Agentic browser at risk Agentic web browsers that use AI tools to autonomously do tasks across various websites for a user could be trained and fooled into phishing attacks. Hackers exploit the AI browsers’ tendency to assert their actions and…
Category: CySecurity News – Latest Information Security and Hacking Incidents
KadNap Malware Compromises Over 14,000 Edge Devices to Operate Hidden Proxy Botnet
Cybersecurity researchers have identified a previously undocumented malware strain called KadNap that is primarily infecting Asus routers and other internet-facing networking devices. The attackers are using these compromised systems to form a botnet that routes malicious traffic through residential…
Iran-Linked Handala Hackers Claim Breach of Israel’s Clalit Healthcare Network
A breach at Israel’s biggest health provider has been tied to an Iranian-affiliated hacking collective, which posted stolen patient records online. Claiming credit, a network calling itself Handala detailed the intrusion via public posts. Access reportedly reached Clalit Health…
Hackers Exploit FortiGate Devices to Hack Networks and Credentials
Exploiting network points to hack victims Cybersecurity experts have warned about a new campaign where hackers are exploiting FortiGate Next-Gen Firewall (NGFW) devices as entry points to hack target networks. The campaign involves abusing the recently revealed security flaws or…
AI Agents Boost Productivity but Introduce New Cybersecurity Risks for Organizations
Artificial Intelligence is rapidly evolving from a conversational tool into a system capable of performing real-world tasks independently. Known as AI Agents, these systems can carry out activities such as sending emails, transferring data, and managing software workflows without…
Commercial Spy Trackers Breach U.S. Army Networks, Jeopardizing National Security
U.S. Army networks face a hidden invasion from commercial spy technology, compromising soldier data and national security in alarming ways. A groundbreaking study by the Army Cyber Institute at West Point analyzed traffic on military networks, discovering that 21.2%…
Hackers Exploit Claude to Target Multiple Mexican Government Agencies
As generative artificial intelligence emerges, digital innovation is evolving at an unprecedented rate, but it is also quietly reshaping cybercrime in a subtle way. Tools originally designed for the purpose of research, coding, and problem-solving are now being explored…
Fake Google Meet Update Can Give Attackers Control of Your Windows PC
Cybersecurity analysts have identified a phishing campaign that can quietly hand control of a Windows computer to attackers after a single click. The scam appears as a routine update notice for Google Meet, but the prompt is fraudulent and…
Age Verification Laws for Social Media Raise Privacy Concerns and Enforcement Challenges
Across nations, governments push tighter rules limiting young users’ access to social media. Because of worries over endless scrolling, disturbing material online, or growing emotional struggles in teens, officials demand change. Minimum entry ages – often 13 or 16…
Conduent Leak: One of the Largest Breaches in The U.S
Conduent, a business that offers printing, payment, and document processing services to some of the biggest health insurance companies in the nation, has had at least 25 million people’s personal information stolen. Addresses, social security numbers, and health information were…
Apple Rolls Out Global Age-Verification System to Protect Kids Online
Apple has rolled out a new global age-verification system across its platforms, aimed at keeping kids safer online while helping developers comply with tightening child safety laws worldwide. The move targets both app downloads and in‑app experiences, with a…
Rising Cyber Threats Linked to Ongoing Middle East Conflict
A geopolitical crisis has historically been fought on physical battlefields, but its effects are seldom confined to borders in the modern threat landscape. While tensions are swirling across the Middle East as a result of the United States’ military operations…
Mental Health Apps With Million Downloads Filled With Security Vulnerabilities
Mental health apps may have flaws Various mental health mobile applications with over millions of downloads on Google Play have security flaws that could leak users’ personal medical data. Researchers found over 85 medium and high-severity vulnerabilities in one of…
New Copilot Setting May Access Activity From Other Microsoft Services. Here’s How Users Can Disable It
A recently noticed configuration inside Microsoft Copilot may allow the AI tool to reference activity from several other Microsoft platforms, prompting renewed discussion around data privacy and AI personalization. The option, which appears within Copilot’s settings, enables the assistant…
Cyberattacks Shift Tactics as Hackers Exploit User Behavior and AI, Experts Warn
Cybersecurity threats are evolving rapidly, forcing businesses to rethink how they approach digital security. Experts say modern cyberattacks are no longer focused solely on breaking technical defenses but are increasingly designed to exploit everyday user behavior. According to…
ECB Tightens Oversight of Banks’ Growing AI Sector Risks
The European Central Bank is intensifying its oversight of how eurozone lenders finance the fast‑growing artificial intelligence ecosystem, reflecting concern that the boom in data‑centre and AI‑related infrastructure could hide pockets of credit and concentration risk. In recent weeks,…
Researchers Find Critical Zero-Day Vulnerabilities in Foxit and Apryse PDF Platforms
PDF files are often seen as simple digital documents, but recent research shows they have evolved into complex software environments that can expose corporate systems to cyber risks. Modern PDF tools now function more like application platforms than basic…
AI-Powered Cybercrime Hits 600+ FortiGate Firewalls Across 55 Countries, AWS Warns
Cybercriminals using readily available generative AI tools managed to breach more than 600 internet-facing FortiGate firewalls across 55 countries within a little over a month, according to a recent incident analysis released by Amazon Web Services (AWS). The operation,…
Optimizely Reports Data Breach Linked to Sophisticated Vishing Incident
In addition to serving as a crossroads of technology, marketing intelligence, and vast networks of corporate data, digital advertising platforms are becoming increasingly attractive targets for cybercriminals seeking an entry point into enterprise infrastructure. Optimizely recently revealed that a…
OpenAI’s Codex Security Flags Over 10,000 High-Risk Vulnerabilities in Code Scan
Artificial intelligence is increasingly being used to help developers identify security weaknesses in software, and a new tool from OpenAI reflects that shift. The company has introduced Codex Security, an automated security assistant designed to examine software projects, detect…