A dangerous botnet called GoBruteforcer is ramping up brute-force attacks on internet-exposed Linux servers, focusing on services like FTP, MySQL, PostgreSQL, and phpMyAdmin. Check Point Research (CPR) warns that over 50,000 servers remain vulnerable due to weak credentials and…
Category: CySecurity News – Latest Information Security and Hacking Incidents
California Privacy Regulator Fines Datamasters for Selling Sensitive Consumer Data Without Registration
The California Privacy Protection Agency (CalPrivacy) has taken enforcement action against Datamasters, a marketing firm operated by Rickenbacher Data LLC, for unlawfully selling sensitive personal and health-related data without registering as a data broker. The Texas-based company was found…
Europol Cracks Down Gang Responsible for Cyber Crime Worth Billions
Europol’s joint operation to crackdown international gang Europol recently arrested 34 people in Spain who are alleged to have a role in a global criminal gang called Black Axe. The operation was conducted by Spanish National Police and Bavarian State…
BreachForums Database Breach Exposes Details of Over 324K User Accounts
The newest version of the infamous BreachForums cybercrime marketplace has reportedly experienced another security lapse, with its user database table appearing online. BreachForums refers to a succession of underground hacking forums commonly used for buying, selling, and leaking stolen…
APT28 Intensifies Cyber Espionage Targeting Energy Infrastructure and Policy Groups
One of Russia’s most prolific cyber espionage groups has operated largely in the shadows for more than two decades, quietly shaping the global threat landscape by carrying out persistent and highly targeted digital intrusions using techniques that have been…
LangChain Security Issue Puts AI Application Data at Risk
A critical security vulnerability has been identified in LangChain’s core library that could allow attackers to extract sensitive system data from artificial intelligence applications. The flaw, tracked as CVE-2025-68664, affects how the framework processes and reconstructs internal data, creating…
Trust Wallet Browser Extension Hacked, $7 Million Stolen
Users of the Binance-owned Trust wallet lost more than $7 million after the release of an updated chrome extension. Changpenng Zhao, company co-founder said that the company will cover the stolen money of all the affected users. Crypto investigator ZachXBT…
Epstein Files Redaction Failure Exposes Risks of Improper PDF Sanitization
The United States Department of Justice recently released a new set of documents related to the Jeffrey Epstein investigation, drawing widespread attention after it emerged that some redacted information could be easily uncovered. On December 22, the department published…
Chinese Hacking Group Breaches Email Systems Used by Key U.S. House Committees: Report
A cyber espionage group believed to be based in China has reportedly gained unauthorized access to email accounts used by staff working for influential committees in the U.S. House of Representatives, according to a report by the Financial Times…
Critical MongoDB Flaw Allows Unauthenticated Memory Data Leaks
A critical security flaw in MongoDB could allow unauthenticated attackers to extract sensitive data directly from server memory, prompting urgent patching warnings from security researchers and the database vendor. The vulnerability, tracked as CVE-2025-14847, affects MongoDB’s implementation of zlib…
Phishing Network Exploits e-Challan System to Target Indian Vehicle Owners
India has developed a digital traffic enforcement ecosystem that has become more deeply integrated into everyday life, this means that cybercriminals are increasingly exploiting both the public’s faith in government systems to perpetrate large-scale financial fraud on the country’s…
NtKiller Tool Boasts AV/EDR Evasion on Dark Web
A threat actor dubbed AlphaGhoul has now begun to push NtKiller-a perilous tool-on the dark web forums, claiming it silently kills antivirus software and bypasses endpoint detection and response systems. As a malware loader, this tool targets popular security…
EEOC Confirms Internal Data Incident Linked to Contractor Misuse of System Access
The U.S. Equal Employment Opportunity Commission has disclosed that it was affected by a data security incident involving a third-party contractor, after improper access to an internal system raised concerns about the handling of sensitive public information. The agency…
France Postal and Banking Services Disrupted by Suspected DDoS Cyberattack
France’s national postal and banking services faced major disruption following a suspected distributed denial-of-service (DDoS) attack that affected key digital systems. La Poste, the country’s postal service, described the incident as a significant network issue that impacted all of…
Salesforce Pulls Back from AI LLMs Citing Reliability Issues
Salesforce, a famous enterprise software company, is withdrawing from its heavy dependence on large language models (LLMs) after facing reliability issues that the executive didn’t like. The company believes that trust in AI LLMs has declined in the past year,…
US Shuts Down Web3AdspAnels Platform Used in Large-Scale Bank Account Cyber Thefts
US authorities have taken down an online platform allegedly used by cybercriminals to gain unauthorized access to Americans’ bank accounts. Visitors attempting to access web3adspanels.org are now met with a law enforcement seizure notice. Investigators say the site played…
Amazon Thwarts 1,800+ North Korean Job Scams with AI and Tiny Clues
Amazon’s chief security officer, Stephen Schmidt, revealed how the company blocked over 1,800 suspected North Korean operatives from securing remote IT jobs since April 2024. These agents aimed to funnel salaries back to Pyongyang’s weapons programs, bypassing sanctions through…
AI Experiment Raises Questions After System Attempts to Alert Federal Authorities
An ongoing internal experiment involving an artificial intelligence system has surfaced growing concerns about how autonomous AI behaves when placed in real-world business scenarios. The test involved an AI model being assigned full responsibility for operating a small vending…
WhatsApp-Based Worm Drives Rapid Expansion of Astaroth Malware in Brazil
After being exposed to a new and more aggressive distribution campaign involving the Astaroth banking trojan, which is a long-standing malware strain known for targeting financial users in the country, the cyber threat landscape in Brazil is once again coming…
New Shai Hulud Malware Variant Turns Developers Into Supply Chain Attack Vectors, Expel Warns
A newly released report from managed detection and response firm Expel Inc. reveals an advanced variant of the Shai Hulud malware, highlighting how software supply chain attacks are moving beyond isolated malicious packages to large-scale, self-spreading campaigns that exploit…