A popular trend is taking over social media, where users are sharing cartoon-like pictures of themselves inspired by the art style of Studio Ghibli. These fun, animated portraits are often created using tools powered by artificial intelligence, like ChatGPT-4o.…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Oracle Finally Acknowledges Cloud Hack
Oracle is reportedly trying to downplay the impact of the attack while quietly acknowledging to clients that some of its cloud services have been compromised. A hacker dubbed online as ‘rose87168’ recently offered to sell millions of lines of…
Phishing Scams Are Getting Smarter – And More Subtle : Here’s All You Need to Know
Cybercriminals are evolving. Those dramatic emails warning about expired subscriptions, tax threats, or computer hacks are slowly being replaced by subtler, less alarming messages. New research suggests scammers are moving away from attention-grabbing tactics because people are finally catching…
Hackers Can Spy on Screens Using HDMI Radiation and AI Models
You may feel safe behind your screen, but it turns out that privacy might be more of an illusion than a fact. New research reveals that hackers have found an alarming way to peek at what’s happening on your…
Massive Data Breach at Samsung Exposes 270000 Records
During the analysis of the Samsung Germany data breach, a wide range of sensitive information was found to be compromised, including customer names, addresses, email addresses, order history, and internal communications, among other sensitive data. Those findings were contained…
Revolution or Hype? Meet the AI Agent That’s Automating Invoicing for Thousands
French startup Twin has introduced its very first AI-powered automation tool to help business owners who use Qonto. Qonto is a digital banking platform that offers financial services to companies across Europe. Many Qonto users spend hours each month…
Vulnerabilities Alert: Solar Power Grids Worldwide Under Threat of Cyber Attacks
Global solar power industry under threat The rise in the use of solar power worldwide has revealed gaps in cybersecurity in cloud computing devices, inverters, and monitoring platforms. As these become prone to critical vulnerabilities, it creates an unsafe ecosystem…
AI Powers Airbnb’s Code Migration, But Human Oversight Still Key, Say Tech Giants
In a bold demonstration of AI’s growing role in software development, Airbnb has successfully completed a large-scale code migration project using large language models (LLMs), dramatically reducing the timeline from an estimated 1.5 years to just six weeks. The…
Ukrzaliznytsia Cyberattack Disrupts Online Ticket Sales but Train Services Remain Unaffected
Ukraine’s national railway operator, Ukrzaliznytsia, has fallen victim to a large-scale cyberattack, severely disrupting its online ticket sales and forcing passengers to rely on physical ticket booths. The attack, which began on March 23, has caused significant delays, long…
BitcoinOS to Introduce Alpha Mainnet for Digital Ownership Platform
BitcoinOS and Sovryn founder Edan Yago is creating a mechanism to turn Bitcoin into a digital ownership platform. Growing up in South Africa and coming from a family of Holocaust survivors, Yago’s early experiences sneaking gold coins out of…
Threat Actors Compromised by Security Firms Working to Protect Victims
An outstanding example of counter-cybercrime has been the successful penetration of the digital infrastructure associated with the ransomware group BlackLock. Threat intelligence professionals succeeded in successfully infiltrating this infrastructure. As a result of this operation, researchers were able to…
600 Phishing Campaigns Emerged After Bybit Heist, Biggest Crypto Scam in History
Recently, the cryptocurrency suffered the largest cyberattack to date. The Bybit exchange was hit by the “largest cryptocurrency heist in history, with approximately $1.5 billion in Ethereum tokens stolen in a matter of hours,” Forbes said. After the Bybit hack,…
StreamElements Confirms Data Exposure via Former Third-Party Provider
Cloud-based streaming tools provider StreamElements has acknowledged a data breach stemming from a third-party service it previously collaborated with after a threat actor leaked customer data samples on a hacking forum. While StreamElements confirmed its own infrastructure remains uncompromised, the…
China’s FamousSparrow APT Hits United States Via SparrowDoor Malware
A China-linked cyberespionage gang known as ‘FamousSparrow’ was caught utilising a new modular version of its signature backdoor ‘SparrowDoor’ against a US-based trade organisation. Security experts at ESET spotted the activities and new malware version, uncovering evidence that the…
Orion Brings Fully Homomorphic Encryption to Deep Learning for AI Privacy
As data privacy becomes an increasing concern, a new artificial intelligence (AI) encryption breakthrough could transform how sensitive information is handled. Researchers Austin Ebel, Karthik Garimella, and Assistant Professor Brandon Reagen have developed Orion, a framework that integrates fully…
DeepSeek Revives China’s Tech Industry, Challenging Western Giants
As a result of DeepSeek’s emergence, the global landscape for artificial intelligence (AI) has been profoundly affected, going way beyond initial media coverage. AI-driven businesses, semiconductor manufacturing, data centres and energy infrastructure all benefit from its advancements, which are…
Alibaba Launches Latest Open-source AI Model from Qwen Series for ‘Cost-effective AI agents’
Last week, Alibaba Cloud launched its latest AI model in its “Qwen series,” as large language model (LLM) competition in China continues to intensify after the launch of famous “DeepSeek” AI. The latest “Qwen2.5-Omni-7B” is a multimodal model- it can…
New Android Banking Trojan ‘Crocodilus’ Emerges as Sophisticated Threat in Spain and Turkey
A newly identified Android banking malware named Crocodilus is making waves in the cybersecurity world, with experts warning about its advanced capabilities and targeted attacks in Spain and Turkey. Discovered by Dutch mobile security firm ThreatFabric, the malware represents…
Alibaba Launches Lates Open-source AI Model from Qwen Series for ‘Cost-effective AI agents’
Last week, Alibaba Cloud launched its latest AI model in its “Qwen series,” as large language model (LLM) competition in China continues to intensify after the launch of famous “DeepSeek” AI. The latest “Qwen2.5-Omni-7B” is a multimodal model- it can…
Experts Suggest Evolving Cyber Attacks Not Ending Anytime Soon
In a series of unfortunate events, experts suggest the advancement of cybercrime isn’t ending anytime soon. Every day, the digital landscape evolves, thanks to innovations and technological advancements. Despite this growth, it suffers from a few roadblocks, cybercrime being a…