Category: CySecurity News – Latest Information Security and Hacking Incidents

Here’s Why Businesses Need to be Wary of Document-Borne Malware

  The cybersecurity experts are constantly on the lookout for novel tactics for attack as criminal groups adapt to better defences against ransomware and phishing. However, in addition to the latest developments, some traditional strategies seem to be resurfacing—or rather,…

Polymorphic Security Approaches for the Next Generation of Cyber Threats

  Considering the rapid evolution of cybersecurity today, organisations and security professionals must continue to contend with increasingly sophisticated adversaries in an ever-increasing contest. There is one class of malware known as polymorphic malware, which is capable of continuously changing…

How AI Impacts KYC and Financial Security

Finance has become a top target for deepfake-enabled fraud in the KYC process, undermining the integrity of identity-verification frameworks that help counter-terrorism financing (CTF) and anti-money laundering (AML) systems. Experts have found a rise in suspicious activity using AI-generated media,…

Navigating AI Security Risks in Professional Settings

  There is no doubt that generative artificial intelligence is one of the most revolutionary branches of artificial intelligence, capable of producing entirely new content across many different types of media, including text, image, audio, music, and even video. As…

FIR Filed After Noida Logistics Company Claims User Data Leaked

  High-profile clients’ private information, including that of top government officials, was leaked due to a significant cybersecurity incident at Agarwal Packers and Movers Ltd (APML) in India. Concerns over the security of corporate data as well as possible national…

Russian Threat Actors Circumvent Gmail Security with App Password Theft

  As part of Google’s Threat Intelligence Group (GTIG), security researchers discovered a highly sophisticated cyber-espionage campaign orchestrated by Russian threat actors. They succeeded in circumventing Google’s multi-factor authentication (MFA) protections for Gmail accounts by successfully circumventing it.  A group…

Malicious Copycat Repositories Emerge in Large Numbers on GitHub

  The researchers at the National Cyber Security Agency have identified a sophisticated campaign that involved malicious actors uploading more than 67 deceptive repositories to GitHub, masquerading as legitimate Python-based security and hacking tools.  In truth, these repositories actually serve…

The Rise in IT Helpdesk Scams: What Can Users Do?

  Over 37,500 complaints concerning phoney tech-support scams were filed in the United States last year alone, resulting in losses of over $924 million, according to the latest FBI’s Internet Crime Report.  In this piece, we’ll look at how these…

WhatsApp Ads Delayed in EU as Meta Faces Privacy Concerns

  Meta recently introduced in-app advertisements within WhatsApp for users across the globe, marking the first time ads have appeared on the messaging platform. However, this change won’t affect users in the European Union just yet. According to the Irish…

Krispy Kreme Confirms Cyberattack Affected Over 160,000 People

  Popular U.S.-based doughnut chain Krispy Kreme has confirmed that a cyberattack last year compromised the personal data of more than 160,000 individuals. According to a notification filed with the Maine Attorney General’s Office, the company stated that the breach…

DanaBot Malware Enables Data Breaches and Russian Espionage

  The United States has taken decisive action to eliminate one of the most persistent cybercrime threats in history by joining forces with international law enforcement bodies and several private cybersecurity companies to dismantle the infrastructure behind the notorious malware…

Keylogger Injection Targets Microsoft Exchange Servers

  Keylogging malware is a particularly dangerous as it is often designed to steal login passwords or other sensitive information from victims. When you add a compromised Exchange server to the mix, it makes things significantly worse for any organisation. …

Unwanted Emails Are Annoying But Unsubscribing Can Be Riskier

  A growing number of Gmail users consider the “unsubscribe” button to be a straightforward means of decluttering their overflowing inboxes, but cybersecurity experts are warning that a growing and mostly ignored threat is posing a serious threat. The unsubscribe…

Meta.ai Privacy Lapse Exposes User Chats in Public Feed

  Meta’s new AI-driven chatbot platform, Meta.ai, launched recently with much fanfare, offering features like text and voice chats, image generation, and video restyling. Designed to rival platforms like ChatGPT, the app also includes a Discover feed, a space intended…

Israel Iran Crisis Fuels Surge in State Backed Cyberattacks

  As Israeli and Iranian forces engaged in a conventional military exchange on June 13, 2025, the conflict has rapidly escalated into a far more complex and multi-faceted conflict that is increasingly involving a slew of coordinated cyberattacks against a…

Scania Targeted in Extortion Attempt Following Data Breach

  An alarm is triggered in both the automotive and financial industries when Scania Financial Services, based in Sweden, confirms that a cybersecurity incident has compromised sensitive company data, which has raised concerns in the industry.  The breach was reportedly…

New Malicious Python Package Found Stealing Cloud Credentials

  A dangerous piece of malware has been discovered hidden inside a Python software package, raising serious concerns about the security of open-source tools often used by developers. Security experts at JFrog recently found a harmful package uploaded to the…

Here’s Why Using SMS Two-Factor Authentication Codes Is Risky

  We’ve probably all received confirmation codes via text message when trying to enter into an account. These codes are intended to function as two-factor verification, confirming our identities and preventing cybercriminals from accessing our accounts solely through a password.…

Cyberattack Disrupts WestJet Systems as Investigation Begins

The second-largest airline in Canada, WestJet, is currently investigating an ongoing cyberattack which has compromised its internal systems as well as raising concerns about the risk of data loss to customers. As early as late last week, the airline was…

Signs Your Phone Has a Virus and How to Remove It Safely

  In today’s world, our phones are more than just communication devices — they’re essential for work, banking, shopping, and staying connected. That makes it all the more alarming when a device begins to behave strangely.  One possible cause? A…

Hackers Circumvent AntiVirus Using Google OAuth in New Malware Surge

  A new campaign of browser-based malware has emerged, revealing how hackers are now circumventing conventional antivirus protections by exploiting trusted domains like Google.com. This technique, according to a report by security researchers at c/side, is subtle, conditionally triggered, and…

The True Cost of Legacy Software: A Comprehensive Look

  Business leaders tend to stay with what they know. It’s familiar, comfy, and—above all—seems trustworthy. However, this comfort zone can be costing us more than they realise when it comes to legacy software systems.  Many leaders focus on the…

Microsoft Entra ID Faces Surge in Coordinated Credential-Based Attacks

An extensive account takeover (ATO) campaign targeting Microsoft Entra ID has been identified by cybersecurity experts, exploiting a powerful open-source penetration testing framework known as TeamFiltration.  First detected in December 2024, the campaign has accelerated rapidly, compromising more than 80,000…

Predator Spyware Campaign Resurfaces With a New Infrastructure

  The latest discovery of new Predator spyware-related equipment suggests that the surveillance technology is still finding new clients, despite US penalties imposed on its backers since July 2023.  In a report published earlier this month, analysts at Insikt Group…

Fake DeepSeek AI Installers Deliver BrowserVenom Malware

Cybersecurity researchers have released a warning about a sophisticated cyberattack campaign in which users are attempted to access DeepSeek-R1, a widely recognized large language model (LLM), which has been identified as a large language model. Cybercriminals have launched a malicious…

Fake Resumes Become Weapon of Choice for FIN6 Threat Group

  The FIN6 cybercrime group, which has been associated with financial breaches in the past, is now launching a sophisticated new campaign targeting corporate recruitment channels. The group, which is known as FIN6 cybercrime, has been associated with high-profile financial…

Smartwatches: New Air-Gapped System Assault Vehicle

  A novel assault identified as ‘SmartAttack’ leverages smartwatches as a covert ultrasonic signal receiver to extract data from physically isolated (air-gapped) devices. Air-gapped systems, which are often used in mission-critical environments such as government buildings, weapons platforms, and nuclear…

Zoomcar Data Breach Exposes Personal Information of 8.4 Million Users

  Zoomcar, a well-known car-sharing platform, recently reported that a cyberattack exposed the personal details of approximately 8.4 million users. The information that was accessed includes users’ names, phone numbers, and vehicle registration details. The company, based in Bengaluru, India,…

Aim Security Reveals Zero-Click Flaw in AI Powered Microsoft Copilot

  It has recently been reported that a breakthrough cyber threat known as EchoLeak has been documented as the first documented zero-click vulnerability that specifically targets Microsoft 365 Copilot in the enterprise. This raises important concerns regarding the evolving risks…

UEBA: A Smarter Way to Fight AI-Driven Cyberattacks

  As artificial intelligence (AI) grows, cyberattacks are becoming more advanced and harder to stop. Traditional security systems that protect company networks are no longer enough, especially when dealing with insider threats, stolen passwords, and attackers who move through systems…

Ransomware Attacks Continue to Rise in an Alarming Trend

  The frequency and intensity of cyberthreats seem to be increasing despite businesses’ ongoing efforts to thwart malicious actors. Honeywell, a global technology and manufacturing firm that also provides cybersecurity solutions, reported a 46% rise in ransomware extortion attacks between…

AI Integration Raises Alarms Over Enterprise Data Safety

  Today’s digital landscape has become increasingly interconnected, and cyber threats have risen in sophistication, which has significantly weakened the effectiveness of traditional security protocols. Cybercriminals have evolved their tactics to exploit emerging vulnerabilities, launch highly targeted attacks, and utilise…

GrayAlpha Exposed: Deploys Malware via Infection Vectors

Experts from Insikt Group have found new infrastructure linked with GrayAlpha, a cybercrime gang overlapping with the financially motivated group called FIN7. Fin7 has been in the cybercrime game since 2013 and is known as one of the most infamous…

United Natural Foods Confirms Network Disruption from Cyberattack

  United Natural Foods Inc.’s operations were disrupted by a serious cybersecurity incident. There have been widespread supply chain issues and widespread product shortages at Whole Foods Market locations all over the United States due to the company’s failure to…

Understanding the Dynamic threat Landscape of Ransomware Attacks

  The constant expansion of cyber threats, particularly malware and ransomware, necessitates our undivided attention. Our defence strategy must evolve in tandem with the threats. So far this year, ransomware has targeted Frederick Health Medical Group, Co-op Supermarkets, and Marks…

AT&T Customers at Risk Again After New Data Leak

  AT&T customers are once more facing serious security concerns following reports of a fresh leak involving their personal information. This comes after the telecom company experienced multiple data breaches last year. Previous Data Breaches Raised Alarms In 2024, AT&T…

Mirai Botnet Variant is Building Swarm by Exploiting DVR Flaw

  A command injection flaw in internet-connected digital video recorders used for CCTV monitoring is the target of a Mirai botnet malware variant, which allows hackers to take over the devices and add them to a botnet.  Cybersecurity researchers at…

Stolen Customer Data from Ticketmaster Incident Resurfaces Online

  Ticketmaster, one of the most prominent ticketing companies in the world, suffered a high-profile cyber-attack in May 2024 that affected the entire digital infrastructure of the company. The incident resulted in the unauthorised exposure of vast amounts of customer…

Cloudfare CAPTCHA Page Tricks Users Into Downloading Malware

An advanced but simple phishing tactic is being distributed, it deploys fake Cloudflare CAPTCHA pages to target users with malware.  A recent research by SlashNext says the technique, called  ClickFix tricks users into running commands that deploy malware. ClickFix shows…

FBI Urges Immediate Action as Play Ransomware Attacks Surge

  The Federal Bureau of Investigation (FBI) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have released a critical warning about the sharp rise in Play ransomware attacks. The agencies report that this cyber threat has affected hundreds of…

Weak Links in Healthcare Infrastructure Fuel Cyberattacks

  Increasingly, cybercriminals are exploiting systemic vulnerabilities in order to target the healthcare sector as one of the most frequently attacked and vulnerable targets in modern cybersecurity, with attacks growing both in volume and sophistication. These risks go well beyond…

Qilin Ransomware Actors Take Advantage of Newly Discovered Fortinet Bugs

  The recently observed increase in ransomware activity linked to the Qilin group has sparked alarms throughout the cybersecurity industry. As a result of these sophisticated Ransomware-as-a-Service (RaaS) operations operating under multiple aliases, including Phantom Mantis and Agenda, Fortinet’s recent…

Beware of Pig Butchering Scams That Steal Your Money

Pig butchering, a term we usually hear in the meat market, sadly, has also become a lethal form of cybercrime that can cause complete financial losses for the victims.  Pig Butchering is a “form of investment fraud in the crypto…

Kettering Health Ransomware Attack Linked to Interlock Group

  Kettering Health, a prominent healthcare network based in Ohio, is still grappling with the aftermath of a disruptive ransomware attack that forced the organization to shut down its computer systems. The cyberattack, which occurred in mid-May 2025, affected operations…

Securing the SaaS Browser Experience Through Proactive Measures

  Increasingly, organisations are using cloud-based technologies, which has led to the rise of the importance of security concerns surrounding Software as a Service (SaaS) platforms. It is the concept of SaaS security to ensure that applications and sensitive data…

US Federal Authorities Disrupt Growing Malware Pyramid Network

  A new study by Secureworks’ Counter Threat Unit (CTU) has revealed that ransomware operations have shifted significantly in response to heightened law enforcement crackdowns, forcing threat actors to evolve their strategies accordingly. There has been a tradition of many…

URL Scams Everywhere? These Steps Will Help You Stay Safe

Scam links are difficult to spot, but it has become an everyday issue for internet users who accidentally click on malicious URLs that are part of a phishing attack. Most fake links include standard “https” encryption and domains similar to…

FBI Alert: Play Ransomware Attacks 900 Organizations

In a recent joint cybersecurity advisory released with its Australian partners, the FBI announced that the Play ransomware group has attacked over 900 organizations since May 2025. “As of May 2025, FBI was aware of approximately 900 affected entities allegedly…