A recent investigation by Cybernews has uncovered a staggering 30 separate online datasets containing approximately 16 billion stolen login credentials from services including Apple, Google, and Facebook. These data dumps, discovered through open sources, appear to be the result…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Researchers Advise Caution as Veeam Releases Patch to Fix Critical Vulnerability
Following Veeam Backup & Replication’s Tuesday patch release to patch a critical remote code execution vulnerability, researchers are advising customers to ensure their systems are completely upgraded to the latest version. An authorised domain user can execute code on…
Israel Iran Crisis Fuels Surge in State Backed Cyberattacks
As Israeli and Iranian forces engaged in a conventional military exchange on June 13, 2025, the conflict has rapidly escalated into a far more complex and multi-faceted conflict that is increasingly involving a slew of coordinated cyberattacks against a…
Air India Express Flight Returns Mid-Air After Suspected GPS Spoofing Near Jammu Border
In an unusual and concerning incident, an Air India Express flight en route from Delhi to Jammu was forced to return to Indira Gandhi International Airport on Monday due to suspected GPS spoofing near India’s border region. Carrying 160…
Jailbroken Mistral And Grok Tools Are Used by Attackers to Build Powerful Malware
The latest findings by Cato Networks suggests that a number of jailbroken and uncensored AI tool variations marketed on hacker forums were probably created using well-known commercial large language models like Mistral AI and X’s Grok. A parallel underground…
CISA Warns of Renewed Exploits Targeting TP-Link Routers with Critical Flaws
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised fresh concerns about several outdated TP-Link router models that are being actively exploited by cybercriminals. Despite the flaw being identified years ago, it has re-emerged in recent attack campaigns,…
Scania Targeted in Extortion Attempt Following Data Breach
An alarm is triggered in both the automotive and financial industries when Scania Financial Services, based in Sweden, confirms that a cybersecurity incident has compromised sensitive company data, which has raised concerns in the industry. The breach was reportedly…
New Malicious Python Package Found Stealing Cloud Credentials
A dangerous piece of malware has been discovered hidden inside a Python software package, raising serious concerns about the security of open-source tools often used by developers. Security experts at JFrog recently found a harmful package uploaded to the…
Here’s Why Using SMS Two-Factor Authentication Codes Is Risky
We’ve probably all received confirmation codes via text message when trying to enter into an account. These codes are intended to function as two-factor verification, confirming our identities and preventing cybercriminals from accessing our accounts solely through a password.…
Integrated Threat Management: A Unified Strategy for Modern Business Security
Organizations today face increasingly complex threats that span across digital, physical, and operational domains. With risks becoming more sophisticated and faster-moving, traditional siloed approaches to security are no longer effective. Companies now require a unified strategy to protect their…
Targeted Cyber Threat Disrupts Washington Post Newsroom Operations
An alarming development, which indicates that cyber threats are growing in intensity, has been confirmed by The Washington Post, which confirms an attempted breach on its personal email system targeting a specific group of journalists who work at the…
Anubis Ransomware Becomes More Destructive With New File-Wiping Feature
A cybercrime group known as Anubis has recently added a dangerous new ability to its ransomware. This latest update allows the malware not only to lock files but also to completely destroy them, making it impossible for victims to…
Fake Bitdefender Site Distributes Malware: Cybercriminals Exploit Trusted Brands to Steal Sensitive Data
Bitdefender, a well-known and reputable cybersecurity and antivirus software provider, has become the latest target of cybercriminals. In a deeply troubling incident, scammers created a fake Bitdefender website, tricking users into downloading malware under the guise of legitimate antivirus…
Cyberattack Disrupts WestJet Systems as Investigation Begins
The second-largest airline in Canada, WestJet, is currently investigating an ongoing cyberattack which has compromised its internal systems as well as raising concerns about the risk of data loss to customers. As early as late last week, the airline was…
Signs Your Phone Has a Virus and How to Remove It Safely
In today’s world, our phones are more than just communication devices — they’re essential for work, banking, shopping, and staying connected. That makes it all the more alarming when a device begins to behave strangely. One possible cause? A…
Hackers Circumvent AntiVirus Using Google OAuth in New Malware Surge
A new campaign of browser-based malware has emerged, revealing how hackers are now circumventing conventional antivirus protections by exploiting trusted domains like Google.com. This technique, according to a report by security researchers at c/side, is subtle, conditionally triggered, and…
Cloudflare Explains Major Service Outage: Not a Security Breach, No Data Lost
Cloudflare has clarified that a widespread outage affecting its global services was not the result of a cyberattack or data breach. The company confirmed that no customer data was compromised during the disruption, which significantly impacted numerous platforms, including…
The True Cost of Legacy Software: A Comprehensive Look
Business leaders tend to stay with what they know. It’s familiar, comfy, and—above all—seems trustworthy. However, this comfort zone can be costing us more than they realise when it comes to legacy software systems. Many leaders focus on the…
Microsoft Entra ID Faces Surge in Coordinated Credential-Based Attacks
An extensive account takeover (ATO) campaign targeting Microsoft Entra ID has been identified by cybersecurity experts, exploiting a powerful open-source penetration testing framework known as TeamFiltration. First detected in December 2024, the campaign has accelerated rapidly, compromising more than 80,000…
T-Mobile Denies Involvement After Hackers Claim Massive Customer Data Breach
T-Mobile is once again in the cybersecurity spotlight after a hacking group claimed to have obtained sensitive personal information belonging to 64 million customers. The hackers alleged the data was freshly taken as of June 1, 2025, and listed…