Category: CySecurity News – Latest Information Security and Hacking Incidents

Kettering Health Ransomware Attack Linked to Interlock Group

  Kettering Health, a prominent healthcare network based in Ohio, is still grappling with the aftermath of a disruptive ransomware attack that forced the organization to shut down its computer systems. The cyberattack, which occurred in mid-May 2025, affected operations…

US Federal Authorities Disrupt Growing Malware Pyramid Network

  A new study by Secureworks’ Counter Threat Unit (CTU) has revealed that ransomware operations have shifted significantly in response to heightened law enforcement crackdowns, forcing threat actors to evolve their strategies accordingly. There has been a tradition of many…

FBI Alert: Play Ransomware Attacks 900 Organizations

In a recent joint cybersecurity advisory released with its Australian partners, the FBI announced that the Play ransomware group has attacked over 900 organizations since May 2025. “As of May 2025, FBI was aware of approximately 900 affected entities allegedly…

The Strategic Imperatives of Agentic AI Security

In terms of cybersecurity, agentic artificial intelligence is emerging as a transformative force that is fundamentally transforming the way digital threats are perceived and handled. It is important to note that, unlike conventional artificial intelligence systems that typically operate within…

Mysterious Entity ExposedGang Exposes Cyber Criminals

An anonymous leaker is exposing the identities of the world’s most wanted cybercriminals.  Recently, a mysterious leaker exposed leaders behind Trickbot and Conti ransomware, hacking groups that are known for some of the biggest extortions in recent times.  Recently, The…

Russian Market Sells Millions of Stolen Credentials

  The “Russian Market” cybercrime marketplace has developed as one of the most popular places for purchasing and selling credentials stolen by info stealer malware. Although the marketplace has been functioning for almost six years and has grown in popularity…

Best Practices for SOC Threat Intelligence Integration

  As cyber threats become more complex and widespread, Security Operations Centres (SOCs) increasingly rely on threat intelligence to transform their defensive methods from reactive to proactive. Integrating Cyber Threat Intelligence (CTI) into SOC procedures has become critical for organisations…