Category: CySecurity News – Latest Information Security and Hacking Incidents

FBI Alert: Avoid Scanning This QR Code on Your Phone

  The FBI has issued a warning about a new scam in which cybercriminals send unsolicited packages containing a QR code to people’s homes, aiming to steal personal and financial information or install malware on their devices. These packages often…

Cybercrime Group Claims Theft of MailChimp Client Data

  The Russian-speaking cybercrime group Everest says it has stolen a large trove of data from email marketing giant Mailchimp, but the company has denied any evidence of a security incident. Everest announced the alleged breach on its dark web…

BlackSuit Ransomware Capabilities Undermined by Targeted Server Takedown

  With the help of U.S Immigration and Customs Enforcement’s Homeland Security Investigations (HSI), as well as domestic and international law enforcement agencies, U.S Immigration and Customs Enforcement’s Homeland Security Investigations has dismantled the backbone of the BlackSuit ransomware group,…

Ransomware Attacks Threaten CEOs to Get Results

Ransomware gangs are getting desperate for results. Generally known for encrypting and leaking data on the internet, they have now started blackmailing CEOs with physical violence.  CEO’s get physically threatened Cybersecurity experts from Semperis say that over the past year,…

Hackers Breach French Military Systems, Leak 30GB of Classified Data

  A hacker group has claimed responsibility for a cyberattack targeting France’s state-owned Naval Group, one of the country’s most important military shipbuilders. The attackers say they have already released 30 gigabytes of information and are threatening to publish more,…

Akira Ransomware Wave Targets SonicWall Firewall Devices

  Cybersecurity firms report a late-July surge of Akira ransomware intrusions against SonicWall firewall devices, with evidence pointing to attackers entering via SonicWall SSL VPN connections and rapidly moving to encrypt data shortly after gaining access.  While a previously unknown…

Proton Launches New Authenticator App With Standalone Features

Proton has released Proton Authenticator, an independent, standalone 2-factor authentication (2FA) app for macOS, Windows, Android, Linux, and iOS. 2FA verification applications are offline tools that create time-based OTPs that expire within 20 seconds, and can also be used with…

Hackers Deploy Lookalike PyPI Platform to Lure Python Developers

The Python Package Index (PyPI) website is being used to launch sophisticated phishing campaigns targeting Python developers, highlighting the ongoing threats that open-source ecosystems face. The phishing campaign is utilising a counterfeit version of the website to target Python developers. …

Sharp Increase in Ransomware Incidents Hits Energy Sector

  The cyber threat landscape is constantly evolving, and ransomware attacks have increased in both scale and sophistication, highlighting how urgent it is for enterprises to take a strategic approach to cybersecurity. A survey conducted by Zscaler in 2025 found…

Hackers Tamper Govt Portal, Pocket ₹1.4 Lakh in Apprentice Stipends

  Bengaluru — A government portal designed to support apprenticeships in India has become the latest target of cybercriminals. Hackers reportedly accessed the site and changed the bank details of several registered candidates, redirecting their stipend payments into unauthorized accounts.…

French Defense Shipbuilder Naval Group Probes 1TB Data Breach

  France’s state-owned defense firm Naval Group is investigating a major cyberattack after 1TB of allegedly sensitive data was leaked on a well-known hacking forum. The company, which designs and builds naval vessels, described the incident as an attempt at…

Open-source Autoswagger Exposes API Authorisation Flaws

  Autoswagger is a free, open-source tool designed to scan OpenAPI-documented APIs for broken authorization vulnerabilities. These vulnerabilities remain common, even among organizations with strong security postures, and pose a significant risk as they can be exploited easily.  Key features…

Market Trends Reveal Urgent Emerging Cybersecurity Requirements

  During an era of unprecedented digital acceleration and hyperconnectivity, cybersecurity is no longer the sole responsibility of IT departments — it has now become a crucial strategic pillar for businesses of all sizes in an age of hyperconnectivity.  Recent…

A Massive 800% Rise in Data Breach Incidents in First Half of 2025

Cybersecurity experts have warned of a significant increase in identity-based attacks, following the revelation that 1.8 billion credentials were stolen in the first half of 2025, representing an 800% increase compared to the previous six months. Data breach attacks are…

Hackers Compromise French Submarine Engineering Company

One of the most chilling reminders of how threat landscapes are evolving even to the most fortified sectors is a major cyber breach that has hit the core of France’s naval defence ecosystem, the Naval Group. Naval Group—widely regarded as…

Ransomware Defence Begins with Fundamentals Not AI

  The era of rapid technological advancements has made it clear that artificial intelligence isn’t only influencing cybersecurity, it is fundamentally redefining its boundaries and capabilities as well. The transformation was evident at the RSA Conference in San Francisco in…

Top 5 Ways CISOs Can Shift to a Proactive Cybersecurity Strategy

  In today’s threat-filled digital ecosystem, being one step ahead of attackers is no longer a luxury—it’s a requirement. Yet, 81% of security leaders report being pushed by regulations and business needs to move toward a preventative approach, even as…

Insurance Provider Reports June Cyber Breach

  Philadelphia Indemnity Insurance Company has confirmed that customer information was exposed during a cyber incident that occurred in June. The company shared the update through a recent filing with California’s Attorney General, marking the latest in a growing number…

Hackers Stole 384 Crore From Bengaluru Cryptocurrency Firm

  In what is arguably the biggest cyberattack on an Indian cryptocurrency company, Neblio Technologies Private Limited, located in Bengaluru, was allegedly robbed off Rs. 384 crore. The company owns CoinDCX, a cryptocurrency exchange platform. The company claims that someone…

Emerging Koske Malware Leverages Visual Deception on Linux Platforms

  The new Linux malware strain, Kosk, has emerged in a striking demonstration of how artificial intelligence is being used to fight cybercrime. In a remarkable development in how cybercrime intersects with artificial intelligence, the malware uses stealthy delivery mechanisms…

Delta Airline is Using AI to Set Ticket Prices

  With major ramifications for passengers, airlines are increasingly using artificial intelligence to determine ticket prices. Now, simple actions like allowing browser cookies, accepting website agreements, or enrolling into loyalty programs can influence a flight’s price. The move to AI-driven…

Amazon’s Coding Tool Hacked — Experts Warn of Bigger Risks

  A contemporary cyber incident involving Amazon’s AI-powered coding assistant, Amazon Q, has raised serious concerns about the safety of developer tools and the risks of software supply chain attacks. The issue came to light after a hacker managed to…

World Leaks Outfit Linked to Dell Test Lab Intrusion

  Dell Technologies has acknowledged a serious security compromise affecting its Customer Solution Centers platform, the latest high-profile intrusion by the World Leaks extortion outfit.  The breach occurred earlier this month and targeted Dell’s isolated demonstration environment, which is designed…

Wi-Fi Routers Can Now Sense Movement — What That Means for You

  Your Wi-Fi router might be doing more than just providing internet access. New technology is allowing these everyday devices to detect movement inside your home without using cameras or microphones. While this might sound futuristic, it’s already being tested…

AI-Powered Malware ‘LameHug’ Attacks Windows PCs via ZIP Files

  Cybersecurity researchers have discovered a new and alarming trend in the world of online threats: “LameHug”. This malicious program distinguishes out because it uses artificial intelligence, notably large language models (LLMs) built by companies such as Alibaba.  LameHug, unlike…

SharePoint Exploit Emerges as Root of Global Cyber Threat

  A global cybersecurity crisis has been triggered by a newly discovered and unpatched vulnerability in Microsoft SharePoint Server, prompting the Governments of the United States, Canada, and Australia to conduct urgent investigations. In what experts are calling a coordinated…

Security Alert as Malware Campaign Hits Widely Used E-commerce CMS

It has been discovered that a malicious program has been launched, posing a serious threat to thousands of online retailers worldwide, as it exploits vulnerabilities in widely used content management systems. According to security researchers, the attack primarily targets platforms…

Why Policy-Driven Cryptography Matters in the AI Era

  In this modern-day digital world, companies are under constant pressure to keep their networks secure. Traditionally, encryption systems were deeply built into applications and devices, making them hard to change or update. When a flaw was found, either in…

UK Connects Stealth Malware Targeting Microsoft 365 to Russian GRU

  A series of sophisticated cyber espionage activities has been officially attributed to Russia’s military intelligence agency, the GRU, in an important development that aims to strengthen the cybersecurity of both the United Kingdom and its allied countries. On 18…

Trustwave Reveals Dark Web Travel Agencies’ Secrets

  Within the underground economy, dark web travel agencies have become one of the more sophisticated and profitable businesses.  According to the Wall Street Journal’s report on Trustwave’s findings, these shady companies use credit card fraud, compromised loyalty program accounts,…

China Hacks Seized Phones Using Advanced Forensics Tool

  There has been a significant concern raised regarding digital privacy and the practices of state surveillance as a result of an investigation conducted by mobile security firm Lookout. Police departments across China are using a sophisticated surveillance system, raising…