this perception isn’t entirely accurate. While using Wi-Fi in public places such as cafés, airports, or hotels does come with certain cybersecurity…
Emerging Koske Malware Leverages Visual Deception on Linux Platforms
The new Linux malware strain, Kosk, has emerged in a striking demonstration of how artificial intelligence is being used to fight cybercrime. In a remarkable development in how cybercrime intersects with artificial intelligence, the malware uses stealthy delivery mechanisms…
Don’t Wait for a Cyberattack to Find Out You’re Not Ready
In today’s digital age, any company that uses the internet is at risk of being targeted by cybercriminals. While outdated software and unpatched systems are often blamed for these risks, a less obvious but equally serious problem is the…
Delta Airline is Using AI to Set Ticket Prices
With major ramifications for passengers, airlines are increasingly using artificial intelligence to determine ticket prices. Now, simple actions like allowing browser cookies, accepting website agreements, or enrolling into loyalty programs can influence a flight’s price. The move to AI-driven…
Why Web3 Exchanges Must Prioritize Security, Privacy, and Fairness to Retain Users
In the evolving Web3 landscape, a platform’s survival hinges on its ability to meet community expectations. If users perceive an exchange as unfair, insecure, or intrusive, they’ll swiftly move on. This includes any doubts about the platform’s transparency, ability…
CoinDCX Suffers Rs 380 Crore Crypto Theft Linked to Insider Involvement
An important development underlining the growing threat of insider cybercrime has occurred in Bengaluru, when police arrested a software engineer who was suspected of committing a massive cryptocurrency heist that defrauded CoinDCX of approximately Rs 379 crore. Agarwal, a…
Malware Discovered in Endgame Gear Gaming Mouse Tool: Company Investigates, Assures Data Safety
A configuration utility designed for an Endgame Gear gaming mouse was recently found to have been compromised with malware, raising concerns among users and prompting a swift response from the company. Endgame Gear issued a public alert on Wednesday…
Amazon’s Coding Tool Hacked — Experts Warn of Bigger Risks
A contemporary cyber incident involving Amazon’s AI-powered coding assistant, Amazon Q, has raised serious concerns about the safety of developer tools and the risks of software supply chain attacks. The issue came to light after a hacker managed to…
UK Government Proposes Mandatory Reporting of Ransomware Attacks
The British government’s proposals to amend its ransomware strategy marked a minor milestone on Tuesday, when the Home Office issued its formal answer to a survey on modifying the law, but questions remain regarding the effectiveness of the measures. …
Emerging Threat Uses Windows Tools to Facilitate Banking Credential Theft
An alarming development that underscores how financial cybercrime is evolving is a Windows-based banking trojan dubbed Coyote. It has been observed for the first time that a malware strain leveraging the Microsoft UI Automation (UIA) framework for stealthy extraction of…
CISA Urges Immediate Patching of Critical SysAid Vulnerabilities Amid Active Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert about two high-risk vulnerabilities in SysAid’s IT service management (ITSM) platform that are being actively exploited by attackers. These security flaws, identified as CVE-2025-2775 and CVE-2025-2776, can…
ICAR Suffers Major Cyberattack: Recruitment and Research Data Compromised in National Breach
In a major cybersecurity incident this April, the Indian Council of Agricultural Research (ICAR) — the apex body managing agricultural education and research nationwide — fell victim to a serious data breach. The cyberattack targeted ICAR’s central website, its…
Cyberattack on EC-Ship Platform Exposes Personal Data of Thousands
Hong Kong, China — A recent cyberattack on Hongkong Post’s online mailing system has resulted in a major data breach affecting tens of thousands of users. According to officials, the hacker managed to access sensitive contact information from the EC-Ship…
SABO Fashion Brand Exposes 3.5 Million Customer Records in Major Data Leak
Australian fashion retailer SABO recently faced a significant data breach that exposed sensitive personal information of millions of customers. The incident came to light when cybersecurity researcher Jeremiah Fowler discovered an unsecured database containing over 3.5 million PDF documents,…
Chinese Government Launches National Cyber ID Amid Privacy Concerns
China’s national online ID service went into effect earlier this month with the promise of improving user privacy by limiting the amount of data collected by private-sector companies. However, the measures have been criticised by privacy and digital rights…
Securing Service Accounts to Prevent Kerberoasting in Active Directory
As the cornerstone of enterprise IT ecosystems for identity and access management, Active Directory (AD) continues to serve as its pillar of support. It has been trusted to handle centralised authentication and authorisation processes for decades, enabling organisations to…