Cybersecurity experts have uncovered a new incident in which an information-stealing malware successfully extracted sensitive configuration data from OpenClaw, an AI agent platform previously known as Clawdbot and Moltbot. The breach signals a notable expansion in the capabilities of…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Hackers Leak 600000 Customer Records as Canada Goose Opens Investigation
Luxury retail is a rarefied industry where reputations travel faster than seasonal collections. Canada Goose, a brand associated with Arctic-quality craftsmanship and premium exclusivity, is now facing scrutiny from an unexpected part of the internet. In a cyber incident…
More U.S. Investors Join Legal Dispute With South Korea Over Coupang Data Breach
A fresh wave of U.S.-based investment firms has joined an ongoing legal confrontation with the government of South Korea over its handling of a large scale cybersecurity incident involving Coupang. On February 11, it was confirmed that three additional…
ClickFix Campaigns Exploit Claude Artifacts to Target macOS Users with Infostealers
One out of every hundred Mac users searching online might now face hidden risks. Instead of helpful tools, some find traps disguised as guides – especially when looking up things like “DNS resolver” or “HomeBrew.” Behind these results, attackers…
Volvo Hit in Conduent Breach Affecting 25 Million
A major data breach at business services provider Conduent has spiraled into a large-scale security incident affecting at least 25 million people across the United States, with Volvo Group North America among the latest victims. The breach, originally disclosed…
Microsoft Uncovers DNS-Based ClickFix Variant as Stealer Campaigns Escalate Across Windows and macOS
Microsoft has revealed a new evolution of the ClickFix social engineering technique, where attackers manipulate users into executing commands that initiate a Domain Name System (DNS) lookup to fetch a secondary malicious payload. In this updated approach, threat actors…
New ClickFix Campaign Uses Nslookup to Fetch Malicious PowerShell Script
According to Microsoft, the ClickFix social engineering technique has evolved in a refined manner, emphasizing that even the most common software applications can be repurposed into covert channels for malware distribution. Using this latest iteration, hackers are no longer…
Google Links CANFAIL Malware Attacks to Suspected Russia-Aligned Group
A newly identified cyber espionage group has been linked to a wave of digital attacks against Ukrainian institutions, according to findings released by the Google Threat Intelligence Group. Investigators say the activity involves a malware strain tracked as CANFAIL…
Iron Man Data Breach Only Impacted Marketing Resources
Data storage and recovery services company ‘Iron Mountain’ suffered a data breach. Extortion gang ‘Everest’ was behind the breach. Iron Mountain said the breach was limited to marketing materials. The company specializes in records management and data centers, it has…
Moltbook Data Leak Reveals 1.5 Million Tokens Exposed in AI Social Platform Security Flaw
Moltbook has recently captured worldwide attention—not only for its unusual concept as a dystopian-style social platform centered on artificial intelligence, but also for significant security and privacy failures uncovered by researchers. The platform presents itself as a Reddit-inspired network…
Palo Alto Softens China Hack Attribution Over Beijing Retaliation Fears
Palo Alto Networks is facing scrutiny after reports that it deliberately softened public attribution of a vast cyberespionage campaign that its researchers internally linked to China. According to people familiar with the matter, a draft from its Unit 42…
OpenAI’s Evolving Mission: A Shift from Safety to Profit?
Now under scrutiny, OpenAI – known for creating ChatGPT – has quietly adjusted its guiding purpose. Its 2023 vision once stressed developing artificial intelligence to benefit people without limits imposed by profit goals, specifically stating “safely benefits humanity.” Yet…
Fraudulent Recruiters Target Developers with Malicious Coding Tests
If a software developer is accustomed to receiving unsolicited messages offering lucrative remote employment opportunities, the initial approach may appear routine—a brief introduction, a well-written job description, and an invitation to complete a small technical exercise. Nevertheless, behind the…
SMS and OTP Bombing Tools Evolve into Scalable, Global Abuse Infrastructure
The modern authentication ecosystem operates on a fragile premise: that one-time password requests are legitimate. That assumption is increasingly being challenged. What started in the early 2020s as loosely circulated scripts designed to annoy phone numbers has transformed into…
UK May Enforce Partial Ransomware Payment Ban as Cyber Reforms Advance
Governments across the globe test varied methods to reduce cybercrime, yet outlawing ransomware payouts stands out as especially controversial. A move toward limiting such payments gains traction in the United Kingdom, suggests Jen Ellis, an expert immersed in shaping national…
Researchers Identify Previously Undocumented Malware Used in World Leaks Intrusions
Cybersecurity researchers have identified a newly developed malicious software tool being used by the extortion-focused cybercrime group World Leaks, marking a pivotal dent the group’s technical capabilities. According to findings published by the cybersecurity research division of Accenture, the…
Malicious AI Chrome Extensions Steal Users Emails and Passwords
30 malicious Chrome extensions used by over 300,000 users are pretending to be AI assistants to steal credentials, browsing information, and email content. Few extensions are still active in the Chrome Web Store and have been downloaded by tens of…
Tesla Slashes Car Line-Up to Double Down on Robots and AI
Tesla is cutting several car models and scaling back its electric vehicle ambitions as it shifts focus towards robotics and artificial intelligence, marking a major strategic turning point for the company. The move comes after Tesla reported its first…
Largest Ever 31.4 Tbps DDoS Attack Attributed to Aisuru Botnet
A surge of traffic unprecedented to the public internet occurred in November 2025 for thirty five seconds. The acceleration was immediate and absolute, peaking at 31.4 terabits per second before dissipating nearly as quickly as it formed. As the…
State-Backed Hackers Are Turning to AI Tools to Plan, Build, and Scale Cyber Attacks
Cybersecurity investigators at Google have confirmed that state-sponsored hacking groups are actively relying on generative artificial intelligence to improve how they research targets, prepare cyber campaigns, and develop malicious tools. According to the company’s threat intelligence teams, North Korea–linked…