As one of the world’s leading AI players, DeepSeek, a chatbot application developed by the Chinese government, has been a formidable force in the artificial intelligence arena since it emerged in January 2025, launching at the top of the…
Category: CySecurity News – Latest Information Security and Hacking Incidents
German Mobile Insurance Giant Falls After Devastating Ransomware Attack
A cyberattack has brought down one of Germany’s largest phone insurance and repair networks, forcing the once-thriving Einhaus Group into insolvency. The company, which at its peak generated around €70 million in annual revenue and partnered with big names…
Russia launches messenger app “Max” that could replace WhatsApp
Russia is planning to make a “national messenger” as an alternative to social media apps like WhatsApp and Telegram. Max, a messenger app released earlier this year by the tech giant VK and supported by state media campaigns, seems to…
Pi-hole Data Breach Exposes Donor Names and Emails via GiveWP Plugin Vulnerability
Pi-hole, a well-known network-level ad-blocker, has confirmed that a security flaw in the GiveWP WordPress donation plugin exposed donor names and email addresses. Pi-hole functions as a DNS sinkhole, blocking unwanted content before it reaches users’ devices. Originally built…
FBI Alert: Avoid Scanning This QR Code on Your Phone
The FBI has issued a warning about a new scam in which cybercriminals send unsolicited packages containing a QR code to people’s homes, aiming to steal personal and financial information or install malware on their devices. These packages often…
SonicWall VPN Zero-Day Vulnerability Suspected Amid Rising Ransomware Attacks
Virtual Private Networks (VPNs) have recently been in the spotlight due to the U.K.’s Online Safety Act, which requires age verification for adult content websites. While many consumers know VPNs as tools for bypassing geo-restrictions or securing public Wi-Fi…
Cybercrime Group Claims Theft of MailChimp Client Data
The Russian-speaking cybercrime group Everest says it has stolen a large trove of data from email marketing giant Mailchimp, but the company has denied any evidence of a security incident. Everest announced the alleged breach on its dark web…
BlackSuit Ransomware Capabilities Undermined by Targeted Server Takedown
With the help of U.S Immigration and Customs Enforcement’s Homeland Security Investigations (HSI), as well as domestic and international law enforcement agencies, U.S Immigration and Customs Enforcement’s Homeland Security Investigations has dismantled the backbone of the BlackSuit ransomware group,…
Ransomware Attacks Threaten CEOs to Get Results
Ransomware gangs are getting desperate for results. Generally known for encrypting and leaking data on the internet, they have now started blackmailing CEOs with physical violence. CEO’s get physically threatened Cybersecurity experts from Semperis say that over the past year,…
Hackers Breach French Military Systems, Leak 30GB of Classified Data
A hacker group has claimed responsibility for a cyberattack targeting France’s state-owned Naval Group, one of the country’s most important military shipbuilders. The attackers say they have already released 30 gigabytes of information and are threatening to publish more,…
Akira Ransomware Wave Targets SonicWall Firewall Devices
Cybersecurity firms report a late-July surge of Akira ransomware intrusions against SonicWall firewall devices, with evidence pointing to attackers entering via SonicWall SSL VPN connections and rapidly moving to encrypt data shortly after gaining access. While a previously unknown…
Cybercrime-as-a-Service Drives Surge in Data Breaches and Stolen Credentials
The era of lone cybercriminals operating in isolation is over. In 2025, organized cybercrime groups dominate the threat landscape, leveraging large-scale operations and sophisticated tools to breach global organizations. Recent intelligence from Flashpoint reveals a troubling surge in cyberattacks…
How Age Verification Measures Are Endangering Digital Privacy in the UK
A pivotal moment in the regulation of the digital sphere has been marked by the introduction of the United Kingdom’s Online Safety Act in July 2025. With the introduction of this act, strict age verification measures have been implemented to…
Russia’s Turla Hackers Are Using Local ISPs to Deliver Spyware to Diplomats
One of Russia’s most sophisticated cyberespionage groups has reportedly been leveraging its country’s internet backbone to deploy spyware—right on its home turf. Turla, a hacking unit tied to Russia’s Federal Security Service (FSB), is known for complex and covert…
Dollar Tree Refutes Cyberattack Claim, Says Leaked Data Belongs to Another Company
Discount retail chain Dollar Tree has denied being the target of a recent cyberattack, following claims by a ransomware group that it stole sensitive company files. According to Dollar Tree, the data allegedly leaked online does not belong to…
Proton Launches New Authenticator App With Standalone Features
Proton has released Proton Authenticator, an independent, standalone 2-factor authentication (2FA) app for macOS, Windows, Android, Linux, and iOS. 2FA verification applications are offline tools that create time-based OTPs that expire within 20 seconds, and can also be used with…
Hackers Deploy Lookalike PyPI Platform to Lure Python Developers
The Python Package Index (PyPI) website is being used to launch sophisticated phishing campaigns targeting Python developers, highlighting the ongoing threats that open-source ecosystems face. The phishing campaign is utilising a counterfeit version of the website to target Python developers. …
Racing Ahead with AI, Companies Neglect Governance—Leading to Costly Breaches
Organizations are deploying AI at breakneck speed—so rapidly, in fact, that foundational safeguards like governance and access controls are being sidelined. The 2025 IBM Cost of a Data Breach Report, based on data from 600 breached companies, finds that…
Ridgefield Public Schools Faces 2-day Deadline After Hackers Threaten to Leak 90 GB of Stolen Data
Ridgefield Public Schools in Connecticut was hit by a ransomware attack on July 24, 2025, with the SafePay ransomware gang now threatening to release 90 GB of stolen data within two days if ransom demands aren’t met. The school…
DevilsTongue Spyware Attacking Windows System, Linked to Saudi Arabia, Hungary
Cybersecurity experts have discovered a new infrastructure suspected to be used by spyware company Candiru to target computers via Windows malware. DevilsTongue spyware targets Windows systems The research by Recorded Future’s Insikt Group disclosed eight different operational clusters associated with…
Allianz Life Confirms Data Breach Affecting 1.4 Million Customers in North America
Allianz Life Insurance Company of North America has confirmed a significant data breach that compromised the personal information of a majority of its 1.4 million U.S. customers. The breach, discovered in mid-July, involved sensitive data including names, addresses, dates…
Hackers Use 4G-Connected Raspberry Pi to Breach Bank’s ATM Network
A cybercriminal group has used a surprising method to infiltrate a bank’s internal systems, by planting a tiny Raspberry Pi computer inside the bank’s network. The attackers reportedly used the device to gain access to critical parts of the…
UK’S Online Safety Act Faces Criticism, Doesn’t Make Children Safer Online
The implementation of a new law to protect the online safety of children in the UK has caught criticism from digital rights activist groups, politicians, free-speech campaigners, tech companies, content creators, digital rights advocacy groups, and others. The Online Safety…
SafePay Ransomware Threaten Public Disclosure of 3.5 TB Worth of Ingram Micro Files
Ingram Micro, one of the world’s largest IT distributors, is facing a data leak threat from the SafePay ransomware group almost a month after the initial attack. The SafePay group has claimed to have stolen 3.5TB of data from…
Sharp Increase in Ransomware Incidents Hits Energy Sector
The cyber threat landscape is constantly evolving, and ransomware attacks have increased in both scale and sophistication, highlighting how urgent it is for enterprises to take a strategic approach to cybersecurity. A survey conducted by Zscaler in 2025 found…
Veeam Fixes Critical Remote Code Execution Bug in Backup & Replication Software
Veeam has issued new security patches to address multiple vulnerabilities in its Backup & Replication (VBR) software, including a severe remote code execution (RCE) flaw. Identified as CVE-2025-23121, this particular vulnerability was uncovered by researchers from watchTowr and CodeWhite…
Hackers Tamper Govt Portal, Pocket ₹1.4 Lakh in Apprentice Stipends
Bengaluru — A government portal designed to support apprenticeships in India has become the latest target of cybercriminals. Hackers reportedly accessed the site and changed the bank details of several registered candidates, redirecting their stipend payments into unauthorized accounts.…
Allianz Life Data Breach Exposes Personal Information of 1.4 Million Customers
Allianz Life Insurance has disclosed a major cybersecurity breach that exposed the personal details of approximately 1.4 million individuals. The breach was detected on July 16, 2025, and the company reported the incident to the Maine Attorney General’s office…
French Defense Shipbuilder Naval Group Probes 1TB Data Breach
France’s state-owned defense firm Naval Group is investigating a major cyberattack after 1TB of allegedly sensitive data was leaked on a well-known hacking forum. The company, which designs and builds naval vessels, described the incident as an attempt at…
St. Paul Extends State of Emergency After Devastating Cyberattack
August 5, 2025 | St. Paul, Minnesota The City of St. Paul is in the midst of one of the most disruptive cyber incidents in its history, prompting officials to extend a local state of emergency by 90 days as…
Understanding Opera’s Free VPN: Features, Privacy, and Limitations
Over recent years, Virtual Private Networks (VPNs) have surged in popularity as users look to bypass online censorship, secure their data, and access restricted content. Leading names like ProtonVPN, NordVPN, ExpressVPN, and Surfshark are often the go-to tools —…
Cybercriminals Exploit Unprecedented Data Exposure in 141 Million File Leak
Digital transformation has transformed cybersecurity from a technical safeguard to a strategic imperative for business continuity, consumer trust, and national security, particularlyin an era wofrapid digital transformation With the rise of digital infrastructure and the advent of data as the…
Mozilla Alerts Extension Developers About Phishing Scam on Add-ons Platform
Mozilla has issued a warning to developers who publish browser extensions on its official platform, addons.mozilla.org (AMO), about a new phishing campaign targeting their accounts. The attackers are reportedly sending emails that falsely claim to be from the Mozilla…
Open-source Autoswagger Exposes API Authorisation Flaws
Autoswagger is a free, open-source tool designed to scan OpenAPI-documented APIs for broken authorization vulnerabilities. These vulnerabilities remain common, even among organizations with strong security postures, and pose a significant risk as they can be exploited easily. Key features…
Lock Down Your USB Drive: 5 Powerful Ways to Keep Your Data Safe
In a world where we lock our phones, PCs, and even smart fridges, it’s surprising how many people still overlook the security of something as portable and vulnerable as a USB drive. A lost thumbstick can quickly turn into…
Shuyal Malware Targets 19 Browsers with Advanced Data Theft and Evasion Capabilities
A newly discovered infostealing malware named “Shuyal” has entered the cyber threat landscape, posing a serious risk to users by targeting a wide range of web browsers and deploying sophisticated evasion methods. Identified by researchers at Hybrid Analysis, Shuyal…
Market Trends Reveal Urgent Emerging Cybersecurity Requirements
During an era of unprecedented digital acceleration and hyperconnectivity, cybersecurity is no longer the sole responsibility of IT departments — it has now become a crucial strategic pillar for businesses of all sizes in an age of hyperconnectivity. Recent…
Vietnam Launches NDAChain for National Data Security and Digital Identity
Vietnam has launched NDAChain, a new blockchain network that allows only approved participants to join. The move is aimed at locking down Vietnam’s government data. About NDAChain The network is built by the National Data Association and managed by the…
A Massive 800% Rise in Data Breach Incidents in First Half of 2025
Cybersecurity experts have warned of a significant increase in identity-based attacks, following the revelation that 1.8 billion credentials were stolen in the first half of 2025, representing an 800% increase compared to the previous six months. Data breach attacks are…
Amazon Customers Face Surge in Phishing Attacks Through Fake Emails and Texts
Cybercriminals are actively targeting Amazon users with a sharp increase in phishing scams, and the company is sounding the alarm. Fraudsters are sending deceptive emails that appear to originate from Amazon, prompting users to log in via a counterfeit…
Here’s Why We Need Child Influencer Laws in a Monetised Content Society
The increasing urgency around safeguarding children who are featured as influencers or content creators online is a concerning trend that has grown rapidly in recent years. Earlier, U.S. child labor laws like the Coogan Law were designed to protect…
Amazon Accounts Targeted by New Phishing Scam — Here’s How to Stay Safe
A wave of phishing scams is currently targeting Amazon users, putting millions of accounts at risk. Criminals are sending fake emails and text messages that appear to come from Amazon, tricking users into clicking on links that lead to fraudulent…
Hackers Compromise French Submarine Engineering Company
One of the most chilling reminders of how threat landscapes are evolving even to the most fortified sectors is a major cyber breach that has hit the core of France’s naval defence ecosystem, the Naval Group. Naval Group—widely regarded as…
AI-supported Cursor IDE Falls Victim to Prompt Injection Attacks
Experts have found a bug called CurXecute that is present in all variants of the AI-supported code editor Cursor and can be compromised to run remote code execution (RCE), along with developer privileges. About the bug The security bug is…
Misconfigured Firewalls Plague Enterprises, Exposing Critical Security Gaps
In a troubling revelation for enterprise cybersecurity, a new report from FireMon has found that 60% of corporate firewalls fail critical compliance checks right out of the gate, raising alarms over the state of firewall governance in modern organisations. An…
Luxembourg Probes Cyberattack Behind Telecom Outage, Cites “Exceptionally Sophisticated” Assault
The Luxembourg government has launched a formal investigation into a major nationwide telecom outage that occurred on July 23, following what officials say was a deliberate cyberattack. The disruption, which lasted over three hours, knocked out the country’s 4G…
FBI Warns Chrome Users Against Unofficial Updates Downloading
If you use Windows, Chrome is likely to be the default browser. Despite Microsoft’s ongoing efforts to lure users to the Edge and the rising threat of AI browsers, Google’s browser remains dominant. However, Chrome is a victim of…
Ransomware Defence Begins with Fundamentals Not AI
The era of rapid technological advancements has made it clear that artificial intelligence isn’t only influencing cybersecurity, it is fundamentally redefining its boundaries and capabilities as well. The transformation was evident at the RSA Conference in San Francisco in…
Singapore Companies Struggle to Recover from Ransomware Despite Paying Hackers
Many businesses in Singapore continue to face prolonged and expensive recovery periods after ransomware attacks, even when they choose to pay the ransom. A new report from cybersecurity firm Sophos reveals that 50% of local organizations affected by ransomware…
Wi-Fi Signals Can Now Identify You Without Devices or Cameras, Raising New Privacy Fears
A new technology developed by researchers at La Sapienza University of Rome could transform how individuals are identified in connected environments and reignite urgent debates over privacy. In a breakthrough that bypasses traditional biometrics, the research team has demonstrated…
Top 5 Ways CISOs Can Shift to a Proactive Cybersecurity Strategy
In today’s threat-filled digital ecosystem, being one step ahead of attackers is no longer a luxury—it’s a requirement. Yet, 81% of security leaders report being pushed by regulations and business needs to move toward a preventative approach, even as…
Insurance Provider Reports June Cyber Breach
Philadelphia Indemnity Insurance Company has confirmed that customer information was exposed during a cyber incident that occurred in June. The company shared the update through a recent filing with California’s Attorney General, marking the latest in a growing number…
Hackers Stole 384 Crore From Bengaluru Cryptocurrency Firm
In what is arguably the biggest cyberattack on an Indian cryptocurrency company, Neblio Technologies Private Limited, located in Bengaluru, was allegedly robbed off Rs. 384 crore. The company owns CoinDCX, a cryptocurrency exchange platform. The company claims that someone…
How to Stay Safe on Public Wi-Fi: Myths, Real Risks, and Smart Habits
Many people view public Wi-Fi as an open invitation for hackers to steal their personal data, but this perception isn’t entirely accurate. While using Wi-Fi in public places such as cafés, airports, or hotels does come with certain cybersecurity…
Emerging Koske Malware Leverages Visual Deception on Linux Platforms
The new Linux malware strain, Kosk, has emerged in a striking demonstration of how artificial intelligence is being used to fight cybercrime. In a remarkable development in how cybercrime intersects with artificial intelligence, the malware uses stealthy delivery mechanisms…
Don’t Wait for a Cyberattack to Find Out You’re Not Ready
In today’s digital age, any company that uses the internet is at risk of being targeted by cybercriminals. While outdated software and unpatched systems are often blamed for these risks, a less obvious but equally serious problem is the…
Delta Airline is Using AI to Set Ticket Prices
With major ramifications for passengers, airlines are increasingly using artificial intelligence to determine ticket prices. Now, simple actions like allowing browser cookies, accepting website agreements, or enrolling into loyalty programs can influence a flight’s price. The move to AI-driven…
Why Web3 Exchanges Must Prioritize Security, Privacy, and Fairness to Retain Users
In the evolving Web3 landscape, a platform’s survival hinges on its ability to meet community expectations. If users perceive an exchange as unfair, insecure, or intrusive, they’ll swiftly move on. This includes any doubts about the platform’s transparency, ability…
CoinDCX Suffers Rs 380 Crore Crypto Theft Linked to Insider Involvement
An important development underlining the growing threat of insider cybercrime has occurred in Bengaluru, when police arrested a software engineer who was suspected of committing a massive cryptocurrency heist that defrauded CoinDCX of approximately Rs 379 crore. Agarwal, a…
Malware Discovered in Endgame Gear Gaming Mouse Tool: Company Investigates, Assures Data Safety
A configuration utility designed for an Endgame Gear gaming mouse was recently found to have been compromised with malware, raising concerns among users and prompting a swift response from the company. Endgame Gear issued a public alert on Wednesday…
Amazon’s Coding Tool Hacked — Experts Warn of Bigger Risks
A contemporary cyber incident involving Amazon’s AI-powered coding assistant, Amazon Q, has raised serious concerns about the safety of developer tools and the risks of software supply chain attacks. The issue came to light after a hacker managed to…
UK Government Proposes Mandatory Reporting of Ransomware Attacks
The British government’s proposals to amend its ransomware strategy marked a minor milestone on Tuesday, when the Home Office issued its formal answer to a survey on modifying the law, but questions remain regarding the effectiveness of the measures. …
Emerging Threat Uses Windows Tools to Facilitate Banking Credential Theft
An alarming development that underscores how financial cybercrime is evolving is a Windows-based banking trojan dubbed Coyote. It has been observed for the first time that a malware strain leveraging the Microsoft UI Automation (UIA) framework for stealthy extraction of…
CISA Urges Immediate Patching of Critical SysAid Vulnerabilities Amid Active Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert about two high-risk vulnerabilities in SysAid’s IT service management (ITSM) platform that are being actively exploited by attackers. These security flaws, identified as CVE-2025-2775 and CVE-2025-2776, can…
ICAR Suffers Major Cyberattack: Recruitment and Research Data Compromised in National Breach
In a major cybersecurity incident this April, the Indian Council of Agricultural Research (ICAR) — the apex body managing agricultural education and research nationwide — fell victim to a serious data breach. The cyberattack targeted ICAR’s central website, its…
Cyberattack on EC-Ship Platform Exposes Personal Data of Thousands
Hong Kong, China — A recent cyberattack on Hongkong Post’s online mailing system has resulted in a major data breach affecting tens of thousands of users. According to officials, the hacker managed to access sensitive contact information from the EC-Ship…
SABO Fashion Brand Exposes 3.5 Million Customer Records in Major Data Leak
Australian fashion retailer SABO recently faced a significant data breach that exposed sensitive personal information of millions of customers. The incident came to light when cybersecurity researcher Jeremiah Fowler discovered an unsecured database containing over 3.5 million PDF documents,…
Chinese Government Launches National Cyber ID Amid Privacy Concerns
China’s national online ID service went into effect earlier this month with the promise of improving user privacy by limiting the amount of data collected by private-sector companies. However, the measures have been criticised by privacy and digital rights…
Securing Service Accounts to Prevent Kerberoasting in Active Directory
As the cornerstone of enterprise IT ecosystems for identity and access management, Active Directory (AD) continues to serve as its pillar of support. It has been trusted to handle centralised authentication and authorisation processes for decades, enabling organisations to…
New Coyote Malware Variant Exploits Windows Accessibility Tool for Data Theft
A recently observed version of the banking malware known as Coyote has begun using a lesser-known Windows feature, originally designed to help users with disabilities, to gather sensitive information from infected systems. This marks the first confirmed use of…
World Leaks Outfit Linked to Dell Test Lab Intrusion
Dell Technologies has acknowledged a serious security compromise affecting its Customer Solution Centers platform, the latest high-profile intrusion by the World Leaks extortion outfit. The breach occurred earlier this month and targeted Dell’s isolated demonstration environment, which is designed…
Startup Sells Stolen Personal Data Online for $50, Raising Alarms Over Privacy and Ethics
A new controversy is brewing over a U.S.-based startup accused of making stolen personal data widely accessible—for as little as $50. Farnsworth Intelligence, founded by 23-year-old Aidan Raney, is openly marketing a product called “Infostealers,” which allows customers to…
Bitcoin Encryption Faces Future Threat from Quantum Breakthroughs
In light of the rapid evolution of quantum computing, it has become much more than just a subject for academic curiosity—it has begun to pose a serious threat to the cryptographic systems that secure digital currencies such as Bitcoin,…
Wi-Fi Routers Can Now Sense Movement — What That Means for You
Your Wi-Fi router might be doing more than just providing internet access. New technology is allowing these everyday devices to detect movement inside your home without using cameras or microphones. While this might sound futuristic, it’s already being tested…
AI-Powered Malware ‘LameHug’ Attacks Windows PCs via ZIP Files
Cybersecurity researchers have discovered a new and alarming trend in the world of online threats: “LameHug”. This malicious program distinguishes out because it uses artificial intelligence, notably large language models (LLMs) built by companies such as Alibaba. LameHug, unlike…
UK Army Probes Leak of Special Forces Identities in Grenadier Guards Publication
The British Army has initiated an urgent investigation following the public exposure of sensitive information identifying members of the UK Special Forces. General Sir Roly Walker, Chief of the General Staff, has directed a comprehensive review into how classified…
SharePoint Exploit Emerges as Root of Global Cyber Threat
A global cybersecurity crisis has been triggered by a newly discovered and unpatched vulnerability in Microsoft SharePoint Server, prompting the Governments of the United States, Canada, and Australia to conduct urgent investigations. In what experts are calling a coordinated…
Stop! Don’t Let That AI App Spy on Your Inbox, Photos, and Calls
Artificial intelligence is now part of almost everything we use — from the apps on your phone to voice assistants and even touchscreen menus at restaurants. What once felt futuristic is quickly becoming everyday reality. But as AI gets…
AI-Driven Phishing Threats Loom After Massive Data Breach at Major Betting Platforms
A significant data breach impacting as many as 800,000 users from two leading online betting platforms has heightened fears over sophisticated phishing risks and the growing role of artificial intelligence in exploiting compromised personal data. The breach, confirmed by…
Patient Care Technology Disruptions Linked With the CrowdStrike Outage, Study Finds
A little more than a year ago, nearly 8.5 million Windows-based IT systems went down due to a simple error made during a routine software update. Computers were unable to reboot for several hours due to a bug from…
Security Alert as Malware Campaign Hits Widely Used E-commerce CMS
It has been discovered that a malicious program has been launched, posing a serious threat to thousands of online retailers worldwide, as it exploits vulnerabilities in widely used content management systems. According to security researchers, the attack primarily targets platforms…
Chinese Hacker Group Salt Typhoon Breaches U.S. National Guard Network for Nine Months
An elite Chinese cyber-espionage group known as Salt Typhoon infiltrated a U.S. state’s Army National Guard network for nearly nine months, according to a classified Pentagon report revealed in a June Department of Homeland Security (DHS) memo. The memo,…
Why Policy-Driven Cryptography Matters in the AI Era
In this modern-day digital world, companies are under constant pressure to keep their networks secure. Traditionally, encryption systems were deeply built into applications and devices, making them hard to change or update. When a flaw was found, either in…
Romanian Arrested in Diskstation Ransomware Operation Targeting Synology NAS Devices
A 44-year-old Romanian national has been arrested as part of a coordinated international law enforcement effort to take down the cybercriminal group behind the Diskstation ransomware campaign. This group is known for targeting Synology Network-Attached Storage (NAS) devices, which…
LameHug Malware Crafts Real-Time Windows Data-Theft Commands Using AI LLM
LameHug, a novel malware family, generates commands for execution on compromised Windows systems using a large language model (LLM). Russia-backed threat group APT28 (also known as Sednit, Sofacy, Pawn Storm, Fancy Bear, STRONTIUM, Tsar Team, and Forest Blizzard) was…
UK Connects Stealth Malware Targeting Microsoft 365 to Russian GRU
A series of sophisticated cyber espionage activities has been officially attributed to Russia’s military intelligence agency, the GRU, in an important development that aims to strengthen the cybersecurity of both the United Kingdom and its allied countries. On 18…
Sensitive Records of Over 1 Million People Exposed by U.S. Adoption Organization
A large scale data exposure incident has come to light involving the Gladney Center for Adoption, a U.S.-based non-profit that helps connect children with adoptive families. According to a cybersecurity researcher, an unsecured database containing over a million sensitive…
How Tech Democratization Is Helping SMBs Tackle 2025’s Toughest Challenges
Small and medium-sized businesses (SMBs) are entering 2025 grappling with familiar hurdles: tight budgets, economic uncertainty, talent shortages, and limited cybersecurity resources. A survey of 300 decision-makers highlights how these challenges are pushing SMBs to seek smarter, more affordable…
Here’s How Everyday Tech Is Being Weaponized to Deploy Trojan
The technology that facilitates your daily life, from the smartphone in your hand to the car in your garage, may simultaneously be detrimental to you. Once the stuff of spy thrillers, consumer electronics can today be used as tools…
Zimperium Warns of Rising Mobile Threats Over Public WiFi During Summer Travel
Public WiFi safety continues to be a contentious topic among cybersecurity professionals, often drawing sarcastic backlash on social media when warnings are issued. However, cybersecurity firm Zimperium has recently cautioned travelers about legitimate risks associated with free WiFi networks,…
Core Cryptographic Technique Compromised Putting Blockchain Security at Risk
The concept of randomness is often regarded as a cornerstone of fairness, security, and predictability in both physical and digital environments. Randomness must be used to ensure impartiality, protect sensitive information, and ensure integrity, whether it is determining which…
Legal Battle Over Meta’s AI Training Likely to Reach Europe’s Top Court
The ongoing debate around Meta’s use of European data to train its artificial intelligence (AI) systems is far from over. While Meta has started training its large language models (LLMs) using public content from Facebook and Instagram, privacy regulators…
Armenian Man Extradited to US After Targeting Oregon Tech Firm
The Justice Department said Wednesday last week that an Armenian national is in federal custody on charges related to their alleged involvement in a wave of Ryuk ransomware attacks in 2019 and 2020. On June 18, Karen Serobovich Vardanyan,…
Dell Confirms Breach of Demo Platform by WorldLeaks-Linked Hackers, No Sensitive Data Compromised
Dell Technologies has confirmed that one of its internal platforms used for showcasing products was recently accessed by a hacker. The company assured that no sensitive or customer-related data was exposed during the incident. In an official statement to…
Belk Hit by Ransomware Attack as DragonForce Claims Responsibility for Data Breach
The department store chain Belk recently became the target of a ransomware attack, with the hacking group DragonForce taking responsibility for the breach. The cybercriminals claim to have stolen 156 GB of sensitive data from the company’s systems in…
Scattered Spider Broadens Attack Techniques in Latest Cyber Incidents
Known by aliases such as UNC3944, Scatter Swine, and Muddled Libra, Scatter Spider is an extremely persistent and adaptable cybercriminal group focused on financial gain. In the current cyber threat environment, the Scatter Spider group stands out as one…
Sensitive AI Key Leak : A Wave of Security Concerns in U.S. Government Circles
A concerning security mistake involving a U.S. government employee has raised alarms over how powerful artificial intelligence tools are being handled. A developer working for the federal Department of Government Efficiency (DOGE) reportedly made a critical error by accidentally…
Trustwave Reveals Dark Web Travel Agencies’ Secrets
Within the underground economy, dark web travel agencies have become one of the more sophisticated and profitable businesses. According to the Wall Street Journal’s report on Trustwave’s findings, these shady companies use credit card fraud, compromised loyalty program accounts,…
China Hacks Seized Phones Using Advanced Forensics Tool
There has been a significant concern raised regarding digital privacy and the practices of state surveillance as a result of an investigation conducted by mobile security firm Lookout. Police departments across China are using a sophisticated surveillance system, raising…
Hackers Exploit End-of-Life SonicWall Devices Using Overstep Malware and Possible Zero-Day
Cybersecurity experts from Google’s Threat Intelligence Group (GTIG) have uncovered a series of attacks targeting outdated SonicWall Secure Mobile Access (SMA) devices, which are widely used to manage secure remote access in enterprise environments. These appliances, although no longer…