A Ukrainian citizen has admitted guilt in connection with a series of ransomware attacks carried out using the Nefilim strain, targeting companies in the United States and other countries. Artem Aleksandrovych Stryzhak, 35, was extradited to the US from…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Dangerous December: Urgent Update Warning for All Android and iPhone Users
An emergent surge of urgent security advisories has permeated the tech sector in December, with both Google and Apple warning Android and iPhone users of critical vulnerabilities being actively exploited in the wild. Termed “Dangerous December,” this time period…
AuraStealer Malware Uses Scam Yourself Tactics to Steal Sensitive Data
A recent investigation by Gen Digital’s Gen Threat Labs has brought attention to AuraStealer, a newly emerging malware-as-a-service offering that has begun circulating widely across underground cybercrime communities. First observed in mid-2025, the malware is being promoted as a…
Cyber Threat Actors Escalate Impersonation of Senior US Government Officials
Federal law enforcement officials are raising a lot of concern about an ongoing cybercrime operation involving threat actors impersonating senior figures across the American political landscape, including state government leaders, White House officials, Cabinet members, and congressional members. These threat…
Google Partners With UK to Open Access to Willow Quantum Chip for Researchers
Google has revealed plans to collaborate with the UK government to allow researchers to explore potential applications of its advanced quantum processor, Willow. The initiative aims to invite scientists to propose innovative ways to use the cutting-edge chip, marking…
Network Detection and Response Defends Against AI Powered Cyber Attacks
Cybersecurity teams are facing growing pressure as attackers increasingly adopt artificial intelligence to accelerate, scale, and conceal malicious activity. Modern threat actors are no longer limited to static malware or simple intrusion techniques. Instead, AI-powered campaigns are using adaptive…
Credit Monitoring Provider Discloses Breach Impacting 5.6 Million Users
A data breach usually does not lend itself to straightforward comparisons, as each occurrence is characterized by distinctive circumstances and carries different consequences for those involved. It is common for headlines to emphasize the scale of an attack, the prominence…
VPN Surge: Americans Bypass Age Verification Laws
Americans are increasingly seeking out VPNs as states enact stringent age verification laws that limit what minors can see online. These regulations compel users to provide personal information — like government issued IDs — to verify their age, leading to concerns…
US DoJ Charges 54 Linked to ATM Jackpotting Scheme Using Ploutus Malware, Tied to Tren de Aragua
The U.S. Department of Justice (DoJ) has revealed the indictment of 54 people for their alleged roles in a sophisticated, multi-million-dollar ATM jackpotting operation that targeted machines across the United States. According to authorities, the operation involved the use…
Iranian Infy Prince of Persia Cyber Espionage Campaign Resurfaces
Security researchers have identified renewed cyber activity linked to an Iranian threat actor known as Infy, also referred to as Prince of Persia, marking the group’s re-emergence nearly five years after its last widely reported operations in Europe and…
RansomHouse Develops More Complex Encryption for Recent Attacks
The ransomware group known as RansomHouse has recently enhanced the encryption mechanism used in its attacks, moving away from a basic, single-step process to a more advanced, multi-layered approach. This change reflects a deliberate effort to strengthen the effectiveness…
Lead Generation Sector Faces Scrutiny Following 16TB Data Exposure
In the wake of a massive unsecured MongoDB database, researchers have rekindled their interest in the risks associated with corporate intelligence and lead generation ecosystems. Researchers discovered that the MongoDB instance had been exposed, containing about 16 terabytes of…
£1.8bn BritCard: A Security Investment Against UK Fraud
The UK has debated national ID for years, but the discussion has become more pointed alongside growing privacy concerns. Two decades ago Tony Blair could sing the praises of ID cards and instead of public hysteria about data held by government,…
LinkedIn Profile Data Among Billions of Records Found in Exposed Online Database
Cybersecurity researchers recently identified a massive online database that was left publicly accessible without any security protections, exposing a vast collection of professional and personal information. The database contained more than 16 terabytes of data, representing over 4.3 billion…
CountLoader and GachiLoader Malware Campaigns Target Cracked Software Users
Cybersecurity analysts have uncovered a new malware campaign that relies on cracked software download platforms to distribute an updated variant of a stealthy and modular loader known as CountLoader. According to researchers from the Cyderes Howler Cell Threat Intelligence…
Clop Ransomware Targets Internet-Facing Gladinet CentreStack Servers in New Data Theft Campaign
The Clop ransomware group, also known as Cl0p, has launched a new extortion campaign aimed at Gladinet CentreStack file servers that are exposed to the internet. Gladinet CentreStack is a file-sharing solution that allows organizations to securely access and…
Lugano: Swiss Crypto Hub Where Bitcoin Pays for Everything
The Swiss city of Lugano, located in the Italian-speaking canton of Ticino, has turned itself into the European capital for cryptocurrency through its bold “Plan ₿” scheme, which lets citizens and businesses transact in Bitcoin and Tether for almost everything.…
Microsoft 365 Users Targeted by Russia-Linked Device Code Phishing Operations
The global network infrastructure is experiencing a wave of sophisticated cyber intrusions as states-sponsored and financially motivated hackers are increasingly exploiting a legitimate Microsoft authentication mechanism to seize control of enterprise accounts in a broad range of sectors. There has…
Wi-Fi Jammers Pose a Growing Threat to Home Security Systems: What Homeowners Can Do
Wi-Fi technology powers most modern home security systems, from surveillance cameras to smart alarms. While this connectivity offers convenience, it also opens the door to new risks. One such threat is the growing use of Wi-Fi jammers—compact devices that…
Adobe Brings Photo, Design, and PDF Editing Tools Directly Into ChatGPT
Adobe has expanded how users can edit images, create designs, and manage documents by integrating select features of its creative software directly into ChatGPT. This update allows users to make visual and document changes simply by describing what they…