President Donald Trump stated that his administration has learnt from Signalgate. “I think we learnt: Maybe don’t use Signal, okay?” Trump spoke about the messaging app in an interview with The Atlantic published Monday. “If you want to know…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Cybercriminals Behind DOGE Big Balls Ransomware Demand $1 Trillion, Troll Elon Musk
A cybercrime group notorious for its outrageous tactics has resurfaced with a ransomware attack demanding an unbelievable $1 trillion from its victims. The group, responsible for the DOGE Big Balls ransomware campaign, has updated its ransom demands with bizarre…
Firewalls and VPNs Under Siege as Businesses Report Growing Cyber Intrusions
A security researcher has discovered an ongoing cyberattack that is active, exploiting a newly discovered vulnerability in Fortinet’s FortiGate Firewalls to infiltrate corporate and enterprise networks and has been conducting this activity for some time. A security advisory published…
Don’t Delete Spam Emails Too Quickly — Here’s Why
Most of us delete spam emails as soon as they land in our inbox. They’re irritating, unwanted, and often contain suspicious content. But what many people don’t know is that keeping them, at least briefly can actually help improve…
Scientists Warn of Cybersecurity Threats in Next-Gen DNA Sequencing
Next-generation DNA sequencing (NGS) is under increasing criticism for its cyber risks. While NGS has transformed disciplines ranging from cancer diagnosis to infectious disease tracking, a recent study warns that the platforms that enable these advancements could also be…
Google Ends Privacy Sandbox, Keeps Third-Party Cookies in Chrome
Google has officially halted its years-long effort to eliminate third-party cookies from Chrome, marking the end of its once-ambitious Privacy Sandbox project. In a recent announcement, Anthony Chavez, VP of Privacy Sandbox, confirmed that the browser will continue offering…
Investigating the Role of DarkStorm Team in the Recent X Outage
It has been reported that Elon Musk’s social media platform, X, formerly known as Twitter, was severely disrupted on Monday after a widespread cyberattack that has caused multiple service disruptions. Data from outage monitoring service Downdetector indicates that at…
Millions at Risk as Malicious Actors Hijack Popular YouTube Accounts
At a startling rate, cybercriminals are taking over well-known YouTube channels, exposing viewers to malware, frauds, and data theft. With billions of views and millions of followers at risk, a single mistake can have disastrous results. According to new…
North Korean Hacker Group Targets Cryptocurrency Developers via LinkedIn
A North Korean threat group known as Slow Pisces has launched a sophisticated cyberattack campaign, focusing on developers in the cryptocurrency industry through LinkedIn. Also referred to as TraderTraitor or Jade Sleet, the group impersonates recruiters offering legitimate job…
Chinese Ghost Hackers Focus on Profits, Attack Key Sectors in the US and UK
In the world of cybercrime, criminals usually fall into two groups. Some target individuals, tricking them for money. Others go after important organizations like hospitals and companies, hoping for bigger payouts. Although attacks on healthcare are less common, they…
SK Telecom Malware Attack Exposes USIM Data in South Korea
SK Telecom, South Korea’s top mobile carrier, has disclosed a security incident involving a malware infection that exposed sensitive information tied to users’ Universal Subscriber Identity Modules (USIMs). The breach was detected on the night of April 19, 2025,…
Zoom Platform Misused by Elusive Comet Attackers in Fraud Scheme
Recent reports suggest that North Korean threat actors are now employing an alarming evolution in the tactics they employ to launch a sophisticated cybercrime operation known as Elusive Comet, a sophisticated cybercrime operation. This newly uncovered campaign demonstrates a…
Cybersecurity Alert Says Fake PDF Converters Stealing Sensitive Information
Online PDF converters provide efficient conversions of documents from one file format to another, and millions of individuals and businesses use these services to do so. However, this free service also poses significant cybersecurity risks despite its convenience. According…
How to Protect Your Smartphone During US Border Crossings
Crossing into the United States has become riskier since the start of Trump’s second administration. Foreign visitors and US visa holders are increasingly being detained, questioned, or deported. As uncertainty grows, travel demand from Canada and Europe has dropped…
‘Fog’ Attackers Mock Victims With DOGE Ransom Notes
Fog ransomware assaults over the last month have included a new ransom note mentioning the US Department of Government Efficiency (DOGE) and enticing victims to propagate the malware to other PCs, Trend Micro said earlier this week. Analysis of…
Cybercriminals Are Now Focusing More on Stealing Credentials Than Using Ransomware, IBM Warns
A new report from IBM’s X-Force 2025 Threat Intelligence Index shows that cybercriminals are changing their tactics. Instead of mainly using ransomware to lock systems, more hackers are now trying to quietly steal login information. IBM studied over 150…
Tesla Users Targeted by Dangerous New Malware: What You Should Know
Tesla has often made headlines lately, but this new problem is not connected to Elon Musk or his cars. Instead, it involves cybercriminals who are trying to steal people’s private information using a dangerous software called Agent Tesla. Here’s…
Pentagon Director Hegseth Revealed Key Yemen War Plans in Second Signal Chat, Source Claims
In a chat group that included his wife, brother, and personal attorney, U.S. Defence Secretary Pete Hegseth provided specifics of a strike on Yemen’s Iran-aligned Houthis in March, a person familiar with the situation told Reuters earlier this week. …
Pune Company Falls Victim to ₹6.49 Crore Cyber Fraud in Major Man-in-the-Middle Attack
A 39-year-old director of a Mohammedwadi-based firm, which operates in IT services and dry fruit imports, was duped into transferring ₹6.49 crore following a sophisticated Man-in-the-Middle (MitM) cyberattack on March 27. In a MitM scam, cybercriminals secretly intercept communications…
Preventing Unauthorised Recovery of Deleted Files
As far as users are concerned, once a file is removed from their computer, it is forever gone. However, the reality is more complex. The likelihood of recovering a deleted file depends on how it was deleted, as well…