The Indian Ministry of Home Affairs has revealed that seven key airports in the country were hit by GPS spoofing cyber attacks in November 2025, Union Civil Aviation Minister Ram MohanNaidu said. The airports affected are the Indira Gandhi…
Category: CySecurity News – Latest Information Security and Hacking Incidents
AI IDE Security Flaws Exposed: Over 30 Vulnerabilities Highlight Risks in Autonomous Coding Tools
More than 30 security weaknesses in various AI-powered IDEs have recently been uncovered, raising concerns as to how emerging automated development tools might unintentionally expose sensitive data or enable remote code execution. A collective set of vulnerabilities, referred to…
Portugal Updates Cybercrime Law To Protect Good-Faith Security Researchers
Portugal has updated its cybercrime law to offer legal protection to security researchers who probe systems in good faith and report vulnerabilities responsibly. The change creates a legal safe harbor for ethical hacking, turning what was previously classified as…
Palo Alto GlobalProtect Portals Face Spike in Suspicious Login Attempts
Among the developments that have disturbed security teams around the world, threat-intelligence analysts have detected a sudden and unusually coordinated wave of probing of Palo Alto Networks’ GlobalProtect remote access infrastructure. This activity appears to be influenced by the…
Fake RTO e-Challan WhatsApp Scam Resurfaces: Fraudsters Push Spyware Through Malicious APK Files
Cybercriminals have once again revived an old trick—but with a more convincing disguise. This time, scammers are exploiting the name of the official RTO e-challan system to deceive smartphone users. Over the past year, malicious APK files have been…
React2Shell Exploited Within Hours as Firms Rush to Patch
Two hacking groups linked to China have started exploiting a major security flaw in React Server Components (RSC) only hours after the vulnerability became public. The flaw, tracked as CVE-2025-55182 and widely called React2Shell, allows attackers to gain unauthenticated…
Cloudflare Blocks Largest DDoS Attack in History as Global Cyber Threats Surge
Cloudflare announced on Wednesday that it has detected and stopped the largest distributed denial of service (DDoS) attack ever recorded. The attack peaked at 29.7 terabits per second and lasted 69 seconds. The company said the traffic came from a…
Google’s New Update Allows Employers To Archive Texts On Work-Managed Android Phones
A recent Android update has marked a paradigm shifting change in how text messages are handled on employer-controlled devices. This means Google has introduced a feature called Android RCS Archival, which lets organisations capture and store all RCS, SMS,…
NATO Concludes Cyber Coalition Exercise in Estonia, Preparing for Future Digital Threats
NATO has wrapped up its annual Cyber Coalition exercise in Estonia after a week of intensive drills focused on protecting networks and critical infrastructure from advanced cyberattacks. More than 1,300 cyber defenders joined the 2025 exercise. Participants represented 29…
AI-Assisted Cyberattacks Signal a Shift in Modern Threat Strategies and Defense Models
A new wave of cyberattacks is using large language models as an offensive tool, according to recent reporting from Anthropic and Oligo Security. Both groups said hackers used jailbroken LLMs-some capable of writing code and conducting autonomous reasoning-to conduct…
Beer Firm Asahi Not Entertaining Threat Actors After Cyberattack
Asahi denies ransom payment Japanese beer giant Asahi said that it didn’t receive any particular ransom demand from threat actors responsible for an advanced and sophisticated cyberattack that could have exposed the data of more than two million people. About…
Android Users Face New WhatsApp Malware Threat
Cybersecurity researchers at security firm Cleafy have issued a warning regarding a high risk malware campaign aimed at Android users via WhatsApp messages that could jeopardize users’ cryptocurrency wallets and bank information. The researchers tracked the threat as Albiriox, a new…
Growing Concerns Over Wi-Fi Router Surveillance and How to Respond
A new report from security researchers warns that a humble Wi-Fi router has quietly become one of the most vulnerable gateways into home and work in an era where digital dependency is becoming more prevalent each day. Despite being…
How Security Teams Can Turn AI Into a Practical Advantage
Artificial intelligence is now built into many cybersecurity tools, yet its presence is often hidden. Systems that sort alerts, scan emails, highlight unusual activity, or prioritise vulnerabilities rely on machine learning beneath the surface. These features make work faster,…
Critical Vulnerabilities Found in React Server Components and Next.js
Open in the wild flaw The US Cybersecurity and Infrastructure Security Agency (CISA) added a critical security flaw affecting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog after exploitation in the wild. The flaw CVE-2025-55182 (CVSS score:…
London Councils Hit by Cyberattacks Disrupting Public Services and Raising Security Concerns
Multiple local authorities across London have been hit by cyber incidents affecting operations and public services, according to reports emerging overnight. The attacks have disrupted essential council functions, including communication systems and digital access, prompting heightened concern among officials…
Global Executives Rank Misinformation, Cyber Insecurity and AI Risks as Top Threats: WEF Survey 2025
Business leaders across major global economies are increasingly concerned about the rapid rise of misinformation, cyber threats and the potential negative impacts of artificial intelligence, according to new findings from the World Economic Forum (WEF). The WEF Executive Opinion…
The New Content Provenance Report Will Address GenAI Misinformation
The GenAI problem Today’s information environment includes a wide range of communication. Social media platforms have enabled reposting, and comments. The platform is useful for both content consumers and creators, but it has its own challenges. The rapid adoption of…
Balancing Rapid Innovation and Risk in the New Era of SaaS Security
The accelerating pace of technological innovation is leaving a growing number of organizations unwittingly exposing their organization to serious security risks as they expand their reliance on SaaS platforms and experiment with emerging agent-based AI algorithms in an effort…
FBI Warns of Cybercriminals Impersonating IC3 to Steal Personal Data
The FBI has issued a public service announcement warning that cybercriminals are impersonating the FBI’s Internet Crime Complaint Center (IC3) and even cloning its website to steal victims’ personal and financial data.Attackers are exploiting public trust in federal law…