In 2025, phone numbers have become woven into nearly every part of our digital lives. Whether you’re creating accounts on e-commerce sites, managing online banking, accessing health services, or logging in to social networks, your phone number is the…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Social Engineering Identified as Catalyst for M&S Ransomware Breach
Marks & Spencer (M&S), one of the largest and most established retailers in the United Kingdom, has confirmed that a highly targeted social engineering operation triggered the ransomware attack in April 2025. This breach, which is associated with DragonForce…
Millions of Resumes Exposed Online Due to Unsecured Hiring Platform
A major data exposure has come to light after cybersecurity experts discovered an unsecured online storage system containing nearly 26 million documents, many of which appear to be resumes of job seekers in the United States. The exposed files…
Attackers Exploit Compromised Shellter Red Team Tool to Deploy Infostealers
Shellter Project, which makes a commercial AV/EDR evasion loader for penetration testing, admitted that hackers exploited its Shellter Elite product in assaults after a client leaked a copy of the software. The exploitation has been ongoing for several months,…
AI and the Rise of Service-as-a-Service: Why Products Are Becoming Invisible
The software world is undergoing a fundamental shift. Thanks to AI, product development has become faster, easier, and more scalable than ever before. Tools like Cursor and Lovable—along with countless “co-pilot” clones—have turned coding into prompt engineering, dramatically reducing…
Google Gemini Bug Exploits Summaries for Phishing Scams
False AI summaries leading to phishing attacks Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links. Google…
Telefónica Investigates Claims of Major Data Breach by Cybercriminal
An investigation has been conducted into a significant cybersecurity incident that occurred in 2025 at Telefónica, a global telecommunications company serving millions across Europe and Latin America. In addition to allegedly obtaining a considerable cache of confidential corporate data…
Here’s Why Cyber Security is Critical For Healthcare Sector
Healthcare organisations provide an essential service that, if disrupted by a cyber attack, could jeopardise patient safety, disrupt care delivery, and even result in death. In the case of a security incident, the implications could impact not only the…
Can AI Be Trusted With Sensitive Business Data?
As artificial intelligence becomes more common in businesses, from retail to finance to technology— it’s helping teams make faster decisions. But behind these smart predictions is a growing problem: how do you make sure employees only see what they’re…
Weak Passwords Still Common in Education Sector, Says NordVPN Report
A new study by NordVPN has revealed a serious cybersecurity issue plaguing the education sector: widespread reliance on weak and easily guessable passwords. Universities, schools, and training centres continue to be highly vulnerable due to the reuse of simple…
NVIDIA Urges Users to Enable ECC to Defend GDDR6 GPUs Against Rowhammer Threats
NVIDIA has issued a renewed advisory encouraging customers to activate System Level Error-Correcting Code (ECC) protections to defend against Rowhammer attacks targeting GPUs equipped with GDDR6 memory. This heightened warning follows recent research from the University of Toronto demonstrating…
Latest Malware “Mamona” Attacks Locally, Hides by Self Deletion
Cybersecurity experts are tracing Mamona, a new ransomware strain that is famous for its stripped-down build and silent local execution. Experts believe that the ransomware prevents the usual command-and-control (C2) servers, choosing instead a self-contained method that moves past tools…
Ingram Micro Faces Major Outage Following Ransomware Incident
An assault on Ingram Micro’s global network started on July 3, which crippled parts of the company’s global network as well as disrupted its ordering portals and customer service channels. Ingram Micro is currently restoring critical systems. It became…
CISA Lists Citrix Bleed 2 as Exploit, Gives One Day Deadline to Patch
CISA confirms bug exploit The US Cybersecurity & Infrastructure Security Agency (CISA) confirms active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777 in Citrix NetScaler ADC and Gateway. It has given federal parties one day to patch the bugs. This unrealistic…
Is Your Bank Login at Risk? How Chatbots May Be Guiding Users to Phishing Scams
Cybersecurity researchers have uncovered a troubling risk tied to how popular AI chatbots answer basic questions. When asked where to log in to well-known websites, some of these tools may unintentionally direct users to the wrong places, putting their…
Scamfluencers Use Social Media to Orchestrate Sophisticated Online Fraud
Scamfluencers, a rising category of deceptive internet personalities, are leveraging their online influence to run sophisticated scams that have already cost Americans an estimated $1.9 billion in 2024. These individuals masquerade as experts in finance, health, or other trusted…
The Rise of Digital Slavery in the Age of Global Cybercrime
A growing number of cybercriminals are becoming more sophisticated and dangerous in the hyperconnected digital world of today. These criminals use advanced methods to exploit individuals and organisations who are not expecting them. To lure victims into divulging confidential…
DeepSeek Faces Ban From App Stores in Germany
DeepSeek, a competitor of ChatGPT, may face legal ramifications in the European Union after the Berlin Commissioner for Data Protection ordered that Google and Apple remove the AI app from their stores. After discovering that the DeepSeek app violates…
‘Hunters International’ RaaS Outfit Shuts Down Its Operation
Hunters International, a ransomware-as-a-Service (RaaS) outfit, shut down operations and will provide free decryptors to victims seeking to restore their data without paying a ransom. “After careful consideration and in light of recent developments, we have decided to close…
Ingram Micro Confirms SafePay Ransomware Attack and Global IT System Outage
Ingram Micro, one of the world’s largest IT distribution and services companies, has confirmed it was targeted in a ransomware attack by the SafePay group, causing major operational disruptions across its global network. The cyberattack, which began early on…