DeepSeek, an AI chatbot developed by China-based High-Flyer, has gained rapid popularity due to its affordability and advanced natural language processing capabilities. Marketed as a cost-effective alternative to OpenAI’s ChatGPT, DeepSeek has been widely adopted by businesses looking for…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Cisco Warns of Critical Security Flaw in IOS XR Software – Immediate Update Recommended
Cisco has issued a security warning about a newly identified vulnerability in its IOS XR Software. This security flaw, labeled CVE-2025-20138, has been rated 8.8 on the CVSS scale, meaning it poses a major risk to affected devices. What Is…
Online Fraud Emerges as a Major Global Challenge
A vast and highly organized industry is known as online scams, which are characterized by intricate supply chains that include services, equipment, and labor. In recent years, cybercrime has gone beyond isolated criminal activities, but has developed into a…
Cybercrime in 2025: AI-Powered Attacks, Identity Exploits, and the Rise of Nation-State Threats
Cybercrime has evolved beyond traditional hacking, transforming into a highly organized and sophisticated industry. In 2025, cyber adversaries — ranging from financially motivated criminals to nation-state actors—are leveraging AI, identity-based attacks, and cloud exploitation to breach even the most…
Undocumented ESP32 Commands Pose Security Risks, Researchers Warn
The widely used ESP32 microchip, manufactured by Chinese company Espressif and embedded in over a billion devices as of 2023, has been found to contain undocumented commands that could be exploited for cyberattacks. These hidden commands enable threat actors…
Cyberattacks on Key Vendors Trigger Widespread Disruptions Across Industries
Cybercriminals are increasingly targeting a single point of failure within companies to create large-scale disruption, according to a recent report by Resilience. The analysis highlights how such attacks can have a ripple effect across entire industries. In 2024, the global…
Terror Ourfits Are Using Crypto Funds For Donations in India: TRM Labs
Transaction Monitoring (TRM) Labs, a blockchain intelligence firm based in San Francisco and recognised by the World Economic Forum, recently published a report revealing the links between the Islamic State Khorasan Province (ISKP) and ISIS-affiliated fund-collecting networks in India.…
Phantom Goblin: An Emerging Menace in Credential Theft and Remote System Access
A complex malware campaign dubbed “Phantom Goblin” has been discovered, which employs social engineering techniques to install information-stealing malware. The malware is distributed by RAR attachments in spam messages, which includes a poisoned shortcut file posing as a PDF. …
Tencent’s AI Chatbot Yuanbao Becomes China’s Most Downloaded iOS App
Tencent’s AI chatbot, Yuanbao, has surpassed DeepSeek to become the most downloaded free app on China’s iOS App Store. The chatbot, launched in May 2024, gained significant traction following Tencent’s integration of DeepSeek’s R1 reasoning model in February. This…
Webcam Exploited by Ransomware Group to Circumvent EDR Protections
Researchers at S-RM have discovered an unusual attack method used by the Akira ransomware gang. The Akira ransomware gang utilized an unsecured webcam to conduct encryption attacks against victims’ networks via the use of an unsecured webcam. The attackers…
FBI Warns of Fake Ransom Demands Sent by Mail to US Executives
A new scam is targeting top business leaders in the United States, where criminals are sending letters demanding large ransom payments. Unlike typical ransomware attacks that involve hacking into computer systems, this scheme relies on physical mail. The letters…
Polish Space Agency Faces Cyberattack, Takes IT Systems Offline
The Polish Space Agency (POLSA) recently experienced a cybersecurity breach, prompting the organization to disconnect its IT infrastructure from the internet. POLSA confirmed the incident through a post on X, stating that relevant authorities had been notified. “There has…
North Korean Hackers Exploit ZIP Files in Sophisticated Cyber Attacks
State-sponsored hacking group APT37 (ScarCruft) is deploying advanced cyber-espionage tactics to infiltrate systems using malicious ZIP files containing LNK shortcuts. These files are typically disguised as documents related to North Korean affairs or trade agreements and are spread through…
Tata Technologies Cyberattack: Hunters International Ransomware Gang Claims Responsibility for 1.4TB Data Theft
Hunters International, a ransomware group known for high-profile cyberattacks, has claimed responsibility for a January 2025 cyberattack on Tata Technologies. The group alleges it stole 1.4TB of sensitive data from the company and has issued a threat to release…
Persistent Increase in Ransomware Attacks Raises Global Security Concerns
It was concluded that in the first five weeks of 2025, there was a significant increase in ransomware attacks targeted at the United States, marking a nearly 150% increase compared to the first five weeks of 2024. Based on…
Quantum Computers Threaten to Breach Online Security in Minutes
A perfect quantum computer could decrypt RSA-2048, our current strongest encryption, in 10 seconds. Quantum computing employs the principle of quantum physics to process information using quantum bits (qubits) rather than standard computer bits. Qubits can represent both states…
Fake Websites and Malware Threats: How to Stay Safe Online
Recent research from the cybersecurity company NordVPN has revealed a significant rise in online threats, with over 669 million malware attacks recorded in the UK in 2024 alone. This alarming number highlights the increasing risk of falling victim to…
Cybercriminals Abuse Microsoft Teams & Quick Assist for Remote Access
Trend Micro security experts discovered a sophisticated cyberattack that included social engineering tactics and commonly employed remote access tools. The attack, which uses stealthy infostealer malware, gives thieves permanent access over vulnerable PCs and allows them to steal sensitive…
Cyberattacks on Single Points of Failure Are Driving Major Industry Disruptions
Cybercriminals are increasingly targeting single points of failure within companies, causing widespread disruptions across industries. According to cybersecurity firm Resilience, attackers have shifted their focus toward exploiting key vulnerabilities in highly interconnected organizations, triggering a “cascading effect of disruption and…
AI as a Key Solution for Mitigating API Cybersecurity Threats
Artificial Intelligence (AI) is continuously evolving, and it is fundamentally changing the cybersecurity landscape, enabling organizations to mitigate vulnerabilities more effectively as a result. As artificial intelligence has improved the speed and scale with which threats can be detected…