Category: CySecurity News – Latest Information Security and Hacking Incidents

Fake DeepSeek AI Installers Deliver BrowserVenom Malware

Cybersecurity researchers have released a warning about a sophisticated cyberattack campaign in which users are attempted to access DeepSeek-R1, a widely recognized large language model (LLM), which has been identified as a large language model. Cybercriminals have launched a malicious…

Fake Resumes Become Weapon of Choice for FIN6 Threat Group

  The FIN6 cybercrime group, which has been associated with financial breaches in the past, is now launching a sophisticated new campaign targeting corporate recruitment channels. The group, which is known as FIN6 cybercrime, has been associated with high-profile financial…

Smartwatches: New Air-Gapped System Assault Vehicle

  A novel assault identified as ‘SmartAttack’ leverages smartwatches as a covert ultrasonic signal receiver to extract data from physically isolated (air-gapped) devices. Air-gapped systems, which are often used in mission-critical environments such as government buildings, weapons platforms, and nuclear…

UEBA: A Smarter Way to Fight AI-Driven Cyberattacks

  As artificial intelligence (AI) grows, cyberattacks are becoming more advanced and harder to stop. Traditional security systems that protect company networks are no longer enough, especially when dealing with insider threats, stolen passwords, and attackers who move through systems…

Ransomware Attacks Continue to Rise in an Alarming Trend

  The frequency and intensity of cyberthreats seem to be increasing despite businesses’ ongoing efforts to thwart malicious actors. Honeywell, a global technology and manufacturing firm that also provides cybersecurity solutions, reported a 46% rise in ransomware extortion attacks between…

AI Integration Raises Alarms Over Enterprise Data Safety

  Today’s digital landscape has become increasingly interconnected, and cyber threats have risen in sophistication, which has significantly weakened the effectiveness of traditional security protocols. Cybercriminals have evolved their tactics to exploit emerging vulnerabilities, launch highly targeted attacks, and utilise…