Despite the fact that operating systems like Windows and macOS continue to dominate the global market, Linux has gained a steady following among users who value privacy and security as well as cybersecurity professionals, thanks to its foundational principles: transparency,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Major Breach at Medical Billing Giant Results in The Data Leak of 5.4 Million Users
Episource, the medical billing behemoth, has warned millions of Americans that a hack earlier this year resulted in the theft of their private and medical data. According to a listing with the United States Department of Health and Human…
Episource Healthcare Data Breach Exposes Personal Data of 5.4 Million Americans
In early 2025, a cyberattack targeting healthcare technology provider Episource compromised the personal and medical data of over 5.4 million individuals in the United States. Though not widely known to the public, Episource plays a critical role in the…
Over 2 Million Users Affected: Browser Extensions Turned Into Silent Spying Tools
An alarming cyber threat has come to light involving common browser extensions used by millions across the world. According to a recent investigation by cybersecurity firm Koi Security, at least 18 browser add-ons, once considered safe were secretly turned into…
Asia is a Major Hub For Cybercrime, And AI is Poised to Exacerbate The Problem
Southeast Asia has emerged as a global hotspot for cybercrimes, where human trafficking and high-tech fraud collide. Criminal syndicates operate large-scale “pig butchering” operations in nations like Cambodia and Myanmar, which are scam centres manned by trafficked individuals compelled…
Why Major Companies Are Still Falling to Basic Cybersecurity Failures
In recent weeks, three major companies—Ingram Micro, United Natural Foods Inc. (UNFI), and McDonald’s—faced disruptive cybersecurity incidents. Despite operating in vastly different sectors—technology distribution, food logistics, and fast food retail—all three breaches stemmed from poor security fundamentals, not advanced…
Google Gemini Exploit Enables Covert Delivery of Phishing Content
An AI-powered automation system in professional environments, such as Google Gemini for Workspace, is vulnerable to a new security flaw. Using Google’s advanced large language model (LLM) integration within its ecosystem, Gemini enables the use of artificial intelligence (AI)…
Hidden Crypto Mining Operation Found in Truck Tied to Village Power Supply
In a surprising discovery, officials in Russia uncovered a secret cryptocurrency mining setup hidden inside a Kamaz truck parked near a village in the Buryatia region. The vehicle wasn’t just a regular truck, it was loaded with 95 mining…
Chinese Attackers Suspected of Breaching a Prominent DC Law Firm
The next front in the silent war, which is being waged with keystrokes and algorithms rather than missiles, is the digital infrastructure of a prominent legal firm in Washington, DC. Wiley Rein, a company known for negotiating the complex…
WordPress Plugin Breach: Hackers Gain Control Through Manual Downloads
A serious cyberattack recently targeted Gravity Forms, a widely used plugin for WordPress websites. This incident, believed to be part of a supply chain compromise, resulted in infected versions of the plugin being distributed through manual installation methods. What…
OpenAI Launching AI-Powered Web Browser to Rival Chrome, Drive ChatGPT Integration
OpenAI is reportedly developing its own web browser, integrating artificial intelligence to offer users a new way to explore the internet. According to sources cited by Reuters, the tool is expected to be unveiled in the coming weeks, although…
Global Encryption at Risk as China Reportedly Advances Decryption Capabilities
It has been announced that researchers at Shanghai University have achieved a breakthrough in quantum computing that could have a profound impact on modern cryptographic systems. They achieved a significant leap in quantum computing. The team used a quantum…
Politically Motivated Hacktivist Stole Data of 2.5 Million Columbia University Students And Employees
In a targeted cyberattack that investigators suspect was politically motivated, a seasoned “hacktivist” allegedly acquired private data from over two million Columbia University students, applicants, and staff. The savvy hacktivist stole social security numbers, citizenship status, university-issued ID numbers,…
Newly Found AMD Processor Flaws Raise Concerns, Though Risk Remains Low
In a recent security advisory, chipmaker AMD has confirmed the discovery of four new vulnerabilities in its processors. These issues are related to a type of side-channel attack, similar in nature to the well-known Spectre and Meltdown bugs that were…
The Alarming Convergence of Cyber Crime and Real-World Threats
It is becoming increasingly evident that every aspect of everyday life relies on digital systems in today’s hyper-connected world, from banking and shopping to remote work and social media, as well as cloud-based services. With more and more people…
Balancing Accountability and Privacy in the Age of Work Tracking Software
As businesses adopt employee monitoring tools to improve output and align team goals, they must also consider the implications for privacy. The success of these systems doesn’t rest solely on data collection, but on how transparently and respectfully they…
Malicious Firefox Extension Steals Verification Tokens: Update to stay safe
Credential theft and browser security were commonly found in Google Chrome browsers due to its wide popularity and usage. Recently, however, cyber criminals have started targeting Mozilla Firefox users. A recent report disclosed a total of eight malicious Firefox extensions…
Why Running AI Locally with an NPU Offers Better Privacy, Speed, and Reliability
Running AI applications locally offers a compelling alternative to relying on cloud-based chatbots like ChatGPT, Gemini, or Deepseek, especially for those concerned about data privacy, internet dependency, and speed. Though cloud services promise protections through subscription terms, the reality…
Malware Masquerading as AI Tools Targets 8,500+ SMB Users in an SEO Poisoning Campaign
Cybersecurity researchers have discovered a malicious campaign that uses SEO-optimized phoney landing pages to propagate the Oyster malware loader. Security experts at Arctic Wolf unearthed that threat actors have designed numerous landing sites that mimic two well-known Windows tools…
Germany’s Warmwind May Be the First True AI Operating System — But It’s Not What You Expect
Artificial intelligence is starting to change how we interact with computers. Since advanced chatbots like ChatGPT gained popularity, the idea of AI systems that can understand natural language and perform tasks for us has been gaining ground. Many have…