Cybersecurity is increasingly shaped by global politics. Armed conflicts, economic sanctions, trade restrictions, and competition over advanced technologies are pushing countries to use digital operations as tools of state power. Cyber activity allows governments to disrupt rivals quietly, without deploying…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Ingram Micro Reveals Impact of Ransomware Attack on Employee Records
Ingram Micro quietly divulged all the personal details of their employees and job applicants last summer after a ransomware attack at the height of the summer turned into a far-reaching data exposure, exposing sensitive information about their employees and…
Google Gemini Calendar Flaw Allows Meeting Invites to Leak Private Data
Though built to make life easier, artificial intelligence helpers sometimes carry hidden risks. A recent study reveals that everyday features – such as scheduling meetings – can become pathways for privacy breaches. Instead of protecting data, certain functions may…
Resecurity Breach Claims Exposed as Honeypot Deception
The hackers, who claimed to represent the “Scattered Lapsus$ Hunters” (SLH) group, believed they successfully compromised Resecurity, a cybersecurity firm based in the United States, by exfiltrating their data. Resecurity disputed this by saying they were only able to…
Researchers Exploit Flaw in StealC Malware Panel to Monitor Cybercriminals
Security researchers have identified a weakness in the web-based dashboard used by operators of the StealC information-stealing malware, allowing them to turn the malware infrastructure against its own users. The flaw made it possible to observe attacker activity and gather…
European Authorities Identify Black Basta Suspects as Ransomware Group Collapses
Two Ukrainians are now under suspicion of aiding Black Basta, a ransomware network tied to Russia, after joint work by police units in Ukraine and Germany – this step adds pressure on the hacking group’s operations. The man believed…
UAE Banks Ditch SMS OTPs for Biometric App Authentication
UAE banks have discontinued SMS-based one-time passwords (OTPs) for online transactions from January 6, 2026, moving customers to app-based and biometric authentication as part of a wider security overhaul led by the Central Bank of the UAE. This marks…
Transparent Tribe Targets Indian Public Sector and Academic Networks
Several recent cyber espionage campaigns have drawn attention to Transparent Tribe, a long-standing advanced persistent threat group associated with a new wave of intrusions targeting Indian government bodies, academic institutions, and strategically sensitive organizations, which have re-opened the issue of…
AI Can Answer You, But Should You Trust It to Guide You?
Artificial intelligence tools are expanding faster than any digital product seen before, reaching hundreds of millions of users in a short period. Leading technology companies are investing heavily in making these systems sound approachable and emotionally responsive. The goal is…
Black Basta Under Pressure After Ukraine Germany Enforcement Operation
Investigators say the Black Basta ransomware campaign left a trail of disruption that extended across Europe and beyond, impacting everything from hospital wards to industrial production lines that were abruptly halted, resulting in a temporary ban of internet and…
Malicious Chrome Extensions Target Enterprise HR and ERP Platforms to Steal Credentials
One after another, suspicious Chrome add-ons began appearing under false pretenses – each masquerading as helpful utilities. These were pulled from public view only after Socket, a cybersecurity group, traced them back to a single pattern of abuse. Instead…
Cybersecurity Falls Behind as Threat Scale Outpaces Capabilities
Cyber defence is entering its 2026 year with the balance of advantage increasingly being determined by speed rather than sophistication. With the window between intrusion and impact now measured in minutes rather than days instead of days, the advantage is…
GootLoader Malware Uses Malformed ZIP Archives to Evade Detection
A fresh tactic has emerged among cybercriminals using GootLoader, a JavaScript-driven malware installer. Instead of standard compression, they now distribute broken ZIP files designed to slip past digital defenses. These flawed archives exploit differences across decompression programs – some…
GhostPoster Malware Campaign Exposes Browser Extension Risks
A stealthy malware operation has been discovered by cybersecurity researchers, which remained undetected for a period of up to five years and accumulated more than 840,000 downloads on various platforms. The research began with a study by Koi Security…
CIRO Discloses Phishing Breach Impacting Personal Data of 750,000 Individuals
The Canadian Investment Regulatory Organization (CIRO) serves as the country’s national self-regulatory authority for investment dealers and marketplaces, with responsibilities that include investor protection, regulatory enforcement, and ensuring the integrity and efficiency of Canada’s capital markets. CIRO has disclosed…
Security Researchers Warn of ‘Reprompt’ Flaw That Turns AI Assistants Into Silent Data Leaks
Cybersecurity researchers have revealed a newly identified attack technique that shows how artificial intelligence chatbots can be manipulated to leak sensitive information with minimal user involvement. The method, known as Reprompt, demonstrates how attackers could extract data from AI…
AWS CodeBuild Misconfiguration Could Have Enabled Full GitHub Repository Takeover
One mistake in how Amazon Web Services set up its CodeBuild tool might have let hackers grab control of official AWS GitHub accounts. That access could spill into more parts of AWS, opening doors for wide-reaching attacks on software…
Lumen Disrupts Aisuru–Kimwolf Botnet Powering Massive DDoS Attacks
Lumen Technologies’ Black Lotus Labs has successfully disrupted more than 550 command-and-control (C2) servers connected to the Aisuru and Kimwolf botnets, a large-scale malicious infrastructure widely used for distributed denial-of-service (DDoS) attacks and residential proxy abuse. Aisuru operates as…
Google Rolls Out Gmail Address Change Feature
Google has rolled out a major update that will allow users to change their main @gmail.com address. This much-needed feature is being rolled out starting January 2026. Before this update, Gmail users were stuck with their original username for…
Surge in Cybercrime Undermines Online Safety Efforts
With data breaches, ransomware incidents, and state-sponsored digital espionage increasingly dominating global headlines, cybersecurity has become a strategic priority for governments and corporations alike, moving from a back-office concern to a front-line concern. A widening gap between risk and…