Category: CySecurity News – Latest Information Security and Hacking Incidents

Ukrainian Hackers Claim Major Cyberattack on Russian Drone Manufacturer

In an unsettling development in the ongoing cyber conflict linked to the Russia-Ukraine war, Ukrainian-aligned hacking groups have claimed responsibility for a large-scale cyberattack targeting a major Russian drone manufacturing company. The targeted firm, identified as Gaskar Group, is believed…

Hackers Use DNS Records to Hide Malware and AI Prompt Injections

  Cybercriminals are increasingly leveraging an unexpected and largely unmonitored part of the internet’s infrastructure—the Domain Name System (DNS)—to hide malicious code and exploit security weaknesses. Security researchers at DomainTools have uncovered a campaign in which attackers embedded malware directly…

UK Tax Fraud Scheme Uncovered Following Arrests in Romania

  Despite being organized and waged on a global scale, phishing-based tax fraud schemes that target the United Kingdom have emerged in recent years as a significant development in the fight against transnational cyber-enabled financial crime. An operation coordinated by…

Online Criminals Steal $500K Crypto Via Malicious AI Browser Extension

  A Russian blockchain engineer lost over $500,000 worth of cryptocurrencies in a sophisticated cyberattack, highlighting the persisting and increasing threats posed by hostile open-source packages. Even seasoned users can be duped into installing malicious software by attackers using public…

Gigabyte Firmware Vulnerability Enables Stealth UEFI Malware Infection

According to security researchers, a critical set of vulnerabilities has been identified in UEFI firmware for a number of motherboards manufactured by Gigabyte, causing serious concerns about device integrity and long-term system security, as well as serious concerns regarding device…

Linux Distribution Designed for Seamless Anonymous Browsing

Despite the fact that operating systems like Windows and macOS continue to dominate the global market, Linux has gained a steady following among users who value privacy and security as well as cybersecurity professionals, thanks to its foundational principles: transparency,…

Why Major Companies Are Still Falling to Basic Cybersecurity Failures

  In recent weeks, three major companies—Ingram Micro, United Natural Foods Inc. (UNFI), and McDonald’s—faced disruptive cybersecurity incidents. Despite operating in vastly different sectors—technology distribution, food logistics, and fast food retail—all three breaches stemmed from poor security fundamentals, not advanced…

Google Gemini Exploit Enables Covert Delivery of Phishing Content

  An AI-powered automation system in professional environments, such as Google Gemini for Workspace, is vulnerable to a new security flaw. Using Google’s advanced large language model (LLM) integration within its ecosystem, Gemini enables the use of artificial intelligence (AI)…

The Alarming Convergence of Cyber Crime and Real-World Threats

  It is becoming increasingly evident that every aspect of everyday life relies on digital systems in today’s hyper-connected world, from banking and shopping to remote work and social media, as well as cloud-based services. With more and more people…

Social Engineering Identified as Catalyst for M&S Ransomware Breach

  < div style=”text-align: justify;”> Marks & Spencer (M&S), one of the largest and most established retailers in the United Kingdom, has confirmed that a highly targeted social engineering operation triggered the ransomware attack in April 2025. This breach, which…

Google Gemini Bug Exploits Summaries for Phishing Scams

False AI summaries leading to phishing attacks Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links. Google…

Telefónica Investigates Claims of Major Data Breach by Cybercriminal

  An investigation has been conducted into a significant cybersecurity incident that occurred in 2025 at Telefónica, a global telecommunications company serving millions across Europe and Latin America. In addition to allegedly obtaining a considerable cache of confidential corporate data…

Here’s Why Cyber Security is Critical For Healthcare Sector

  Healthcare organisations provide an essential service that, if disrupted by a cyber attack, could jeopardise patient safety, disrupt care delivery, and even result in death. In the case of a security incident, the implications could impact not only the…

Can AI Be Trusted With Sensitive Business Data?

  As artificial intelligence becomes more common in businesses, from retail to finance to technology— it’s helping teams make faster decisions. But behind these smart predictions is a growing problem: how do you make sure employees only see what they’re…

Latest Malware “Mamona” Attacks Locally, Hides by Self Deletion

Cybersecurity experts are tracing Mamona, a new ransomware strain that is famous for its stripped-down build and silent local execution. Experts believe that the ransomware prevents the usual command-and-control (C2) servers, choosing instead a self-contained method that moves past tools…

Ingram Micro Faces Major Outage Following Ransomware Incident

  An assault on Ingram Micro’s global network started on July 3, which crippled parts of the company’s global network as well as disrupted its ordering portals and customer service channels. Ingram Micro is currently restoring critical systems.  It became…

The Rise of Digital Slavery in the Age of Global Cybercrime

  A growing number of cybercriminals are becoming more sophisticated and dangerous in the hyperconnected digital world of today. These criminals use advanced methods to exploit individuals and organisations who are not expecting them. To lure victims into divulging confidential…

DeepSeek Faces Ban From App Stores in Germany

  DeepSeek, a competitor of ChatGPT, may face legal ramifications in the European Union after the Berlin Commissioner for Data Protection ordered that Google and Apple remove the AI app from their stores.  After discovering that the DeepSeek app violates…

‘Hunters International’ RaaS Outfit Shuts Down Its Operation

  Hunters International, a ransomware-as-a-Service (RaaS) outfit, shut down operations and will provide free decryptors to victims seeking to restore their data without paying a ransom.  “After careful consideration and in light of recent developments, we have decided to close…

HPU Website Defaced in Cyberattack, Investigation Underway

  Shimla, June 10 — The official website of Himachal Pradesh University (HPU) experienced an unexpected breach earlier this week, when its homepage was briefly altered to display inappropriate and anti-national content. The incident prompted immediate action, with the university…

Office 365’s Microsoft Defender Now Thwarts Email Bombing Assaults

  Microsoft claims that the cloud-based email security suite Defender for Office 365 can now automatically detect and prevent email bombing attacks.  Defender for Office 365 (previously known as Office 365 Advanced Threat Protection or Office 365 ATP) guards organisations…

FBI Urges Airlines to Prepare for Evolving Threat Scenarios

  Federal investigators have warned that the cyberextortion collective known as Scattered Spider is steadily expanding its reach to cover airlines and their technology vendors, a fresh alarm that has just been sounded for the aviation sector. According to an…

Over 40 Malicious Crypto Wallet Extensions Found on Firefox Add-Ons Store

  In a disturbing cybersecurity development, researchers at Koi Security have uncovered more than 40 malicious Firefox browser extensions impersonating popular cryptocurrency wallets. These extensions, found on Mozilla’s official add-ons store, are designed to steal sensitive wallet credentials and recovery…

United States Imposes Ban on Russian Bulletproof Hosting Provider

  There has been a considerable escalation in efforts by the United States towards combating cyber-enabled threats. As a result of the increase in efforts, the United States has officially blacklisted Aeza Group, a Russian supplier of bulletproof hosting services…

Axis Max Life Cyberattack: A Warning to the Indian Insurance Sector

  On July 2, 2025, Max Financial Services revealed a cybersecurity incident targeting its subsidiary, Axis Max Life Insurance, India’s fifth-largest life insurer. This incident raises severe concerns regarding data security and threat detection in the Indian insurance sector.  The…

Ahold Delhaize USA Faces Data Breach Exposing Sensitive Information

In an announcement published by Ahold Delhaize, a leading global food retailer, the company confirmed that a significant data breach has compromised the personal information of over 2.2 million people across several countries.  With nearly 10,000 stores located across Europe,…

Swiss Health Foundation Ransomware Attack Exposes Government Data

  The Swiss government is announcing that a ransomware assault at the third-party company Radix has affected sensitive data from multiple federal offices. The Swiss authorities claim that the hackers obtained information from Radix systems and then posted it on…

How Ransomware Has Impacted Cyber Insurance Assessment Approach

Cyber insurance and ransomware The surge in ransomware campaigns has compelled cyber insurers to rethink their security measures. Ransomware attacks have been a threat for many years, but it was only recently that threat actors realized the significant financial benefits…

Microsoft Defender for Office 365 Will Now Block Email Bombing Attacks

Microsoft Defender for Office 365, a cloud-based email safety suite, will automatically detect and stop email-bombing attacks, the company said.  Previously known as Office 365 Advanced Threat Protection (Office 365 ATP), Defender for Office 365 safeguards businesses operating in high-risk…

Recognizing the Messages That Signal a Security Breach

  Increasingly, cybersecurity experts warn that using traditional antimalware tools can lead to a false sense of security if used in conjunction with a system of prevention. In today’s rapidly evolving threat environment, this software remains a staple of personal…

Denmark Empowers Public Against Deepfake Threats

  A groundbreaking bill has been proposed by the Danish government to curb the growing threat of artificial intelligence-generated deepfakes, a threat that is expected to rise in the future. In the proposed framework, individuals would be entitled to claim…

Personal AI Agents Could Become Digital Advocates in an AI-Dominated World

  As generative AI agents proliferate, a new concept is gaining traction: AI entities that act as loyal digital advocates, protecting individuals from overwhelming technological complexity, misinformation, and data exploitation. Experts suggest these personal AI companions could function similarly to…

2.2 Million People Impacted by Ahold Delhaize Data Breach

  Ahold Delhaize, the Dutch grocery company, reported this week that a ransomware attack on its networks last year resulted in a data breach that affected more than 2.2 million customers.  The cybersecurity breach was discovered in November 2024, when…

Cloudflare Thwarts Record-Breaking DDoS Attack as Global Threat Escalates

  Cloudflare has successfully blocked the largest distributed denial-of-service (DDoS) attack ever recorded, marking a significant moment in the escalating battle against cyber threats. The attack peaked at an unprecedented 7.3 terabits per second (Tbps), targeting an unnamed hosting provider…

WhatsApp Under Fire for AI Update Disrupting Group Communication

The new artificial intelligence capability introduced by WhatsApp aims to transform the way users interact with their conversations through sophisticated artificial intelligence. It uses advanced technology from Meta AI to provide a concise summary of unread messages across individual chats…

A Simple Guide to Launching GenAI Successfully

  Generative AI (GenAI) is one of today’s most exciting technologies, offering potential to improve productivity, creativity, and customer service. But for many companies, it becomes like a forgotten gym membership, enthusiastically started, but quickly abandoned. So how can businesses…

North Korean Hackers Target Fintech and Gaming Firms with Fake Zoom Apps

  A newly uncovered cyber campaign is targeting organizations across North America, Europe, and the Asia-Pacific by exploiting fake Zoom applications. Cybersecurity experts have traced the operation to BlueNoroff, a notorious North Korean state-backed hacking group affiliated with the Lazarus…

Fake Firefox Extensions Mimic Crypto Wallets to Steal Seed Phrases

  Over 40 deceptive browser extensions available on Mozilla Firefox’s official add-ons platform are posing as trusted cryptocurrency wallets to steal user data, according to security researchers. These malicious add-ons are camouflaged as popular wallet brands such as MetaMask, Coinbase,…

OpenAI Rolls Out Premium Data Connections for ChatGPT Users

The ChatGPT solution has become a transformative artificial intelligence solution widely adopted by individuals and businesses alike seeking to improve their operations. Developed by OpenAI, this sophisticated artificial intelligence platform has been proven to be very effective in assisting users…

Encryption Drops While Extortion-Only Attacks Surge

  Ransomware remains a persistent threat to organisations worldwide, but new findings suggest cybercriminals are shifting their methods. According to the latest report by Sophos, only half of ransomware attacks involved data encryption this year, a sharp decline from 70…

Here’s Why Businesses Need to be Wary of Document-Borne Malware

  The cybersecurity experts are constantly on the lookout for novel tactics for attack as criminal groups adapt to better defences against ransomware and phishing. However, in addition to the latest developments, some traditional strategies seem to be resurfacing—or rather,…