The blockchain security company CertiK disclosed how a new generation of scammers is changing their tactics to target automated trading bots in the wake of the LIBRA meme currency fiasco, in which insiders were given advanced information of the…
Category: CySecurity News – Latest Information Security and Hacking Incidents
These Four Basic PC Essentials Will Protect You From Hacking Attacks
There was a time when the internet could be considered safe, if the users were careful. Gone are the days, safe internet seems like a distant dream. It is not a user’s fault when the data is leaked, passwords are…
Strengthening PC Security with Windows Whitelisting
Windows Defender, the built-in antivirus tool in Windows, provides real-time protection against malware by scanning for suspicious activity and blocking known threats using an extensive virus definition database. However, no antivirus software can completely prevent users from unknowingly installing…
Default Password Creates Major Security Risk for Apartment Complexes
Under research conducted by security researchers, it was discovered that a widely used door access control system includes an inherently insecure default password. Thousands of buildings across the country have insecure default passwords that can be accessed easily and…
Stalkerware: How Scammers Might Be Tracking Your Phone and What You Can Do
Spyware applications designed to secretly monitor people’s phones are becoming more common. These programs, known as stalkerware, can track private messages, calls, photos, locations, and other personal data without the user’s knowledge. Often installed without permission, they operate silently…
LightSpy Malware Attacks Users, Launches Over 100 Commands to Steal Data
Cybersecurity researchers at Hunt.io have found an updated version of LightSpy implant, a modular surveillance framework for data collection and extraction. Famous for attacking mobile devices initially, further enquiry revealed it can attack macOS, Windows, Linux, and routers. LightSpy has…
Bybit Suffers Historic $1.5 Billion Crypto Hack, Lazarus Group Implicated
Dubai-based cryptocurrency exchange Bybit Technology Ltd. has fallen victim to a massive cyberattack, with approximately $1.5 billion in cryptocurrency stolen. The breach is believed to be the largest single theft in cryptocurrency history. Bybit, a well-established exchange with over…
DM Clinical Research Database Exposed Online, Leaking 1.6M Patient Records
A clinical research database containing over 1.6 million patient records was discovered publicly accessible online without encryption or password protection. Security researcher Jeremiah Fowler found the dataset, linked to DM Clinical Research, exposing sensitive information such as names, medical…
Beware of Fake Viral Video Links Spreading Malware
McAfee Labs has uncovered a rise in cyber scams where fraudsters use fake viral video links to trick people into downloading malware. These attacks rely on social engineering, enticing users with promises of exclusive or leaked content. Once a…
Open Access to Critical Data With Bank Staff Leading to Financial Scam
A concerning trend has sent shockwaves across cybersecurity authorities, with central cyber and intelligence organisations tracking and documenting large-scale data leaks perpetrated by bank staff and third party contractors. According to a senior Indian government official, the issue has…
Call Merging Scams and Financial Security Risks with Prevention Strategies
It is not uncommon for fraudsters to develop innovative tactics to deceive their targets, with one of the latest scams being the called merging scam in which the scammers attempt to gain unauthorized access to the victim’s accounts to…
BlackLock Ransomware: The Fastest-Growing Cyber Threat and How to Stay Safe
Ransomware remains a major problem for businesses, and a new cybercriminal group is expanding at an alarming rate. Security researchers at ReliaQuest have identified BlackLock as the fastest-growing ransomware operation today, with its activity increasing by 1,425% since late…
Bybit Crypto Exchange Hacked for $1.5 Billion in Largest Crypto Heist
Bybit, one of the world’s largest cryptocurrency exchanges, has suffered a massive security breach, resulting in the loss of $1.5 billion in digital assets. The hack, now considered the largest in crypto history, compromised the exchange’s cold wallet—an offline…
Building Robust AI Systems with Verified Data Inputs
Artificial intelligence is inherently dependent on the quality of data that powers it for it to function properly. However, this reliance presents a major challenge to the development of artificial intelligence. There is a recent report that indicates that…
Role of Continuous Threat Exposure Management in Business Security
Continuous threat exposure management (CTEM) is a framework for proactively managing and mitigating threat exposure using an iterative approach that emphasises on developing structured organisational procedures as well as leveraging security tools. In this article, we’ll go over CTEM,…
Massive Banking Data Leaks Under Scrutiny as Cyber Fraud Cases Surge
A concerning rise in large-scale data breaches has put cybersecurity agencies on high alert, with central cyber and intelligence bodies actively tracking incidents linked to bank employees and third-party vendors. According to a senior government official, the matter has…
University of Notre Dame Hit by Cyberattack— Hackers Say They Stole Everything
A cybercriminal group known as Fog Ransomware has claimed responsibility for a cyberattack on the University of Notre Dame in Perth, Australia. According to reports, the group has allegedly stolen 62.2GB of sensitive data, including student medical records, staff…
Black Basta’s Slowdown Coincides with BlackLock’s Growth
The activity level of ransomware groups with “black” in their name has varied greatly over the early months of the new year. Despite the significant increase in attacks caused by the BlackLock ransomware group, the long-established Black Basta ransomware…
European Healthcare Entities Targeted With NailaoLocker Ransomware
A previously undocumented ransomware payload named NailaoLocker has been detected in assaults targeting European healthcare entities between June and October 2024. The attackers employed CVE-2024-24919, a Check Point Security Gateway vulnerability, to obtain access to targeted networks and install…
Hidden Bluetooth Security Threats and How to Protect Your Devices
Bluetooth technology has made wireless connectivity effortless, powering everything from headphones and smartwatches to home automation systems. However, its convenience comes with significant security risks. Many users unknowingly leave their devices vulnerable to cyber threats that can steal personal…
Serious Security Flaw in Exim Email Servers Could Let Hackers Steal Data
A dangerous security flaw has been discovered in Exim, a widely used email server software. The vulnerability, officially tracked as CVE-2025-26794, allows hackers to inject harmful commands into the system, potentially leading to data theft or even complete control…
Internal Chat Logs of Black Basta Ransomware Gang Leaked Online
A previously unidentified source has leaked what is claimed to be an archive of internal Matrix chat logs linked to the Black Basta ransomware group. The individual behind the leak, known as ExploitWhispers, initially uploaded the stolen messages to…
Hackers Use Invisible Unicode Trick to Hide Phishing Attacks
Cybercriminals have discovered a new way to conceal malicious code inside phishing attacks by using invisible Unicode characters. This technique, identified by Juniper Threat Labs, has been actively used in attacks targeting affiliates of a U.S. political action committee…
Lack of Phishing Awareness Among Executives Poses a Security Threat
Even though phishing scams are predicted to continue to pose a serious cybersecurity threat in the years to come, recent research has highlighted the fact that a worrying gap in awareness among business leaders has been identified as a…
Australian IVF Giant Genea Suffers Data Breach Following Cyber Incident
A leading Australian IVF clinic suspects personal patient information may have been compromised during a cyber attack earlier this month. On February 14, Genea suspended several services and launched an inquiry into suspicious activity discovered on its network. In…
US Defense Industry Targeted in Infostealer Malware Campaign
Several major defence contractors, such as Lockheed Martin, Boeing, and Honeywell, as well as the United States Army, and Navy, and several major defence contractors have been recently revealed to be infected with the Infostealer malware, according to Hudson…
FBI And CISA Issues Warning of Ongoing ‘Ghost’ Ransomware Attack
Ghost, a ransomware outfit, has been exploiting software and firmware flaws since January, according to an FBI and Cybersecurity and Infrastructure Security Agency (CISA) advisory issued last week. The outfit, also known as Cring and based in China, focusses…
Hackers Release Powerful Tool to Unlock Microsoft Software for Free
A group of hackers has created a tool that allows people to activate Microsoft Windows and Office software without needing an official license. This method, described as a major breakthrough in software piracy, completely bypasses Microsoft’s security system. Surprisingly,…
Lee Enterprises Faces Prolonged Ransomware Attack Disrupting Newspaper Operations
Lee Enterprises, one of the largest newspaper publishers in the United States, is facing an ongoing ransomware attack that has severely disrupted its operations for over three weeks. The company confirmed the attack in a filing with the U.S.…
Fintech Giant Finastra Breach Exposed Private Data, Company Notifies Victims
The financial technology behemoth Finastra is alerting victims of a data breach after unidentified hackers initially gained access to its networks in October 2024 and took their personal data. More than 8,100 financial institutions in 130 countries, including 45…
South Korea Blocks DeepSeek AI App Downloads Amid Data Security Investigation
South Korea has taken a firm stance on data privacy by temporarily blocking downloads of the Chinese AI app DeepSeek. The decision, announced by the Personal Information Protection Commission (PIPC), follows concerns about how the company collects and handles…
Pro-Russia Hackers Target Italian Banks and Airports Amid Rising Tensions
Around 20 Italian websites, including those of major banks and airports, were targeted by alleged pro-Russian hackers, according to Italy’s cybersecurity agency on Monday. The attack is believed to be linked to escalating diplomatic tensions between Rome and Moscow.…
How AI Agents Are Transforming Cryptocurrency
Artificial intelligence (AI) agents are revolutionizing the cryptocurrency sector by automating processes, enhancing security, and improving trading strategies. These smart programs help analyze blockchain data, detect fraud, and optimize financial decisions without human intervention. What Are AI Agents? AI…
Enhanced In-Call Security in Android 16 Aims to Tackle Scammers
As part of a new security feature being developed by Google, users will no longer be able to modify sensitive settings when they are on a phone call. As a part of the in-call anti-scam protection, users are specifically…
Chinese Spies Allegedly Engaged in Ransomware Operations
Backed by the Chinese government, a cyber-espionage group has been observed engaging in ransomware-related activities as part of its intelligence activities. Further, this observation demonstrates how nation-state cyber operations and financially motivated cybercrimes have become increasingly convergent as a…
USAID Cybersecurity Aid to Ukraine Halted as Trump Administration Freezes Projects
Before and after Russia’s 2022 invasion, U.S.-funded initiatives played a crucial role in strengthening Ukraine’s cybersecurity. Many of these efforts, backed by the United States Agency for International Development (USAID), aimed to protect the country against cyber threats. However,…
Amazon Prime Phishing Campaign Siphons Login And Payment Info
The Cofense Phishing Defence Centre (PDC) has uncovered a new phishing campaign aimed particularly at Amazon Prime members, trying to steal login passwords, security answers, and payment details. The attacker sends out a well-crafted email mimicking Amazon, encouraging users…
Protect Your Security Cameras from Hackers with These Simple Steps
Security cameras are meant to keep us safe, but they can also become targets for hackers. If cybercriminals gain access, they can spy on you or tamper with your footage. To prevent this, follow these straightforward tips to ensure…
Cyber-Espionage Malware FinalDraft Exploits Outlook Drafts for Covert Operations
A newly identified malware, FinalDraft, has been leveraging Microsoft Outlook email drafts for command-and-control (C2) communication in targeted cyberattacks against a South American foreign ministry. Elastic Security Labs uncovered the attacks, which deploy an advanced malware toolset comprising a…
Hackers Target South America and Southeast Asia
A group of hackers has been caught running a large-scale cyber spying operation, now called REF7707. The attack was first noticed in November 2024 when strange activity was detected in the Foreign Ministry of a South American country. As…
Russian State Actors Target Microsoft 365 Accounts Via Device Code Phishing Campaign
A hacking outfit potentially linked to Russia is running an active operation that uses device code phishing to target Microsoft 365 accounts of individuals at organisations of interest. The targets are in the government, non-governmental organisations (NGOs), IT services…
Hackers Leak 15,000 FortiGate Device Configs, IPs, and VPN Credentials
A newly identified hacking group, the Belsen Group, has leaked critical data from over 15,000 FortiGate devices on the dark web, making sensitive technical details freely available to cybercriminals. The leak includes configuration files, IP addresses, and VPN credentials,…
Huge Data Leak Puts 2.7 Billion Records at Risk – What You Should Know
A security issue has surfaced involving an unprotected database linked to Mars Hydro, a Chinese company known for making smart devices like LED grow lights and hydroponic equipment. Security researcher Jeremiah Fowler discovered this database was left open without…
The Upcoming Tech Revolution Foreseen by Sundar Pichai
It was at the 2025 World Government Summit in Dubai on 15th-17th November that Sundar Pichai, CEO of Google and its parent company Alphabet, engaged in a virtual fireside conversation with the Moroccan Minister of State for Artificial Intelligence,…
Italian Spyware Firm SIO Linked to Malicious Android Apps Targeting WhatsApp Users
SIO, an Italian spyware company known for selling surveillance tools to government agencies, has been linked to a series of malicious Android apps designed to mimic WhatsApp and other popular services while secretly stealing private data, TechCrunch has revealed.…
whoAMI Name Assaults Can Compromise AWS Accounts to Malicious Code Execution
Datadog Security Labs researchers developed a new name confusion attack technique known as whoAMI, which allows threat actors to execute arbitrary code within an Amazon Web Services (AWS) account by uploading an Amazon Machine Image (AMI) with a specified…
Android Phishing Apps: A Growing Cybersecurity Threat in 2024
Cybercriminals are evolving their tactics, shifting from traditional email-based phishing scams to more sophisticated Android phishing apps. According to the 2025 State of Malware report by Malwarebytes, over 22,800 phishing apps were detected on Android devices in 2024 alone.…
zkLend DeFi Platform Hacked, Loses $9.5 Million
A major hacking incident has hit zkLend, a decentralized lending platform that operates on the Starknet blockchain. The attacker managed to steal about $9.5 million worth of cryptocurrency by exploiting a vulnerability in the system. According to blockchain security…
Cybercriminals Leverage Google Tag Manager for Credit Card Data Theft
It is common for cybersecurity criminals to exploit vulnerabilities in Magento to inject an obfuscated script, which has been delivered through Google Tag Manager (GTM), into Magento-based eCommerce platforms, which allows them to intercept and steal credit card information…
Zacks Investment Research Faces Another Data Breach Impacting 12 Million Accounts
Zacks Investment Research reportedly suffered a data breach in 2024, exposing sensitive information from approximately 12 million accounts. The American investment research firm provides data-driven insights through its proprietary stock assessment tool, ‘Zacks Rank,’ assisting investors in making informed…
TRAI Enforces Stricter Regulations to Combat Telemarketing Spam Calls
There has been a significant shift in the Telecom Regulatory Authority of India (TRAI)’s efforts to curb spam calls and unsolicited commercial communications (UCC) as part of its effort to improve consumer protection, as TRAI has introduced stringent regulations.…
Hackers Leak 8,500 Files from Lexipol, Exposing U.S. Police Training Manuals
An anonymous hacker group called the “puppygirl hacker polycule” recently made headlines by leaking over 8,500 files from Lexipol, a private company that provides training materials and policy manuals for police departments across the United States. As first reported…
Android Latest Security Feature Protects Users from Cyber Scams
Google is developing a new security feature for Android that prevents users from updating sensitive settings while a phone call is in process. The in-call anti-scammer measures include prohibiting users from enabling settings to install apps from unidentified sources…
Google Fixes YouTube Security Flaw That Exposed User Emails
A critical security vulnerability in YouTube allowed attackers to uncover the email addresses of any account on the platform. Cybersecurity researchers discovered the flaw and reported it to Google, which promptly fixed the issue. While no known attacks exploited…
Addressing the Security Risks Posed by IoT Devices
There has been a marked change in daily life as a result of the proliferation of IoT devices, and Transforma Insights estimates that 14 billion such devices are connected globally, indicating that this type of technology has profound effects.…
Hackers Exploit ThinkPHP and ownCloud Vulnerabilities from 2022 and 2023
Hackers are increasingly exploiting outdated security flaws in poorly maintained systems, with vulnerabilities from 2022 and 2023 seeing a surge in attacks. According to threat intelligence platform GreyNoise, malicious actors are actively targeting CVE-2022-47945 and CVE-2023-49103, affecting the ThinkPHP…
China-backed APT40 Hacking Outfit Implicated for Samoa Cyberattacks
Samoa’s national cybersecurity office issued an urgent advisory after the Chinese state-sponsored cyber outfit APT40 escalated its attacks on government and critical infrastructure networks across the Pacific. Samoa’s Computer Emergency Response Team, or SamCERT, has warned that APT40 is…
Sandworm’s Evolving Cyber Threat: BadPilot Expands Global Reach
Sandworm, also known as Russia’s Military Unit 74455 within the GRU, has established itself as one of the most notorious advanced persistent threats (APT). Its cyber operations have included NotPetya, the attack on the 2018 Winter Olympics, and two…
Data Reveals Identity-Based Attacks Now Dominate Cybercrime
Cyberattacks are undergoing a significant transformation, shifting away from malware-driven methods toward identity exploitation. According to the CrowdStrike 2024 Global Threat Report, three out of four cyberattacks now leverage valid credentials instead of malicious software. This change is fueled…
Threat Analysts Warn of the ‘Largest Data Breach’ After Elon Musk’s DOGE Controversy
The debate over Elon Musk’s Department of Government Efficiency continues, with the world’s richest man accused of snooping on some of America’s most sensitive data. The DOGE has been tasked with reducing government spending by a paltry $2 trillion,…
National Security Faces Risks from Cybercrime Expansion
The incidence of cyberattacks globally increased by 125% in 2021 compared to 2020, posing a serious threat to businesses and individuals alike. Phishing continues to be the most prevalent form of cybercrime worldwide and is expected to continue this…
DeepSeek AI Raises Data Security Concerns Amid Ties to China
The launch of DeepSeek AI has created waves in the tech world, offering powerful artificial intelligence models at a fraction of the cost compared to established players like OpenAI and Google. However, its rapid rise in popularity has also…
Three Ways to Safeguard Your Smart Home From Cybercriminals
Your smart home is a technological marvel. However, when camera flaws allow our neighbours to spy on us, smart speakers are manipulated with lasers, robot vacuums are breached to shout obscenities, and entire security systems are compromised by a…
Ransomware Tactics Evolve as Hackers Shift Focus to Data Theft
Ransomware groups are adapting their strategies to outsmart stronger cybersecurity defenses and increasing law enforcement pressure, according to the Huntress 2025 Cyber Threat Report. The findings reveal that attackers are moving beyond traditional encryption-based ransomware, instead focusing on data…
Apps Illegally Sold Location Data of US Military and Intelligence Personnel
Earlier this year, news reports revealed that a Florida-based data brokerage company had engaged in the sale of location data belonging to US military and intelligence personnel stationed overseas in the course of its operations. While at the time,…
AI Self-Replication: Scientists Warn of Critical “Red Line”
Scientists have raised concerns after artificial intelligence (AI) crossed a major threshold — self-replication. A new study from researchers at Fudan University in China reveals that two popular large language models (LLMs) successfully created functional copies of themselves, raising…
Two Russian Hackers Arrested for Large-Scale Ransomware Attacks
Authorities in the United States have charged two Russian nationals with carrying out widespread cyberattacks using Phobos ransomware. The suspects, Roman Berezhnoy (33) and Egor Nikolaevich Glebov (39), were arrested in Thailand for allegedly orchestrating more than a thousand…
XE Group Rebrands Its Cybercrime Strategy by Targeting Supply Chains
Over the past decade, there has been a rise in the number of cyber threats targeting the country, including the XE Group, a hacker collective with Vietnamese connections. According to recent investigations, the group was responsible for exploiting two…
RBI Launches “bank.in” Domain to Combat Digital Banking Scam
The Reserve Bank of India (RBI) has made the “bank.in” domain exclusive to all authorised banking institutions in India in an effort to strengthen digital banking security and shield customers from online banking fraud. This effort aims to minimise…
Cybercriminals Intensify Attacks on Password Managers
Cybercriminals are increasingly setting their sights on password managers as a way to infiltrate critical digital accounts. According to Picus Security’s Red Report 2025, which analyzed over a million malware samples from the past year, a quarter (25%) of…
Rising Robocall Cyber Threat and Essential Protection Strategies
A persistent cybersecurity concern has long been robocall scams. However, recent developments indicate that this type of attack is becoming increasingly sophisticated and dangerous as a result of these developments. In a recent incident, Telnyx, a provider of Voice…
Apple Patches Zero-Day Flaw allowing Third-Party Access to Locked Devices
Tech giant Apple fixed a vulnerability that “may have been leveraged in a highly sophisticated campaign against specific targeted individuals” in its iOS and iPadOS mobile operating system updates earlier this week. According to the company’s release notes for…
SMS Toll Scam Tricks Victims Into Activating Phishing Links
SMS phishing scams targeting tollway users have been spreading across the U.S., with fraudsters impersonating tolling agencies to steal personal information. These scams typically involve sending text messages claiming the recipient has an unpaid toll balance. Victims are then…
Apple and Google Remove 20 Apps Infected with Data-Stealing Malware
Apple and Google have removed 20 apps from their respective app stores after cybersecurity researchers discovered that they had been infected with data-stealing malware for nearly a year. According to Kaspersky, the malware, named SparkCat, has been active since March…
Understanding the Importance of 5G Edge Security
As technology advances, the volume of data being generated daily has reached unprecedented levels. In 2024 alone, people are expected to create over 147 zettabytes of data. This rapid growth presents major challenges for businesses in terms of processing,…
Global Crackdown on Phobos Ransomware, Two Arrested
A major international police operation has resulted in the arrest of two individuals suspected of carrying out ransomware attacks worldwide. The operation also led to the takedown of dark web platforms associated with a notorious cybercrime group. Suspects Arrested…
FBI Alerts Users of Surge in Gmail AI Phishing Attacks
Phishing scams have been around for many years, but they are now more sophisticated than ever due to the introduction of artificial intelligence (AI). As reported in the Hoxhunt Phishing Trends Report, AI-based phishing attacks have increased dramatically since…
Virtual Credit Cards: How They Work, Benefits, and Security Features
Virtual credit cards are digital versions of traditional credit cards, designed to enhance security in online transactions. Instead of using a physical card number, they generate a unique number for each purchase, reducing the risk of data breaches and…
2FA Under Attack as Astaroth Phishing Kit Spreads
Astaroth is the latest phishing tool discovered by cybercriminals. It has advanced capabilities that allow it to circumvent security measures such as two-factor authentication (2FA) when used against it. In January 2025, Astaroth made its public debut across multiple…
Urgent Patch Needed for SonicWall Firewall Exploit Enabling VPN Hijacking
Bishop Fox cybersecurity researchers have discovered a critical security flaw in approximately 4,500 SonicWall firewalls that are exposed to the Internet as a result of a critical security breach. The flaw, CVE-2024-53704, is a high-severity authentication bypass vulnerability within…
Credential-Stealing Malware Surges, Now a Top MITRE ATT&CK Threat
Cybersecurity researchers have uncovered a sharp rise in credential-stealing malware, with 25% of over a million malware samples analyzed in 2024 targeting user credentials. This marks a threefold increase from 2023, propelling credential theft from password stores into the…
Hackers Exploit Exposed Security Keys to Inject Code into Websites
Cybercriminals are exploiting leaked cryptographic keys to manipulate authentication systems, decode protected data, and install harmful software on vulnerable web servers. These attacks can give hackers unauthorized control over websites and would allow them to maintain access for long…
2.8 million IP Addresses Being Leveraged in Brute Force Assault On VPNs
Almost 2.8 million IP addresses are being used in a massive brute force password attack that aims to guess the login credentials for a variety of networking devices, including those generated by Palo Alto Networks, Ivanti, and SonicWall. A…
LegionLoader Malware Resurfaces with Evasive Infection Tactics
Researchers at TEHTRIS Threat Intelligence have uncovered a new wave of LegionLoader, a malware downloader also known as Satacom, CurlyGate, and RobotDropper. This sophisticated threat has been rapidly gaining momentum, with over 2,000 samples identified in recent weeks. According…
Why European Regulators Are Investigating Chinese AI firm DeepSeek
European authorities are raising concerns about DeepSeek, a thriving Chinese artificial intelligence (AI) company, due to its data practices. Italy, Ireland, Belgium, Netherlands, France regulators are examining the data collection methods of this firm, seeing whether they comply with…
Sophisticated Malware Bypasses Chrome App-Bound Encryption Using Dual Injection
Researchers at Cyble have identified a highly advanced malware attack that successfully bypasses Google Chrome’s App-Bound Encryption. This security feature was designed to prevent infostealer malware from accessing user data, particularly cookies. However, the newly discovered malware employs dual…
Phishing URL Blocking Failure Leads to Cloudflare Service Disruptions
Yesterday, Cloudflare attempted to block an unintentional phishing URL within its R2 object storage platform, causing an outage that affected multiple services for nearly an hour. The outage was caused by an attempt to prevent spammers from accessing the…
US Health System Notifies Nearly 900K Patients Regarding a 2023 Data Breach
Hospital Sisters Health System informed nearly 882,000 patients that a cyberattack in August 2023 resulted in a data breach that compromised their private and medical data. Established in 1875, HSHS works with about 2,200 physicians and employs over 12,000…
Massive Mobile Malware Campaign Targets Indian Banks, Steals Financial Data
Zimperium’s zLabs research team has uncovered a significant mobile malware campaign that targets Indian banks. First reported on February 5, 2025, this threat was orchestrated by a threat actor called FatBoyPanel. Nearly 900 malware samples are used in the…
Hackers Exploit SimpleHelp RMM Vulnerabilities to Deploy Backdoors and Create Admin Accounts
Management (RMM) clients to gain administrative control, install backdoors, and possibly set the stage for ransomware deployment. The vulnerabilities, identified as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728, were initially flagged by Arctic Wolf as potential attack vectors last week. While the…
Sophisticated Phishing Campaign Circumvents Microsoft’s Multi Factor Authentication
A help desk phishing campaign uses spiofed login pages to target Microsoft Active Directory Federation Services (ADFS) within an organisation in order to obtain credentials and get around multi-factor authentication (MFA) protections. The campaign’s main targets, as reported by…
The Rising Problem of Banking Scams in East India
Currently, India is battling with a fake banking applications spoofing genuine institutions to loot credentials and money. The scale of the campaign is massive, impacting around 900 different malware samples linked to more than 1000 different contact numbers used to…
WhatsApp Alerts Users About a Dangerous Zero-Click Spyware Attack
WhatsApp has warned users about a highly advanced hacking attack that infected nearly 90 people across 24 countries. Unlike traditional cyberattacks that rely on tricking victims into clicking malicious links, this attack used zero-click spyware, meaning the targets were…
The Future of Data Security Lies in Quantum-Safe Encryption
Cybersecurity experts and analysts have expressed growing concerns over the potential threat posed by quantum computing to modern cryptographic systems. Unlike conventional computers that rely on electronic circuits, quantum computers leverage the principles of quantum mechanics, which could enable…
DeepSeek-R1 AI Under Fire for Severe Security Risks
DeepSeek-R1, an AI model developed in China, is facing intense scrutiny following a study by cybersecurity firm Enkrypt AI, which found it to be 11 times more vulnerable to cybercriminal exploitation compared to other AI models. The research highlights…
19 US States Sue to Prevent DOGE From Accessing Americans’ Private Data
In an effort to prevent Elon Musk’s Department of Government Efficiency from gaining access to Treasury Department documents that hold private information like Social Security numbers and bank account numbers for millions of Americans, 19 Democratic attorneys general filed…
North Yorkshire Hospital Adopts AI for Faster Lung Cancer Detection
A hospital in North Yorkshire has introduced artificial intelligence (AI) technology to improve the detection of lung cancer and other serious illnesses. Harrogate and District NHS Foundation Trust announced that the AI-powered system would enhance the efficiency and accuracy…
Chinese Hackers Exploit SSH Daemon to Maintain Persistent Access in Cyber-Espionage Operations
A sophisticated cyber-espionage campaign attributed to the Chinese hacking group Evasive Panda, also known as DaggerFly, has been uncovered, targeting network appliances through a newly identified attack suite. According to cybersecurity researchers at Fortinet’s FortiGuard Labs, the attackers are…
Hackers Steal Login Details via Fake Microsoft ADFS login pages
A help desk phishing campaign attacked a company’s Microsoft Active Directory Federation Services (ADFS) via fake login pages and stole credentials by escaping multi-factor authentication (MFA) safety. The campaign attacked healthcare, government, and education organizations, targeting around 150 victims, according…
India Expands Aadhaar Authentication, Allowing Private Sector Access to Biometric Data
The Indian government has introduced significant changes to its Aadhaar authentication system, expanding its use to a wider range of industries. Previously restricted to sectors like banking, telecommunications, and public utilities, Aadhaar verification will now be available to businesses…