The Multi-Factor Authentication (MFA) system has been a crucial component of modern cybersecurity for several years now. It is intended to enhance security by requiring additional forms of verification in addition to traditional passwords. MFA strengthens access control by…
Category: CySecurity News – Latest Information Security and Hacking Incidents
WhatsApp Fixes Security Flaw Exploited by Spyware
WhatsApp recently fixed a major security loophole that was being used to install spyware on users’ devices. The issue, known as a zero-click, zero-day vulnerability, allowed hackers to access phones without the user needing to click on anything. Security…
Ascom Confirms Cyberattack as HellCat Hackers Exploit Jira Servers
Swiss telecommunications company Ascom has disclosed a cyberattack on its IT infrastructure, confirming that the hacker group HellCat exploited compromised credentials to target Jira servers worldwide. In an official statement, Ascom revealed that its technical ticketing system was breached…
Oracle Denies Claim of Server Breach
Following a threat actor’s claim to be selling 6 million data records allegedly stolen from Oracle Cloud’s federated SSO login servers, Oracle denies that it was compromised. “There has been no breach of Oracle Cloud. The published credentials are…
Betruger Backdoor Linked to RansomHub Ransomware Attacks on Critical Infrastructure
A newly discovered backdoor malware, dubbed Betruger, has been identified in multiple recent ransomware attacks. Researchers at Symantec believe at least one affiliate of the RansomHub ransomware-as-a-service (RaaS) operation is using this sophisticated tool to facilitate cyber intrusions. Unlike…
Cybercriminals Exploit Psychological Vulnerabilities in Ransomware Campaigns
During the decade of 2025, the cybersecurity landscape has drastically changed, with ransomware from a once isolated incident to a full-sized global crisis. No longer confined to isolated incidents, these attacks are now posing a tremendous threat to economies,…
Arcane Malware Steals VPN, Gaming, and Messaging Credentials in New Cyber Threat
A newly identified malware strain, Arcane, is making headlines for its ability to steal a vast range of user data. This malicious software infiltrates systems to extract sensitive credentials from VPN services, gaming platforms, messaging apps, and web browsers.…
Five Ways to Identify a Bank Fraud And Stay Safe
It is not unusual for your bank to try to contact you. However, some of those emails and phone calls are simply scammers taking advantage of your trust in your bank to scam you. In general, you should be…
The Future of Cloud Ownership Amid Deglobalization
Modern digital landscapes have become increasingly challenging for data management because of the rapid expansion of data volumes and sources. Organizations have to navigate the complexities of storing a vast amount of data while ensuring seamless access for a…
AI Technology is Helping Criminal Groups Grow Stronger in Europe, Europol Warns
The European Union’s main police agency, Europol, has raised an alarm about how artificial intelligence (AI) is now being misused by criminal groups. According to their latest report, criminals are using AI to carry out serious crimes like drug…
Western Alliance Bank Data Breach Exposes Nearly 22,000 Customers’ Personal Information
Western Alliance Bank has alerted nearly 22,000 customers that their personal information was compromised following a cyberattack in October. The breach stemmed from a vulnerability in a third-party vendor’s secure file transfer software, which allowed attackers to gain unauthorized…
Roman Encryption Employed In Nearly 9K Phishing Attacks
Unpredictability is a hallmark of cybersecurity work. I doubt you expected to read an article linking Julius Caesar, the ancient Roman ruler, to almost a million phishing attacks so far in 2025. But, here we are. The phishing threat…
FBI Warns Against Free Online File Converters as Potential Cybersecurity Threats
Free online file converters have become a popular choice for users looking to convert files into different formats. Whether transforming a PDF into a Word document or switching between media formats, these tools offer convenience with just a few…
GitHub Action Security Breach Raises Concerns Over Supply Chain Risks
An attack of a cascading supply chain was recently triggered by the compromise of the GitHub action “reviewdog/action-setup@v1”, which ultimately led to the security breach of the “tj-actions/changed-files” repository. As a result of this breach, unintended secrets about continuous…
Authorities Warn Against Medusa Ransomware Surge
Federal agencies are urging individuals and organizations to stay vigilant against a rising ransomware threat that has affected hundreds of new victims in recent weeks. The FBI, Cybersecurity and Infrastructure Security Agency (CISA), and Multi-State Information Sharing and…
ICE Expands Online Surveillance With Tool Tracking 200+ Websites
To ensure the safety of citizens throughout the world, and to enforce immigration laws, the Department of Homeland Security and Immigration and Customs Enforcement (ICE) have always relied heavily on social media monitoring as an essential component of their…
Windows Shortcut Vulnerability Exploited by 11 State-Sponsored Outfits
Since 2017, at least 11 state-sponsored threat groups have actively exploited a Microsoft zero-day issue that allows for abuse of Windows shortcut files to steal data and commit cyber espionage against organisations across multiple industries. Threat analysts from Trend…
Hackers Exploit Fortinet Firewall Bugs to Deploy Ransomware
Cybersecurity researchers have uncovered a new attack campaign in which hackers are exploiting vulnerabilities in Fortinet firewalls to breach corporate networks and deploy ransomware. The hacking group, tracked as “Mora_001,” is leveraging two specific flaws in Fortinet’s firewall software…
Albabat Ransomware Evolves with Cross-Platform Capabilities and Enhanced Attack Efficiency
Cybersecurity researchers at Trend Micro have uncovered new variants of the Albabat ransomware, designed to target multiple operating systems and optimize attack execution. Albabat ransomware 2.0 now extends beyond Microsoft Windows, incorporating mechanisms to collect system data and streamline…
Why Unencrypted Files Pose a Serious Security Risk
It is becoming increasingly common for digital communication to involve sharing files, whether for professional or personal reasons. Some file exchanges are trivial, such as sending humorous images by email, while others contain highly sensitive information that needs to…