A fresh bout of online actions emerged overnight Friday into Saturday, running parallel to air assaults carried out jointly by U.S. and Israeli forces against sites inside Iran, security researchers noted. The timing suggests the virtual maneuvers were linked…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Hackers Exploit OpenClaw Bug to Control AI Agent
Cybersecurity experts have discovered a high-severity flaw named “ClawJacked” in the famous AI agent OpenClaw that allowed a malicious site bruteforce access silently to a locally running instance and take control. Oasis Security found the issue and informed OpenClaw, a…
GlassWorm Abuses 72 Open VSX Extensions in Bold Supply-Chain Assault
GlassWorm has resurfaced with a more aggressive supply‑chain campaign, this time weaponizing the Open VSX registry at scale to target developers. Security researchers say the latest wave represents a significant escalation in both scope and stealth compared to earlier…
Security Specialists Warn That Full Photo Access Can Expose Personal Data
Mobile devices have become silent archives of modern life, storing everything from personal family moments to copies of identification documents and work files. However, their convenience has also made them a very attractive target for cyber-espionage activities. The Google…
Meta to Discontinue End-to-End Encrypted Chats on Instagram Come May 2026
Meta Platforms has confirmed that it will remove support for end-to-end encrypted messaging in Instagram direct messages beginning May 8, 2026. After this date, conversations that previously relied on this encryption feature will no longer be protected by the…
Shadow AI Risks Rise as Employees Use Generative AI Tools at Work Without Oversight
With speed surprising even experts, artificial intelligence now appears routinely inside office software once limited to labs. Because uptake grows faster than oversight, companies care less about who uses AI and more about how safely it runs. Research referenced…
Debunking the Myth of “Military‑Grade” Encryption
Military-grade encryption sounds impressive, but in reality it is mostly a marketing phrase used by VPN providers to describe widely available, well‑tested encryption standards like AES‑256 rather than some secret military‑only technology. The term usually refers to the Advanced…
Chinese Threat Actors Attack Southeast Asian Military Targets via Malware
A China-based cyber espionage campaign is targeting Southeast Asian military targets. The state-sponsored campaign started in 2020. Palo Alto Networks Unit 42 has been tracking the campaign under the name CL-STA-1087. Here, CL means cluster, and STA means state-backed motivation. …
Researchers Investigate AI Models That Can Interpret Fragmented Cognitive Signals
Despite being among the most complex and least understood systems in science for decades, the human brain continues to be one of the most complex and least understood. Advancements in brain-imaging technology have enabled researchers to observe neural activity…
CISA Reveals New Details on RESURGE Malware Exploiting Ivanti Zero-Day Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published fresh technical insights into RESURGE, a malicious implant leveraged in zero-day attacks targeting Ivanti Connect Secure appliances through the vulnerability tracked as CVE-2025-0282. The latest advisory highlights the implant’s…
Rust-Based VENON Malware Targets 33 Brazilian Banks
A newly identified banking malware strain called VENON is targeting users in Brazil and stands out for an unusual technical choice. Instead of relying on the Delphi programming language used by many long-running Latin American banking trojans, the new…
Windows Telemetry Explained: What Diagnostic Data Microsoft Collects and Why It Matters
Years after Windows 10 arrived, a single aspect keeps stirring conversation – telemetry. This data gathering, labeled diagnostic info by Microsoft, pulls details from machines without manual input. Its purpose? Keeping systems stable, secure, running smoothly. Yet reactions split…
The Global Cyber Fraud Wave Is Being Supercharged by Artificial Intelligence
It is becoming increasingly common for organizations to rethink how security operations are structured and managed as the digital threat landscape continues to evolve. Artificial intelligence is increasingly becoming an integral part of modern cyber defense strategies due to…
French FICOBA Breach Exposes 1.2M Bank Accounts
A major cyberattack struck France’s national bank account registry, FICOBA, exposing sensitive data from over 1.2 million accounts.The breach occurred in late January 2026 when hackers stole login credentials from a civil servant and impersonated an authorized user to…
Experts Warn About AI-assisted Malwares Used For Extortion
AI-based Slopoly malware Cybersecurity experts have disclosed info about a suspected AI-based malware named “Slopoly” used by threat actor Hive0163 for financial motives. IBM X-Force researcher Golo Mühr said, “Although still relatively unspectacular, AI-generated malware such as Slopoly shows how…
Meta Targets 150K Accounts in Southeast Asia Scam Operation
Meta announced that it has removed more than 150,000 accounts tied to organized scam centers operating in Southeast Asia, describing the move as part of a large international effort to disrupt coordinated online fraud networks. The enforcement action was…
Google API Keys Expose Gemini AI Data via Leaked Credentials
Google API keys, once considered harmless when embedded in public websites for services like Maps or YouTube, have turned into a serious security risk following the integration of Google’s Gemini AI assistant. Security researchers at Truffle Security uncovered this…
Silent Scam Calls Used to Verify Active Phone Numbers, Cybersecurity Experts Warn
Many people have answered calls from unfamiliar numbers only to hear silence on the other end. In some cases, no one speaks at all. In others, there is a short delay before a caller finally responds. While this may…
AI is Reshaping How Hackers Discover and Exploit Digital Weaknesses
Throughout history, artificial intelligence has been hailed as the engine of innovation, revolutionizing data analysis, automation of business processes, and strategic decision-making. However, the same capabilities that enable organizations to work more efficiently and efficiently are quietly transforming the…
ShinyHunters Threatens Data Leak After Alleged Salesforce Breach
The hacking group ShinyHunters has warned roughly 400 companies that it may publish stolen data online if ransom demands are not met. The group claims it accessed private records through websites built on Salesforce Experience Cloud, a platform companies…