It was the Trump administration’s decision to permit Nvidia to regain sales of one of its more powerful artificial intelligence processors to Chinese buyers that sparked a fierce debate in Washington, underscoring the deep tensions between national security policy and…
Category: CySecurity News – Latest Information Security and Hacking Incidents
U.S. Startup Launches Mobile Service That Requires No Personal Identification
A newly launched U.S. mobile carrier is questioning long-standing telecom practices by offering phone service without requiring customers to submit personal identification. The company, Phreeli, presents itself as a privacy-focused alternative in an industry known for extensive data collection.…
Cybercriminals Exploit Law Enforcement Data Requests to Steal User Information
While most of the major data breaches occur as a result of software vulnerabilities, credit card information theft, or phishing attacks, increasingly, identity theft crimes are being enacted via an intermediary source that is not immediately apparent. Some of…
Holiday Scam Alerts Rise: How to Spot Fake Links and Stay Safe From Phishing Attacks
As the festive season rolls in with cozy drinks, twinkling lights and gift exchanges, it also brings a sharp spike in online scams. Cybercriminals are working overtime during the holidays, using increasingly advanced tactics to trick people into clicking…
FTC Refuses to Lift Ban on Stalkerware Company that Exposed Sensitive Data
The surveillance industry banned a stalkerware maker after a data breach leaked information of its customers and the people they were spying on. Consumer spyware company Support King can’t sell the surveillance software now, the US Federal Trade Commission (FTC)…
CyberVolk Ransomware Fails to Gain Traction After Encryption Misstep
CyberVolk, a pro-Russian hacktivist collective, has intensified its campaign of ransomware-driven intimidation against entities perceived as hostile to Moscow in the past year, marking a notable change in both scale and presentation, marking a notable shift in its operations. …
Gartner Warns: Block AI Browsers to Avert Data Leaks and Security Risks
Analyst company Gartner has issued a recommendation to block AI-powered browsers to help organizations protect business data and cybersecurity. The company says most of these agentic browsers—browsers using autonomous AI models for interacting with web content and automating tasks…
Home Renovation Choices That Often Do Not Deliver Real Value
Home renovations are often regarded as investments; however, not every upgrade enhances a home’s function, character, or resale value. Designers specializing in working with properties that are older generally emphasize that intelligent, budget-savvy decisions bear greater importance than drastic…
IDESaster Report: Severe AI Bugs Found in AI Agents Can Lead to Data Theft and Exploit
Using AI agents for data exfiltrating and RCE A six-month research into AI-based development tools has disclosed over thirty security bugs that allow remote code execution (RCE) and data exfiltration. The findings by IDEsaster research revealed how AI agents deployed…
Fake GitHub OSINT Tools Spread PyStoreRAT Malware
Attackers are using GitHub as part of a campaign to spread a novel JavaScript-based RAT called PyStoreRAT, masquerading as widely used OSINT, GPT, and security utilities targeting developers and analysts. The malware campaign leverages small pieces of Python or…
AI Browsers Raise Privacy and Security Risks as Prompt Injection Attacks Grow
A new wave of competition is stirring in the browser market as companies like OpenAI, Perplexity, and The Browser Company aggressively push to redefine how humans interact with the web. Rather than merely displaying pages, these AI browsers will…
Apple Addresses Two Actively Exploited Zero-Day Security Flaws
Following confirmation that two previously unknown security flaws had been actively exploited in the wild on Friday, Apple rolled out a series of security updates across its entire software ecosystem to address this issue, further demonstrating the continued use of…
5 Critical Situations Where You Should Never Rely on ChatGPT
Just a few years after its launch, ChatGPT has evolved into a go-to digital assistant for tasks ranging from quick searches to event planning. While it undeniably offers convenience, treating it as an all-knowing authority can be risky. ChatGPT…
Indian Government Proposes Compulsory Location Tracking in Smartphones, Faces Backlash
Government faces backlash over location-tracking proposal The Indian government is pushing a telecom industry proposal that will compel smartphone companies to allow satellite location tracking that will be activated 24×7 for surveillance. Tech giants Samsung, Google, and Apple have opposed…
Brave Experiments With Automated AI Browsing Under Tight Security Checks
Brave has started testing a new feature that allows its built-in assistant, Leo, to carry out browsing activities on behalf of the user. The capability is still experimental and is available only in the Nightly edition of the browser,…
Asus Supplier Breach Sparks Security Concerns After Everest Ransomware Claims Data Theft
Asus has confirmed a security breach via one of its third-party suppliers after the Everest ransomware group claimed it had accessed internal materials belonging to the company. In its statement, Asus confirmed that a supply chain vendor “was hacked,”…
Emerging Predator Spyware Technique Enables Zero-Click Compromise
Intellexa is one of the most controversial and persistent players in the shadowy world of commercial cyber-espionage, even though mounting scrutiny, international sanctions, and ongoing investigations have led to increased scrutiny and investigation. Although it is best known for…
Aisuru Botnet Unleashes Record 29.7 Tbps DDoS Attack
A new record-breaking 29.7 Tbps distributed denial-of-service (DDoS) attack launched via the Aisuru botnet has set a new standard for internet disruption and reinforced that multi-terabit attacks are on track to soon be an everyday event for DDoS defenders.…
FBI Alerts Public about Scammers Using Altered Online Photos to Stage Fake Kidnappings
The Federal Bureau of Investigation has issued a new advisory warning people about a growing extortion tactic in which criminals take photos posted online, manipulate them, and present the edited images as supposed evidence during fake kidnapping attempts. The…
700+ Self-hosted Gits Impacted in a Wild Zero-day Exploit
Hackers actively exploit zero-day bug Threat actors are abusing a zero-day bug in Gogs- a famous self-hosted Git service. The open source project hasn’t fixed it yet. About the attack Over 700 incidents have been impacted in these attacks. Wiz…