The latest discovery of new Predator spyware-related equipment suggests that the surveillance technology is still finding new clients, despite US penalties imposed on its backers since July 2023. In a report published earlier this month, analysts at Insikt Group…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Fake DeepSeek AI Installers Deliver BrowserVenom Malware
Cybersecurity researchers have released a warning about a sophisticated cyberattack campaign in which users are attempted to access DeepSeek-R1, a widely recognized large language model (LLM), which has been identified as a large language model. Cybercriminals have launched a malicious…
U.S. Homeland Security Reportedly Buys Airline Passenger Data from Private Brokers
In the digital world where personal privacy is increasingly at risk, it has now come to light that the U.S. government has been quietly purchasing airline passenger information without public knowledge. A recent report by Wired revealed that the…
Fake Resumes Become Weapon of Choice for FIN6 Threat Group
The FIN6 cybercrime group, which has been associated with financial breaches in the past, is now launching a sophisticated new campaign targeting corporate recruitment channels. The group, which is known as FIN6 cybercrime, has been associated with high-profile financial…
Smartwatches: New Air-Gapped System Assault Vehicle
A novel assault identified as ‘SmartAttack’ leverages smartwatches as a covert ultrasonic signal receiver to extract data from physically isolated (air-gapped) devices. Air-gapped systems, which are often used in mission-critical environments such as government buildings, weapons platforms, and nuclear…
Trend Micro Patches Critical Remote Code Execution and Authentication Bypass Flaws in Apex Central and PolicyServer
Trend Micro has rolled out essential security updates to address a series of high-impact vulnerabilities discovered in two of its enterprise security solutions: Apex Central and the Endpoint Encryption (TMEE) PolicyServer. These newly disclosed issues, which include critical remote code…
Zoomcar Data Breach Exposes Personal Information of 8.4 Million Users
Zoomcar, a well-known car-sharing platform, recently reported that a cyberattack exposed the personal details of approximately 8.4 million users. The information that was accessed includes users’ names, phone numbers, and vehicle registration details. The company, based in Bengaluru, India,…
Cyber Suraksha’: Indian Armed forces Launch Cybersecurity Exercise
Under the direction of the Headquarters Integrated Defence Staff, the Indian Defence Cyber Agency has initiated a cyber security exercise called “Cyber Suraksha.” June 16 marked the start of the exercise, which will last through June 27. A multi-phased…
Aim Security Reveals Zero-Click Flaw in AI Powered Microsoft Copilot
It has recently been reported that a breakthrough cyber threat known as EchoLeak has been documented as the first documented zero-click vulnerability that specifically targets Microsoft 365 Copilot in the enterprise. This raises important concerns regarding the evolving risks…
How Generative AI Is Accelerating the Rise of Shadow IT and Cybersecurity Gaps
The emergence of generative AI tools in the workplace has reignited concerns about shadow IT—technology solutions adopted by employees without the knowledge or approval of the IT department. While shadow IT has always posed security challenges, the rapid proliferation…
UEBA: A Smarter Way to Fight AI-Driven Cyberattacks
As artificial intelligence (AI) grows, cyberattacks are becoming more advanced and harder to stop. Traditional security systems that protect company networks are no longer enough, especially when dealing with insider threats, stolen passwords, and attackers who move through systems…
‘SmartAttack’: New Covert Threat Uses Smartwatches to Steal Data from Air-Gapped Systems via Ultrasound
A new cybersecurity threat dubbed “SmartAttack” demonstrates how smartwatches can covertly capture ultrasonic signals to extract sensitive data from air-gapped computers—systems traditionally considered highly secure due to their physical isolation from external networks. Air-gapped environments are widely used in…
Cyberattack in Dubai Compromises Patient Health Records
During the last few months, the UAE Cyber Security Council (CSC) has revealed that the UAE has seen a surge in cyberattacks that have been reported daily to the highest level of more than 200,000. Cyber threats of this…
Ransomware Attacks Continue to Rise in an Alarming Trend
The frequency and intensity of cyberthreats seem to be increasing despite businesses’ ongoing efforts to thwart malicious actors. Honeywell, a global technology and manufacturing firm that also provides cybersecurity solutions, reported a 46% rise in ransomware extortion attacks between…
Telegram’s Alleged Ties to Russian Intelligence Raise Global Surveillance Fears
A new investigation by Russian media outlet Important Stories, in collaboration with the Organized Crime and Corruption Reporting Project (OCCRP), has sparked fresh scrutiny over Telegram’s connections to Russia’s intelligence services. The popular messaging platform, long regarded for its…
DanaBot Malware Network Disrupted After Researchers Discover Key Flaw
In a major breakthrough, cybersecurity experts uncovered a major weakness in the DanaBot malware system that ultimately led to the disruption of its operations and criminal charges against its operators. DanaBot, which has been active since 2018, is known…
M&S Faces £300M Loss After Cyberattack Involving DragonForce and Scattered Spider
Marks & Spencer has resumed its online services after a serious cyberattack earlier this year that disrupted its operations and is expected to slash profits by £300 million. The British retail giant’s digital operations were hit hard, and recent…
Data Security Posture Insights: Overcoming Complexity and Threat Landscape
In today’s competitive landscape, it is becoming more critical for businesses to find ways to adapt their data security, governance, and risk management strategies to the volatile economy by increasing efficiency or lowering costs while maintaining the structure, consistency,…
AI Integration Raises Alarms Over Enterprise Data Safety
Today’s digital landscape has become increasingly interconnected, and cyber threats have risen in sophistication, which has significantly weakened the effectiveness of traditional security protocols. Cybercriminals have evolved their tactics to exploit emerging vulnerabilities, launch highly targeted attacks, and utilise…
GrayAlpha Exposed: Deploys Malware via Infection Vectors
Experts from Insikt Group have found new infrastructure linked with GrayAlpha, a cybercrime gang overlapping with the financially motivated group called FIN7. Fin7 has been in the cybercrime game since 2013 and is known as one of the most infamous…