With the advent of cybercrime, a highly lucrative industry has emerged, which in turn has drawn the attention of malicious actors eager to exploit the growing digital landscape. Cyber-attacks have become increasingly sophisticated and frequent and have made the…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Amazon Faces Criticism For Still Hosting Stalkerware Victims’ Data
Amazon is drawing fire for hosting data from the Cocospy, Spyic, and Spyzie apps weeks after being notified of the problem, as the spyware firms continue to upload sensitive phone data of 3.1 million users to Amazon Web Services…
How Data Removal Services Protect Your Online Privacy from Brokers
Data removal services play a crucial role in safeguarding online privacy by helping individuals remove their personal information from data brokers and people-finding websites. Every time users browse the internet, enter personal details on websites, or use search engines,…
The Future of Work: Why Remote Desktop Solutions Are Essential
The workplace is transforming at an unprecedented rate. Remote and hybrid work models, once considered temporary adjustments, have now become permanent components of modern business operations. Organizations worldwide are seeking secure, efficient, and cost-effective solutions to support a distributed…
SIM Swap Scams Growing in the Middle East — Here’s How They Work
The Middle East is seeing a sharp rise in SIM swapping scams, where criminals find ways to take over people’s mobile numbers and misuse them for financial fraud. A new report by cybersecurity experts reveals that scammers are using…
Major Data Breach at Jaguar Land Rover Raises Security Concerns
It has been revealed that a cybercriminal, described as “Rey” on the dark web, has publicly claimed responsibility for a substantial cyberattack that occurred against Jaguar Land Rover over a period of two months. The disclosure was made on a…
New Malware Impersonates Browser Extensions to Steal Login Credentials
Cybercriminals are continually evolving their tactics to evade antivirus detection and trick users into installing malicious software. One of the latest threats involves malware that impersonates legitimate browser extensions, allowing attackers to steal login credentials while remaining undetected. Although…
Nearly Half of Companies Lack AI-driven Cyber Threat Plans, Report Finds
Mimecast has discovered that over 55% of organisations do not have specific plans in place to deal with AI-driven cyberthreats. The cybersecurity company’s most recent “State of Human Risk” report, which is based on a global survey of 1,100…
Sunflower and CCA Suffer Data Breaches, Exposing Hundreds of Thousands of Records
Sunflower recently disclosed a cyberattack on its systems, revealing that hackers gained access on December 15 but remained undetected until January 7. During this time, sensitive personal and medical data — including names, addresses, dates of birth, Social Security…
Automobile Giant Jaguar Land Rover Allegedly Suffers Major Data Breach
Jaguar Land Rover (JLR), the well-known luxury car company, is reported to be the latest victim of a cybersecurity breach. A threat actor known as “Rey” has publicly disclosed critical company records and personnel data on the infamous hacking…
Fake CAPTCHA Scams Trick Windows Users into Downloading Malware
Cybercriminals have found a new way to trick Windows users into downloading harmful software by disguising malware as a CAPTCHA test. A recent investigation by security researchers revealed that attackers are using this method to install infostealer malware, which…
What Is Kali Linux? Everything You Need to Know
Kali Linux has become a cornerstone of cybersecurity, widely used by ethical hackers, penetration testers, and security professionals. This open-source Debian-based distribution is designed specifically for security testing and digital forensics. Recognized for its extensive toolset, it has been…
Hackers Infiltrated PowerSchool Network Well Before December Attack
It has been announced that the CrowdStrike investigation into PowerSchool’s large-scale data breach that took place in December 2024 has been published. It was determined during the investigation that unauthorized access to the company’s systems occurred four months prior,…
Seattle Startup Develops AI to Automate Office Work
A new startup in Seattle is working on artificial intelligence (AI) that can take over repetitive office tasks. The company, called Caddi, has recently secured $5 million in funding to expand its technology. Its goal is to reduce manual…
FBI Warns Business Executives About Fake Extortion Scam
The Federal Bureau of Investigation (FBI) has warned corporate executives about a new scam designed to trick them into paying large sums of money. Criminals are sending threatening letters claiming to have stolen sensitive company data and demanding a…
Microsoft and Amazon’s Quantum Progress Poses New Risks for Encryption
Microsoft, Amazon, and Google have all announced recent advances in quantum computing that are likely to accelerate the timeline for the possible obsolescence of current encryption standards. These developments indicate that it will become increasingly important to address the…
How to Spot and Avoid Malicious Spyware Apps on Your Smartphone
Spyware apps masquerading as legitimate software are a growing threat on app stores, particularly Google Play. These malicious apps can steal personal data, commit financial fraud, and install malware on unsuspecting users’ devices. A Zscaler report found 200 spyware…
Turning The Screws: Pressure Techniques Used by Ransomware Outfits
Over the past ten years, ransomware attacks have increased in frequency and sophistication. While exploits like social engineering and unpatched software may help with an initial breach, it’s the coercive tactics that force victims to make rash and emotionally…
Ransomware Attack on Retirement Services Firm Exposes Thousands of US School Data
A ransomware assault targeting retirement service firm Carruth Compliance Consulting has resulted in a data breach affecting dozens of school districts and thousands of individuals in the US. Carruth Compliance Consulting (CCC) administers retirement savings accounts for public schools…
NTT Data Breach Puts Thousands of Businesses at Risk
An NTT Communications (NTT Com) employee in Tokyo has confirmed that in February, unauthorized access to sensitive data belonging to approximately 18,000 corporate customers was caused by a cyberattack. There is no definitive estimate of how extensive the breach…