In an unsettling development in the ongoing cyber conflict linked to the Russia-Ukraine war, Ukrainian-aligned hacking groups have claimed responsibility for a large-scale cyberattack targeting a major Russian drone manufacturing company. The targeted firm, identified as Gaskar Group, is believed…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Hackers Use DNS Records to Hide Malware and AI Prompt Injections
Cybercriminals are increasingly leveraging an unexpected and largely unmonitored part of the internet’s infrastructure—the Domain Name System (DNS)—to hide malicious code and exploit security weaknesses. Security researchers at DomainTools have uncovered a campaign in which attackers embedded malware directly…
Healthcare Firms Face Major Threats from Risk Management and Legacy Tech, Report Finds
With healthcare facilities scrambling to pinpoint and address their top cyber threats, Fortified’s report provides some guidance on where to begin. The report identifies five major security gaps in healthcare organisations: inadequate asset inventories, a lack of unified risk…
UK Tax Fraud Scheme Uncovered Following Arrests in Romania
Despite being organized and waged on a global scale, phishing-based tax fraud schemes that target the United Kingdom have emerged in recent years as a significant development in the fight against transnational cyber-enabled financial crime. An operation coordinated by…
Online Criminals Steal $500K Crypto Via Malicious AI Browser Extension
A Russian blockchain engineer lost over $500,000 worth of cryptocurrencies in a sophisticated cyberattack, highlighting the persisting and increasing threats posed by hostile open-source packages. Even seasoned users can be duped into installing malicious software by attackers using public…
Gigabyte Firmware Vulnerability Enables Stealth UEFI Malware Infection
According to security researchers, a critical set of vulnerabilities has been identified in UEFI firmware for a number of motherboards manufactured by Gigabyte, causing serious concerns about device integrity and long-term system security, as well as serious concerns regarding device…
Interlock RAT Evolves in New KongTuke Web-Inject Attacks Targeting U.S. Industries
A recently enhanced version of the Interlock remote access Trojan (RAT) is being deployed in an ongoing web-inject campaign linked to the ransomware group behind it. Known for its double-extortion tactics, Interlock has now shifted its technical approach with…
‘FileFix’ Malware Trick Amplifies Interlock Ransomware Threat With Evolved Attack Tactic
Cybersecurity researchers have identified a dangerous new twist to the notorious ClickFix malware tactic. The evolved variant—called FileFix—is now being weaponized in active ransomware campaigns, further advancing the threat landscape. ClickFix typically lures users by showing them a bogus…
Ransomware Attacks Surge in 2025, With Smaller Businesses and Manufacturers Most Affected
Ransomware threats are rising fast in 2025, with the first half of the year already showing a sharp increase in attacks. New research shows that U.S.-based companies, small and medium-sized businesses, and firms in the manufacturing sector are currently…
Linux Distribution Designed for Seamless Anonymous Browsing
Despite the fact that operating systems like Windows and macOS continue to dominate the global market, Linux has gained a steady following among users who value privacy and security as well as cybersecurity professionals, thanks to its foundational principles: transparency,…
Major Breach at Medical Billing Giant Results in The Data Leak of 5.4 Million Users
Episource, the medical billing behemoth, has warned millions of Americans that a hack earlier this year resulted in the theft of their private and medical data. According to a listing with the United States Department of Health and Human…
Episource Healthcare Data Breach Exposes Personal Data of 5.4 Million Americans
In early 2025, a cyberattack targeting healthcare technology provider Episource compromised the personal and medical data of over 5.4 million individuals in the United States. Though not widely known to the public, Episource plays a critical role in the…
Over 2 Million Users Affected: Browser Extensions Turned Into Silent Spying Tools
An alarming cyber threat has come to light involving common browser extensions used by millions across the world. According to a recent investigation by cybersecurity firm Koi Security, at least 18 browser add-ons, once considered safe were secretly turned into…
Asia is a Major Hub For Cybercrime, And AI is Poised to Exacerbate The Problem
Southeast Asia has emerged as a global hotspot for cybercrimes, where human trafficking and high-tech fraud collide. Criminal syndicates operate large-scale “pig butchering” operations in nations like Cambodia and Myanmar, which are scam centres manned by trafficked individuals compelled…
Why Major Companies Are Still Falling to Basic Cybersecurity Failures
In recent weeks, three major companies—Ingram Micro, United Natural Foods Inc. (UNFI), and McDonald’s—faced disruptive cybersecurity incidents. Despite operating in vastly different sectors—technology distribution, food logistics, and fast food retail—all three breaches stemmed from poor security fundamentals, not advanced…
Google Gemini Exploit Enables Covert Delivery of Phishing Content
An AI-powered automation system in professional environments, such as Google Gemini for Workspace, is vulnerable to a new security flaw. Using Google’s advanced large language model (LLM) integration within its ecosystem, Gemini enables the use of artificial intelligence (AI)…
Hidden Crypto Mining Operation Found in Truck Tied to Village Power Supply
In a surprising discovery, officials in Russia uncovered a secret cryptocurrency mining setup hidden inside a Kamaz truck parked near a village in the Buryatia region. The vehicle wasn’t just a regular truck, it was loaded with 95 mining…
Chinese Attackers Suspected of Breaching a Prominent DC Law Firm
The next front in the silent war, which is being waged with keystrokes and algorithms rather than missiles, is the digital infrastructure of a prominent legal firm in Washington, DC. Wiley Rein, a company known for negotiating the complex…
WordPress Plugin Breach: Hackers Gain Control Through Manual Downloads
A serious cyberattack recently targeted Gravity Forms, a widely used plugin for WordPress websites. This incident, believed to be part of a supply chain compromise, resulted in infected versions of the plugin being distributed through manual installation methods. What…
OpenAI Launching AI-Powered Web Browser to Rival Chrome, Drive ChatGPT Integration
OpenAI is reportedly developing its own web browser, integrating artificial intelligence to offer users a new way to explore the internet. According to sources cited by Reuters, the tool is expected to be unveiled in the coming weeks, although…
Global Encryption at Risk as China Reportedly Advances Decryption Capabilities
It has been announced that researchers at Shanghai University have achieved a breakthrough in quantum computing that could have a profound impact on modern cryptographic systems. They achieved a significant leap in quantum computing. The team used a quantum…
Politically Motivated Hacktivist Stole Data of 2.5 Million Columbia University Students And Employees
In a targeted cyberattack that investigators suspect was politically motivated, a seasoned “hacktivist” allegedly acquired private data from over two million Columbia University students, applicants, and staff. The savvy hacktivist stole social security numbers, citizenship status, university-issued ID numbers,…
Newly Found AMD Processor Flaws Raise Concerns, Though Risk Remains Low
In a recent security advisory, chipmaker AMD has confirmed the discovery of four new vulnerabilities in its processors. These issues are related to a type of side-channel attack, similar in nature to the well-known Spectre and Meltdown bugs that were…
The Alarming Convergence of Cyber Crime and Real-World Threats
It is becoming increasingly evident that every aspect of everyday life relies on digital systems in today’s hyper-connected world, from banking and shopping to remote work and social media, as well as cloud-based services. With more and more people…
Balancing Accountability and Privacy in the Age of Work Tracking Software
As businesses adopt employee monitoring tools to improve output and align team goals, they must also consider the implications for privacy. The success of these systems doesn’t rest solely on data collection, but on how transparently and respectfully they…
Malicious Firefox Extension Steals Verification Tokens: Update to stay safe
Credential theft and browser security were commonly found in Google Chrome browsers due to its wide popularity and usage. Recently, however, cyber criminals have started targeting Mozilla Firefox users. A recent report disclosed a total of eight malicious Firefox extensions…
Why Running AI Locally with an NPU Offers Better Privacy, Speed, and Reliability
Running AI applications locally offers a compelling alternative to relying on cloud-based chatbots like ChatGPT, Gemini, or Deepseek, especially for those concerned about data privacy, internet dependency, and speed. Though cloud services promise protections through subscription terms, the reality…
Malware Masquerading as AI Tools Targets 8,500+ SMB Users in an SEO Poisoning Campaign
Cybersecurity researchers have discovered a malicious campaign that uses SEO-optimized phoney landing pages to propagate the Oyster malware loader. Security experts at Arctic Wolf unearthed that threat actors have designed numerous landing sites that mimic two well-known Windows tools…
Germany’s Warmwind May Be the First True AI Operating System — But It’s Not What You Expect
Artificial intelligence is starting to change how we interact with computers. Since advanced chatbots like ChatGPT gained popularity, the idea of AI systems that can understand natural language and perform tasks for us has been gaining ground. Many have…
How to Safeguard Your Phone Number From SIM Swap Attacks in 2025
In 2025, phone numbers have become woven into nearly every part of our digital lives. Whether you’re creating accounts on e-commerce sites, managing online banking, accessing health services, or logging in to social networks, your phone number is the…
Social Engineering Identified as Catalyst for M&S Ransomware Breach
< div style=”text-align: justify;”> Marks & Spencer (M&S), one of the largest and most established retailers in the United Kingdom, has confirmed that a highly targeted social engineering operation triggered the ransomware attack in April 2025. This breach, which…
Millions of Resumes Exposed Online Due to Unsecured Hiring Platform
A major data exposure has come to light after cybersecurity experts discovered an unsecured online storage system containing nearly 26 million documents, many of which appear to be resumes of job seekers in the United States. The exposed files…
Attackers Exploit Compromised Shellter Red Team Tool to Deploy Infostealers
Shellter Project, which makes a commercial AV/EDR evasion loader for penetration testing, admitted that hackers exploited its Shellter Elite product in assaults after a client leaked a copy of the software. The exploitation has been ongoing for several months,…
AI and the Rise of Service-as-a-Service: Why Products Are Becoming Invisible
The software world is undergoing a fundamental shift. Thanks to AI, product development has become faster, easier, and more scalable than ever before. Tools like Cursor and Lovable—along with countless “co-pilot” clones—have turned coding into prompt engineering, dramatically reducing…
Google Gemini Bug Exploits Summaries for Phishing Scams
False AI summaries leading to phishing attacks Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links. Google…
Telefónica Investigates Claims of Major Data Breach by Cybercriminal
An investigation has been conducted into a significant cybersecurity incident that occurred in 2025 at Telefónica, a global telecommunications company serving millions across Europe and Latin America. In addition to allegedly obtaining a considerable cache of confidential corporate data…
Here’s Why Cyber Security is Critical For Healthcare Sector
Healthcare organisations provide an essential service that, if disrupted by a cyber attack, could jeopardise patient safety, disrupt care delivery, and even result in death. In the case of a security incident, the implications could impact not only the…
Can AI Be Trusted With Sensitive Business Data?
As artificial intelligence becomes more common in businesses, from retail to finance to technology— it’s helping teams make faster decisions. But behind these smart predictions is a growing problem: how do you make sure employees only see what they’re…
Weak Passwords Still Common in Education Sector, Says NordVPN Report
A new study by NordVPN has revealed a serious cybersecurity issue plaguing the education sector: widespread reliance on weak and easily guessable passwords. Universities, schools, and training centres continue to be highly vulnerable due to the reuse of simple…
NVIDIA Urges Users to Enable ECC to Defend GDDR6 GPUs Against Rowhammer Threats
NVIDIA has issued a renewed advisory encouraging customers to activate System Level Error-Correcting Code (ECC) protections to defend against Rowhammer attacks targeting GPUs equipped with GDDR6 memory. This heightened warning follows recent research from the University of Toronto demonstrating…
Latest Malware “Mamona” Attacks Locally, Hides by Self Deletion
Cybersecurity experts are tracing Mamona, a new ransomware strain that is famous for its stripped-down build and silent local execution. Experts believe that the ransomware prevents the usual command-and-control (C2) servers, choosing instead a self-contained method that moves past tools…
Ingram Micro Faces Major Outage Following Ransomware Incident
An assault on Ingram Micro’s global network started on July 3, which crippled parts of the company’s global network as well as disrupted its ordering portals and customer service channels. Ingram Micro is currently restoring critical systems. It became…
CISA Lists Citrix Bleed 2 as Exploit, Gives One Day Deadline to Patch
CISA confirms bug exploit The US Cybersecurity & Infrastructure Security Agency (CISA) confirms active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777 in Citrix NetScaler ADC and Gateway. It has given federal parties one day to patch the bugs. This unrealistic…
Is Your Bank Login at Risk? How Chatbots May Be Guiding Users to Phishing Scams
Cybersecurity researchers have uncovered a troubling risk tied to how popular AI chatbots answer basic questions. When asked where to log in to well-known websites, some of these tools may unintentionally direct users to the wrong places, putting their…
Scamfluencers Use Social Media to Orchestrate Sophisticated Online Fraud
Scamfluencers, a rising category of deceptive internet personalities, are leveraging their online influence to run sophisticated scams that have already cost Americans an estimated $1.9 billion in 2024. These individuals masquerade as experts in finance, health, or other trusted…
The Rise of Digital Slavery in the Age of Global Cybercrime
A growing number of cybercriminals are becoming more sophisticated and dangerous in the hyperconnected digital world of today. These criminals use advanced methods to exploit individuals and organisations who are not expecting them. To lure victims into divulging confidential…
DeepSeek Faces Ban From App Stores in Germany
DeepSeek, a competitor of ChatGPT, may face legal ramifications in the European Union after the Berlin Commissioner for Data Protection ordered that Google and Apple remove the AI app from their stores. After discovering that the DeepSeek app violates…
‘Hunters International’ RaaS Outfit Shuts Down Its Operation
Hunters International, a ransomware-as-a-Service (RaaS) outfit, shut down operations and will provide free decryptors to victims seeking to restore their data without paying a ransom. “After careful consideration and in light of recent developments, we have decided to close…
Ingram Micro Confirms SafePay Ransomware Attack and Global IT System Outage
Ingram Micro, one of the world’s largest IT distribution and services companies, has confirmed it was targeted in a ransomware attack by the SafePay group, causing major operational disruptions across its global network. The cyberattack, which began early on…
Hidden Surveillance Devices Pose Rising Privacy Risks for Travelers
Travellers are experiencing an increase in privacy concerns as the threat of hidden surveillance devices has increased in accommodations. From boutique hotels to Airbnb rentals to hostels, the reports that concealed cameras have been found to have been found…
Security Breach Reveals “Catwatchful” Spyware is Snooping on Users
A security bug in a stealthy Android spyware operation, “Catwatchful,” has exposed full user databases affecting its 62,000 customers and also its app admin. The vulnerability was found by cybersecurity expert Eric Daigle reported about the spyware app’s full database…
Crypto Workers Tricked in Job Scams Involving New Malware Linked to North Korea
A new online scam is targeting people who work in the cryptocurrency industry, using fake job offers and interviews to trick them into installing harmful software on their devices. According to a report by cybersecurity researchers at Cisco Talos,…
Hypervisor Ransomware Threat Grows: MITRE ATT&CK v17 Puts C-Suite on Alert
The latest update to the MITRE ATT&CK framework—version 17—has brought hypervisor security into sharp focus, prompting a necessary shift in how organizations view the core of their virtualized infrastructure. For the first time, VMware ESXi hypervisors have received a…
HPU Website Defaced in Cyberattack, Investigation Underway
Shimla, June 10 — The official website of Himachal Pradesh University (HPU) experienced an unexpected breach earlier this week, when its homepage was briefly altered to display inappropriate and anti-national content. The incident prompted immediate action, with the university…
Office 365’s Microsoft Defender Now Thwarts Email Bombing Assaults
Microsoft claims that the cloud-based email security suite Defender for Office 365 can now automatically detect and prevent email bombing attacks. Defender for Office 365 (previously known as Office 365 Advanced Threat Protection or Office 365 ATP) guards organisations…
Chinese Scientists Develop Quantum-Resistant Blockchain Storage Technology
A team of Chinese researchers has unveiled a new blockchain storage solution designed to withstand the growing threat posed by quantum computers. Blockchain, widely regarded as a breakthrough for secure, decentralized record-keeping in areas like finance and logistics, could…
FBI Urges Airlines to Prepare for Evolving Threat Scenarios
Federal investigators have warned that the cyberextortion collective known as Scattered Spider is steadily expanding its reach to cover airlines and their technology vendors, a fresh alarm that has just been sounded for the aviation sector. According to an…
Over 40 Malicious Crypto Wallet Extensions Found on Firefox Add-Ons Store
In a disturbing cybersecurity development, researchers at Koi Security have uncovered more than 40 malicious Firefox browser extensions impersonating popular cryptocurrency wallets. These extensions, found on Mozilla’s official add-ons store, are designed to steal sensitive wallet credentials and recovery…
United States Imposes Ban on Russian Bulletproof Hosting Provider
There has been a considerable escalation in efforts by the United States towards combating cyber-enabled threats. As a result of the increase in efforts, the United States has officially blacklisted Aeza Group, a Russian supplier of bulletproof hosting services…
North Korean Malware Targets Mac Users in Crypto Sector via Calendly and Telegram
Cybersecurity researchers have identified a sophisticated malware campaign targeting Mac users involved in blockchain technologies. According to SentinelLabs, the attack has been linked to North Korean threat actors, based on an investigation conducted by Huntabil.IT. The attack method is…
Axis Max Life Cyberattack: A Warning to the Indian Insurance Sector
On July 2, 2025, Max Financial Services revealed a cybersecurity incident targeting its subsidiary, Axis Max Life Insurance, India’s fifth-largest life insurer. This incident raises severe concerns regarding data security and threat detection in the Indian insurance sector. The…
US Government Secretly Builds Enormous Database Tracking Citizens
An explosive story regarding the Trump administration’s collaboration with Palantir, which could result in the creation of a master database containing data on every American, was released by the New York Times last month. If such a “master list”…
Qantas Hit by Cyberattack Days After FBI Warning on Airline 2FA Bypass Threat
Just days after the FBI warned airlines about a surge in 2FA bypass attacks by the hacker group Scattered Spider, Australian airline Qantas has confirmed a major cybersecurity incident. The breach, which targeted a third-party platform used for customer…
Parking Meter QR Code Scam Grows Nationwide as “Quishing” Threatens Drivers
A growing scam involving fake QR codes on parking meters is putting unsuspecting drivers at risk of financial fraud. This deceptive tactic—called “quishing,” a blend of “QR” and “phishing”—relies on tampered QR codes that redirect people to bogus websites…
Ahold Delhaize USA Faces Data Breach Exposing Sensitive Information
In an announcement published by Ahold Delhaize, a leading global food retailer, the company confirmed that a significant data breach has compromised the personal information of over 2.2 million people across several countries. With nearly 10,000 stores located across Europe,…
Qantas Investigates Cyber Attack That May Have Affected Millions of Customers
Qantas Airways has revealed that a cyber attack on one of its third-party service platforms may have compromised the personal data of up to six million customers. The breach was linked to a customer service tool used by a…
Chaos Ransomware Strikes Optima Tax Relief, Leaks 69GB of Sensitive Customer Data
In a significant cybersecurity incident impacting the financial services sector, U.S.-based tax resolution firm Optima Tax Relief has reportedly suffered a ransomware attack orchestrated by the Chaos ransomware group. The attackers have allegedly exfiltrated and leaked approximately 69GB of…
Microsoft Phases Out Password Autofill in Authenticator App, Urges Move to Passkeys for Stronger Security
Microsoft is ushering in major changes to how users secure their accounts, declaring that “the password era is ending” and warning that “bad actors know it” and are “desperately accelerating password-related attacks while they still can.” These updates, rolling…
Horizon Healthcare RCM Reports Ransomware Breach Impacting Patient Data
Horizon Healthcare RCM has confirmed it was the target of a ransomware attack involving the theft of sensitive health information, making it the latest revenue cycle management (RCM) vendor to report such a breach. Based on the company’s breach…
Swiss Health Foundation Ransomware Attack Exposes Government Data
The Swiss government is announcing that a ransomware assault at the third-party company Radix has affected sensitive data from multiple federal offices. The Swiss authorities claim that the hackers obtained information from Radix systems and then posted it on…
How Ransomware Has Impacted Cyber Insurance Assessment Approach
Cyber insurance and ransomware The surge in ransomware campaigns has compelled cyber insurers to rethink their security measures. Ransomware attacks have been a threat for many years, but it was only recently that threat actors realized the significant financial benefits…
The Critical Role of Proxy Servers in Modern Digital Infrastructure
In order to connect an individual user or entire network to the broader internet, a proxy server serves as an important gateway that adds a critical level of protection to the broader internet at the same time. In order to…
FBI Raises Alarm as Scattered Spider Threat Group Expands Target Sectors
The Federal Bureau of Investigation (FBI) has issued a high-level cybersecurity alert warning about the growing threat posed by Scattered Spider, a cybercriminal group now targeting the transportation sector specifically the aviation industry and expanding its focus to insurance…
Cybercriminals Target AI Enthusiasts with Fake Websites to Spread Malware
Cyber attackers are now using people’s growing interest in artificial intelligence (AI) to distribute harmful software. A recent investigation has uncovered that cybercriminals are building fake websites designed to appear at the top of Google search results for popular…
Deepfakes Explained: How They Operate and How to Safeguard Yourself
In May of this year, an anonymous person called and texted elected lawmakers and business executives pretending to be a senior White House official. U.S. senators were among the recipients who believed they were speaking with White House chief…
Microsoft Defender for Office 365 Will Now Block Email Bombing Attacks
Microsoft Defender for Office 365, a cloud-based email safety suite, will automatically detect and stop email-bombing attacks, the company said. Previously known as Office 365 Advanced Threat Protection (Office 365 ATP), Defender for Office 365 safeguards businesses operating in high-risk…
Scattered Spider Hackers Target Airline Industry Amid FBI and Cybersecurity Warnings
The FBI has issued a new warning about the cybercriminal group known as Scattered Spider, which is now actively targeting the airline industry. Recent cyber incidents at Hawaiian Airlines and Canadian carrier WestJet underscore the growing threat. According to…
Recognizing the Messages That Signal a Security Breach
Increasingly, cybersecurity experts warn that using traditional antimalware tools can lead to a false sense of security if used in conjunction with a system of prevention. In today’s rapidly evolving threat environment, this software remains a staple of personal…
FBI Warns Airlines and Insurers as Scattered Spider Ransomware Attacks Surge
When the Federal Bureau of Investigation (FBI) sounds the alarm on cybersecurity, organizations should take immediate notice. The latest urgent warning involves the notorious Scattered Spider group, which has already made headlines for attacking major retailers such as Marks…
ByBit Crypto Heist: First Half of 2025 Records All-time High Crypto Theft
2025 H1 records all-time crypto theft In the first half of 2025, hackers stole a record $2.1 billion in cryptocurrency, marking an all-time high. The data highlights the vulnerable state of the cryptocurrency industry. North Korean state-sponsored hackers accounted for…
FBI Warns of Scattered Spider Cyberattacks on Airline and Transport Sectors
The FBI, along with top cybersecurity firms, has issued a fresh warning that the notorious hacking group Scattered Spider is expanding its targets to include the airline and broader transportation industries. In a statement released Friday and shared with…
Chinese Attackers Target France Infrastructure in Ivanti Zero-Day Exploit Campaign
The French cybersecurity agency stated in a study released Tuesday that three zero-day flaws impacting Ivanti Cloud Services Appliance devices triggered an attack spree in France last year that affected several critical infrastructure sectors. The French National Agency for…
Denmark Empowers Public Against Deepfake Threats
A groundbreaking bill has been proposed by the Danish government to curb the growing threat of artificial intelligence-generated deepfakes, a threat that is expected to rise in the future. In the proposed framework, individuals would be entitled to claim…
North Korea-Linked Hackers Behind $2.1 Billion in Crypto Theft in Early 2025
A new report from blockchain analytics firm TRM Labs reveals that hackers stole an unprecedented $2.1 billion in cryptocurrency during the first half of 2025—marking the highest amount ever recorded for a six-month period. A staggering 70% of the…
UK Man Accused in Major International Hacking Case, Faces US Charges
A 25-year-old British citizen has been formally charged in the United States for allegedly leading an international hacking operation that caused millions in damages to individuals, companies, and public institutions. Authorities in the US claim the man, identified as Kai…
Personal AI Agents Could Become Digital Advocates in an AI-Dominated World
As generative AI agents proliferate, a new concept is gaining traction: AI entities that act as loyal digital advocates, protecting individuals from overwhelming technological complexity, misinformation, and data exploitation. Experts suggest these personal AI companions could function similarly to…
2.2 Million People Impacted by Ahold Delhaize Data Breach
Ahold Delhaize, the Dutch grocery company, reported this week that a ransomware attack on its networks last year resulted in a data breach that affected more than 2.2 million customers. The cybersecurity breach was discovered in November 2024, when…
Cybercrime Gang Hunters International Shuts Down, Returns Stolen Data as Goodwill
Cybercrime gang to return stolen data The Hunters International Ransomware-as-a-Service (RaaS) operation has recently announced that it is shutting down its operation and will provide free decryptors to help targets recover their data without paying a ransom. “After careful consideration…
Cloudflare Thwarts Record-Breaking DDoS Attack as Global Threat Escalates
Cloudflare has successfully blocked the largest distributed denial-of-service (DDoS) attack ever recorded, marking a significant moment in the escalating battle against cyber threats. The attack peaked at an unprecedented 7.3 terabits per second (Tbps), targeting an unnamed hosting provider…
WhatsApp Under Fire for AI Update Disrupting Group Communication
The new artificial intelligence capability introduced by WhatsApp aims to transform the way users interact with their conversations through sophisticated artificial intelligence. It uses advanced technology from Meta AI to provide a concise summary of unread messages across individual chats…
A Simple Guide to Launching GenAI Successfully
Generative AI (GenAI) is one of today’s most exciting technologies, offering potential to improve productivity, creativity, and customer service. But for many companies, it becomes like a forgotten gym membership, enthusiastically started, but quickly abandoned. So how can businesses…
California Residents Are Protesting Against Waymo Self-Driving Cars
Even though self-driving cars are becoming popular worldwide, not everyone is happy about it. In Santa Monica, California, some people who were unfortunate enough to live near the Waymo depot found a terrible side effect of Alphabet’s self-driving cars:…
Dire Wolf Gang Hits Tech and Manufacturing Sectors, Targets 11 Countries
New Group Dire Wolf Attacks A new group, known as “Dire Wolf”, launched last month, has targeted 16 organizations worldwide, primarily in the manufacturing and technology sectors. The group deploys a double extortion technique for ransom and uses custom encryptors…
North Korean Hackers Target Fintech and Gaming Firms with Fake Zoom Apps
A newly uncovered cyber campaign is targeting organizations across North America, Europe, and the Asia-Pacific by exploiting fake Zoom applications. Cybersecurity experts have traced the operation to BlueNoroff, a notorious North Korean state-backed hacking group affiliated with the Lazarus…
Surmodics Hit by Cyberattack, Shuts Down IT Systems Amid Ongoing Investigation
Minnesota-headquartered Surmodics, a leading U.S. medical device manufacturer, experienced a cyberattack on June 5 that led to a partial shutdown of its IT infrastructure. The company, known for being the largest domestic supplier of outsourced hydrophilic coatings used in…
Fake Firefox Extensions Mimic Crypto Wallets to Steal Seed Phrases
Over 40 deceptive browser extensions available on Mozilla Firefox’s official add-ons platform are posing as trusted cryptocurrency wallets to steal user data, according to security researchers. These malicious add-ons are camouflaged as popular wallet brands such as MetaMask, Coinbase,…
OpenAI Rolls Out Premium Data Connections for ChatGPT Users
The ChatGPT solution has become a transformative artificial intelligence solution widely adopted by individuals and businesses alike seeking to improve their operations. Developed by OpenAI, this sophisticated artificial intelligence platform has been proven to be very effective in assisting users…
Ahold Delhaize Reports Major Data Breach Affecting Over 2 Million Employees in the U.S.
One of the world’s largest grocery retail groups has confirmed a major cyber incident that compromised sensitive information belonging to more than 2.2 million individuals across its U.S. operations. The company, known for running supermarket chains like Food Lion,…
Encryption Drops While Extortion-Only Attacks Surge
Ransomware remains a persistent threat to organisations worldwide, but new findings suggest cybercriminals are shifting their methods. According to the latest report by Sophos, only half of ransomware attacks involved data encryption this year, a sharp decline from 70…
Here’s Why Businesses Need to be Wary of Document-Borne Malware
The cybersecurity experts are constantly on the lookout for novel tactics for attack as criminal groups adapt to better defences against ransomware and phishing. However, in addition to the latest developments, some traditional strategies seem to be resurfacing—or rather,…