Kettering Health, a prominent healthcare network based in Ohio, is still grappling with the aftermath of a disruptive ransomware attack that forced the organization to shut down its computer systems. The cyberattack, which occurred in mid-May 2025, affected operations…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Securing the SaaS Browser Experience Through Proactive Measures
Increasingly, organisations are using cloud-based technologies, which has led to the rise of the importance of security concerns surrounding Software as a Service (SaaS) platforms. It is the concept of SaaS security to ensure that applications and sensitive data…
Cybercriminals Exploit Fake Salesforce Tool to Steal Company Data and Demand Payments
A group of hackers has been carrying out attacks against businesses by misusing a tool that looks like it belongs to Salesforce, according to information shared by Google’s threat researchers. These attacks have been going on for several months…
Reddit Sues Anthropic for Training Claude AI with User Content Without Permission
Reddit, a social media site, filed a lawsuit against Anthropic on Wednesday, claiming that the artificial intelligence firm is unlawfully “scraping” millions of Reddit users’ comments in order to train its chatbot Claude. Reddit alleges that Anthropic “intentionally trained…
Lee Enterprises Ransomware Attack Exposes Data of 40,000 Individuals
Lee Enterprises, a major U.S. news publisher, is alerting nearly 40,000 individuals about a data breach following a ransomware attack that took place in early February 2025. The company, which owns and operates 77 daily newspapers and hundreds of…
US Federal Authorities Disrupt Growing Malware Pyramid Network
A new study by Secureworks’ Counter Threat Unit (CTU) has revealed that ransomware operations have shifted significantly in response to heightened law enforcement crackdowns, forcing threat actors to evolve their strategies accordingly. There has been a tradition of many…
URL Scams Everywhere? These Steps Will Help You Stay Safe
Scam links are difficult to spot, but it has become an everyday issue for internet users who accidentally click on malicious URLs that are part of a phishing attack. Most fake links include standard “https” encryption and domains similar to…
Crocodilus Android Malware Can Now Trick Victims Using Fake Contacts
A dangerous Android malware called Crocodilus has developed a new way to fool smartphone users. It can now secretly add fake names to the contact list on an infected phone. This makes it easier for hackers to pretend they…
Microsoft’s Latest AI Model Outperforms Current Weather Forecasting
Microsoft has created an artificial intelligence (AI) model that outperforms current forecasting methods in tracking air quality, weather patterns, and climate-affected tropical storms, according to studies published last week. The new model, known as Aurora, provided 10-day weather forecasts…
Zero-Day Flaw in Chrome and Chromium Puts Windows and Linux Users at Data Risk
A newly revealed zero-day vulnerability identified as CVE-2025-4664 has triggered serious concerns for billions of Google Chrome and Chromium users. Security experts have warned that this flaw, which affects both Windows and Linux platforms, could be exploited to leak…
Contractor Uses AI to Fake Road Work, Sparks Outrage and Demands for Stricter Regulation
In a time when tools like ChatGPT are transforming education, content creation, and research, an Indian contractor has reportedly exploited artificial intelligence for a far less noble purpose—fabricating roadwork completion using AI-generated images. A video that recently went viral…
FBI Alert: Play Ransomware Attacks 900 Organizations
In a recent joint cybersecurity advisory released with its Australian partners, the FBI announced that the Play ransomware group has attacked over 900 organizations since May 2025. “As of May 2025, FBI was aware of approximately 900 affected entities allegedly…
The Strategic Imperatives of Agentic AI Security
In terms of cybersecurity, agentic artificial intelligence is emerging as a transformative force that is fundamentally transforming the way digital threats are perceived and handled. It is important to note that, unlike conventional artificial intelligence systems that typically operate within…
US Embassy Cautions Visa Applicants After Bengaluru Man Falls Prey to Scam
The US Embassy in New Delhi has issued a cautionary alert to individuals applying for US visas, urging them to be wary of online scams that falsely promise to expedite visa interview appointments. This warning comes in the wake…
Mysterious Entity ExposedGang Exposes Cyber Criminals
An anonymous leaker is exposing the identities of the world’s most wanted cybercriminals. Recently, a mysterious leaker exposed leaders behind Trickbot and Conti ransomware, hacking groups that are known for some of the biggest extortions in recent times. Recently, The…
Russian Market Sells Millions of Stolen Credentials
The “Russian Market” cybercrime marketplace has developed as one of the most popular places for purchasing and selling credentials stolen by info stealer malware. Although the marketplace has been functioning for almost six years and has grown in popularity…
Data Breach at Cartier Highlights Growing Cyber Risks in Luxury Sector
In the latest incident involving a high-profile Parisian luxury jeweller, Cartier has been hacked, further heightening the concerns of those who are targeted by digital threats in the fashion and retail industries. In a statement released by the company,…
PocketPal AI Brings Offline AI Chatbot Experience to Smartphones With Full Data Privacy
In a digital world where most AI chatbots rely on cloud computing and constant internet connectivity, PocketPal AI takes a different approach by offering an entirely offline, on-device chatbot experience. This free app brings AI processing power directly onto…
Best Practices for SOC Threat Intelligence Integration
As cyber threats become more complex and widespread, Security Operations Centres (SOCs) increasingly rely on threat intelligence to transform their defensive methods from reactive to proactive. Integrating Cyber Threat Intelligence (CTI) into SOC procedures has become critical for organisations…
Fake AI Tools Are Being Used to Spread Dangerous Malware
As artificial intelligence becomes more popular, scammers are using its hype to fool people. A new warning reveals that hackers are creating fake AI apps and promoting them online to trick users into downloading harmful software onto their devices.…