Several Ubuntu users reported problems installing updates and downloading packages after parts of Canonical’s infrastructure were disrupted during a Distributed Denial of Service (DDoS) attack. Canonical, the company behind the Ubuntu Linux distribution, confirmed that its online systems had…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Apple Account Data and Bluetooth Signals Tie Suspect to Crypto Robbery
The App Store ecosystem has been infiltrated by a coordinated wave of fraudulent cryptocurrency wallet applications that exploit regional platform restrictions and user trust to steal credentials from iOS users. More than two dozen malicious apps have been identified…
High Court Squashes Ban for Sim-Swap Fraud, Says Zero Customer Liability
In an important ruling amid surging digital financial fraud attacks, the Bombay HC sided with the customer protection norms. It directed Bank of Baroda to return Rs. 1.24 crore to the victim private firm that lost money in a SIM-swap…
Trusted Tools Becoming the New Cybersecurity Threat, Says Bitdefender Report
Cybersecurity threats are evolving rapidly, and according to recent findings, attackers are increasingly relying on tools that organizations already trust. In its latest analysis, Bitdefender highlighted that modern cyberattacks often resemble routine administrative activity rather than traditional malware-based intrusions.…
ShinyHunters Vimeo Data Breach Exposes Information of Over 119,000 Users
Early this year, Vimeo faced a security incident leading to the theft of personal details tied to over 119,000 people by the ShinyHunters hacking collective. Information on the leak became known via Have I Been Pwned, a service tracking…
Linux Copy Fail Vulnerability Puts Major Systems at Risk
A critical Linux kernel vulnerability known as Copy Fail is drawing urgent attention because it can let a local, unprivileged attacker gain root access on affected systems. Security researchers say the issue affects many mainstream Linux distributions and can…
Hacker Claims of Stealing Data from 8,809 Education Institutes, Instructure Hacked
A hacker has claimed to compromise edtech giant Instructure, saying it stole over 280 million records of students and staff from around 8,809 school, colleges, and online education platforms. About Instructure It is a cloud based edtech company famous for…
Critical OpenClaw Flaws Allow Persistent Access and Credential Abuse
OpenClaw, a self-hosted AI agent runtime which has gained rapid adoption by enterprises, introduces a new type of security exposure for enterprises as dynamically executed content, external skill integrations, and cloud-based authentication mechanisms are convergent without adequate defensive control…
AI-Driven Cyberattacks and Global Cybersecurity Shortages Raise Fears of an AI Bugocalypse
Artificial intelligence is rapidly transforming cyber warfare, with experts warning the world may already be entering an “AI bugocalypse.” Modern AI systems can identify hidden software flaws and weaponize them within hours — sometimes before vulnerabilities are even publicly…
Hackers Exploit cPanel Flaw to Gain Control of Thousands of Websites
Hackers are still aggressively exploiting a critical bug in cPanel and WHM, the widely used web hosting control software that powers countless websites across the internet. The flaw, tracked as CVE-2026-41940, lets attackers bypass the login screen and seize…
Instructure Confirms Data Breach as ShinyHunters Claims Responsibility
Educational technology company Instructure has confirmed that user data was compromised following a cyberattack, while the cybercriminal group ShinyHunters has claimed responsibility for the breach. The U.S.-based firm is widely recognized for developing Canvas, a popular learning management platform…
Cybersecurity Can No Longer Be Left to IT Teams Alone, Experts Warn
As cyber attacks continue to grow in frequency and complexity, organizations are facing increasing pressure to rethink who should be responsible for protecting their systems, operations, and sensitive data. Security experts say cybersecurity is no longer simply an IT…
New ChatGPT Settings Will Improve User Privacy and Data Training
Almost everyone has used ChatGPT now. Sometimes we share our personal information and files with the Chatbot. Do not feed your personal info to AI bots To be safe, users should avoid feeding personal data to the AI, as it…
MDASH AI Helps Microsoft Detect 16 Critical Windows Security Flaws
The company has reported that the MDASH framework, developed internally by Microsoft for agentic artificial intelligence, was instrumental in identifying 16 security vulnerabilities affecting core Windows networking and authentication components, including four critical vulnerabilities that can be exploited remotely. …
Indian Banks Step Up IT Spending Over AI Security Fears
Public sector banks are preparing to spend more on technology because a new wave of AI-driven cyber risk is making their existing systems look vulnerable. The main concern is Anthropic’s Claude Mythos, which has raised alarms for its ability…
Axon Police Taser and Body Camera Bluetooth Flaw Raises Officer Tracking Concerns
Australian police may unknowingly be exposing their live locations through Bluetooth-enabled devices made by Axon. Researchers discovered that body cameras and tasers used across the country broadcast signals without modern privacy protections, potentially allowing anyone nearby to detect and…
How Telecom Systems Were Used to Secretly Track Mobile Users Worldwide
A new investigation by the digital rights research group Citizen Lab has revealed how weaknesses inside global telecom infrastructure were allegedly exploited to secretly monitor mobile phone users in more than ten countries over the past three years. The findings,…
Critical Exim Flaw Exposes Email Servers to Remote Code Execution Risk
A newly discovered security vulnerability in the widely used mail transfer agent Exim has raised serious concerns among cybersecurity experts, as attackers could exploit the flaw to potentially execute malicious code remotely on vulnerable email servers. According to researchers,…
Hackers Exploit Telegram Mini Apps, Distribute Malware and Crypto Scams
Cybersecurity experts found a large-scale fraud campaign that used Telegram’s Mini App feature to launch crypto attacks, mimic famous brands and spread Android malware. FEMITBOT malware Research by CTM360 has dubbed the platform as FEMITBOT, it is based on…
Maryland’s New Grocery Pricing Rules Leave Critics Unconvinced
Despite the increasing acceptance of algorithmic pricing systems in today’s retail ecosystem, Maryland has taken action to establish the first statewide legal ban on grocery pricing that incorporates consumer surveillance data. Upon signing House Bill 895 into law on…