Security researchers have dismantled a substantial portion of the infrastructure powering the Kimwolf and Aisuru botnets, cutting off communication to more than 550 command-and-control servers used to manage infected devices. The action was carried out by Black Lotus Labs,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
AI Agent Integration Can Become a Problem in Workplace Operations
AI agents were considered harmless sometime ago. They did what they were supposed to do: write snippets of code, answer questions, and help users in doing things faster. Then business started expecting more. Slowly, companies started using organizational agents over…
Russia-Linked Lynx Gang Claims Ransomware Attack on CSA Tax & Advisory
A breach surfaces in Haverhill – CSA Tax & Advisory, a name among local finance offices, stands at the center. Information about clients, personal and business alike, may have slipped out. A digital crew tied to Russia, calling themselves…
Google Appears to Be Preparing Gemini Integration for Chrome on Android
Google appears to be testing a new feature that could significantly change how users browse the web on mobile devices. The company is reportedly experimenting with integrating its AI model, Gemini, directly into Chrome for Android, enabling advanced agentic…
Korean Air Employee Data Exposed in Cl0p Ransomware Supply-Chain Attack
Korean Air has acknowledged the theft of sensitive data belonging to 30,000 current and former employees in a serious data breach. The breach occurred via a supply-chain compromise at KC&D Service, the airline’s former catering subsidiary. Hackers exploited a…
Ongoing Web Skimming Operation Quietly Harvests Payment Data From Online Stores
Cybersecurity analysts have identified a sophisticated web skimming operation that has been running continuously since early 2022, silently targeting online checkout systems. The campaign focuses on stealing payment card information and is believed to affect businesses that rely on…
ChatGPT Prepares Cross-Platform Expansion With Project Agora
It appears that OpenAI is quietly setting the foundation for its next significant product evolution, as early technical signals indicate the development of a new cross-platform initiative that is internally codenamed “Agora” and promises to be the next major step…
PHALT#BLYX Malware Campaign Targets European Hotels With Fake Booking Emails
A fresh wave of digital threats emerged just after Christmas 2025, aimed squarely at European lodging spots. Instead of random attacks, it used clever email tricks made to look like they came from Booking.com. Staff members got messages that…
EOCC Hit by Security Breach Due to Contractor’s Unauthorised Access
The Equal Employment Opportunity Commission (EOCC) was hit by an internal security data breach that happened last year. The incident involved a contractor’s employees exploiting sensitive data in an agency’s systems. About the breach The breach happened in EEOC’s Public…
VoidLink Malware Poses Growing Risk to Enterprise Linux Cloud Deployments
A new cybersecurity threat has emerged beneath the surface of the modern digital infrastructure as organizations continue to increase their reliance on cloud computing. Researchers warn that a subtle but dangerous shift is occurring beneath the surface. According to…
Here’s How AI is Revolutionizing Indian Cinema
Indian cinema is setting the pace for the use of AI across the globe, beating Hollywood’s cautious approach to the emergence of the new technology. With the aid of tools like Midjourney and ChatGPT, filmmakers are now able to…
This Built-In Android and iPhone Feature Lets You Share Your Phone Safely
Handing your phone to someone, even briefly, can expose far more than intended. Whether it is to share a photo, allow a quick call, or let a child watch a video, unrestricted access can put personal data at risk.…
Man Sentenced to Seven Years for Hacking Port IT Systems to Enable Drug Imports
A Dutch appeals court has sentenced a 44-year-old man to seven years in prison for his involvement in cyber intrusions targeting major European ports and for using those breaches to support drug trafficking operations. The ruling was issued by…
n8n Supply Chain Attack Exploits Community Nodes In Google Ads Integration to Steal Tokens
Hackers were found uploading a set of eight packages on the npm registry that pretended as integrations attacking the n8n workflow automation platform to steal developers’ OAuth credentials. About the exploit The package is called “n8n-nodes-hfgjf-irtuinvcm-lasdqewriit”, it copies Google Ads…
FBI Flags Kimsuky’s Role in Sophisticated Quishing Attacks
A new warning from the US Federal Bureau of Investigation indicates that spearphishing tactics are being advanced by a cyber espionage group linked to North Korea known as Kimsuky, also known as APT43, in recent months. As the threat…
Anthropic Launches “Claude for Healthcare” to Help Users Better Understand Medical Records
Anthropic has joined the growing list of artificial intelligence companies expanding into digital health, announcing a new set of tools that enable users of its Claude platform to make sense of their personal health data. The initiative, titled Claude…
Google Issues Urgent Privacy Warning for 1.5 Billion Photos Users
Google has issued a critical privacy alert for its 1.5 billion Google Photos users following accusations of using personal images to train AI models without consent. The controversy erupted from privacy-focused rival Proton, which speculated that Google’s advanced Nano…
AsyncRAT Campaign Abuses Cloudflare Services to Hide Malware Operations
Cybercriminals distributing the AsyncRAT remote access trojan are exploiting Cloudflare’s free-tier services and TryCloudflare tunneling domains to conceal malicious infrastructure behind widely trusted platforms. By hosting WebDAV servers through Cloudflare, attackers are able to mask command-and-control activity, making detection…
Instagram Refutes Breach Allegations After Claims of 17 Million User Records Circulating Online
Instagram has firmly denied claims of a new data breach following reports that personal details linked to more than 17 million accounts are being shared across online forums. The company stated that its internal systems were not compromised and…
GoBruteforcer Botnet Targets Linux Servers with Brute-Force Attacks
A dangerous botnet called GoBruteforcer is ramping up brute-force attacks on internet-exposed Linux servers, focusing on services like FTP, MySQL, PostgreSQL, and phpMyAdmin. Check Point Research (CPR) warns that over 50,000 servers remain vulnerable due to weak credentials and…