A sudden shift unfolded across Afghanistan once American and NATO troops left in August 2021. Power structures backed by Washington vanished almost overnight; chaos spread quickly through regions. Instead, authority shifted back into the hands of the Taliban – two…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Flickr Reveals Data Breach Originating From Third Party Systems
A security incident affecting the user data of popular photo sharing platform Flickr has been confirmed to be the result of a compromise within a third-party service integrated into Flickr’s operation, rather than the company’s core infrastructure. According to…
Singapore Telecoms Hit by China-Linked Cyber Espionage
Singapore’s cyber watchdog has disclosed that an advanced cyber espionage group — UNC3886, with which APT10 and Red October have been linked — was behind attacks that targeted the four major telecom operators last year. The affected companies were Singtel,…
Cybersecurity Breaches Emerge as top Business Risk for Indian Companies
Cybersecurity breaches and attacks have become the leading threat to business performance for Indian companies, with 51% of senior executives identifying them as their primary risk, according to a new survey released by FICCI and EY. The FICCI-EY Risk…
Birmingham Mental Health Authority Alerts More than 30,000 People to Ransomware-linked Data Breach
A public mental health authority in Birmingham, Alabama has notified more than 30,000 individuals that their personal and medical information may have been exposed in a data breach linked to a ransomware attack late last year. The informed 30,434…
Ukraine Increases Control Over Starlink Terminals
New Starlink verification system Ukraine has launched a new authentication system for Starlink satellite internet terminals used by the public and the military after verifying that Russia state sponsored hackers have started using the technology to attack drones. The government…
Student Founders Establish Backed Program to Help Peers Build Startups
Two students affiliated with Stanford University have raised $2 million to expand an accelerator program designed for entrepreneurs who are still in college or who have recently graduated. The initiative, called Breakthrough Ventures, focuses on helping early-stage founders move…
CISA Warns of Actively Exploited SmarterMail Flaw Used in Ransomware Attacks
CISA includes a fresh SmarterMail weakness in its KEV list – this marks the third such addition linked to the messaging system within fourteen days. Identified as CVE-2026-24423, the security gap faces real-world abuse during ransom operations. Evidence points…
Sandworm Hackers Fail in DynoWiper Attack on Poland’s Power Grid
A recently disclosed cyberattack against Poland’s energy infrastructure has been linked to the Russian state-backed hacking group Sandworm, highlighting the persistent threat facing Europe’s critical sectors. The incident occurred between December 29 and 30, 2025, and reportedly targeted elements…
ShinyHunters Targets Okta and Microsoft SSO in Data Breach
Several voice-based social engineering attacks have prompted renewed scrutiny of single sign-on ecosystem security assumptions. The cybercrime collective ShinyHunters has publicly announced that it has carried out an extensive campaign to harvest SSO credentials from approximately 100 organizations, signaling…
La Sapienza University’s Digital Systems Remain Shut After Cyber Intrusion Disrupts Services
Rome’s La Sapienza University is continuing to experience major operational disruption after a cyber intrusion forced administrators to take its digital infrastructure offline as a safety measure. The shutdown began on February 2 and has affected core online services…
A New Twist on Old Cyber Tricks
Germany’s domestic intelligence and cybersecurity agencies have warned of a covert espionage campaign that turns secure messaging apps into tools of surveillance without exploiting any technical flaws. The Federal Office for the Protection of the Constitution and the Federal…
US Cybersecurity Strategy Shifts Toward Prevention and AI Security
Early next month, changes to how cyber breaches are reported will begin to surface, alongside a broader shift in national cybersecurity planning. Under current leadership, federal teams are advancing a more proactive approach to digital defense, focusing on risks…
CISA Confirms Active Exploitation of Four Critical Enterprise Software Flaws
CISA has confirmed active exploitation of four critical vulnerabilities in widely used enterprise software, urging immediate action from federal agencies and organizations worldwide. These flaws, now added to the agency’s Known Exploited Vulnerabilities (KEV) catalog, affect products from Versa,…
YouTube’s New GenAI Feature in Tools Coming Soon
Youtube is planning something new for its platform and content creators in 2026. The company plans to integrate AI into its existing and new tools. The CEO said that content creators will be able to use GenAI for shorts. While…
Widespread Cyber Espionage Campaign Breaches Infrastructure in 37 Countries
Research over the past year indicates that a newly identified cyberespionage threat actor operating in Asia has been conducting a sustained and methodical cyberespionage campaign that is characterized both by its operational scale and technical proficiency. A fully adaptive…
Romania’s National Oil Pipeline Joins a Growing Cyberattack list
Romania’s national oil pipeline operator, Conpet, has disclosed that it suffered a cyberattack that disrupted its corporate IT systems and temporarily knocked its website offline, adding to a growing series of digital incidents affecting the country’s critical infrastructure. In a…
Shadow Campaigns: Asia-Linked Espionage Group Breaches Government and Critical Infrastructure Networks Worldwide
A state-backed cyber espionage group has infiltrated dozens of government and critical infrastructure networks across 37 countries as part of a global operation known as “Shadow Campaigns.” During November and December of last year, the threat actor also carried…
Dozens of Government and Infrastructure Networks Breached in Global Espionage Campaign
Security researchers have identified a previously undocumented cyber espionage group that infiltrated at least 70 government and critical infrastructure organizations across 37 countries within the past year. The same activity cluster also conducted wide-scale scanning and probing of government-related systems…
Threat Actors Exploit Fortinet Devices and Steal Firewall Configurations
Fortinet products targeted Threat actors are targeting Fortinet FortiGate devices via automated attacks that make rogue accounts and steal firewall settings info. The campaign began earlier this year when threat actors exploited an unknown bug in the devices’ single-sign-on (SSO)…