A concerning trend has sent shockwaves across cybersecurity authorities, with central cyber and intelligence organisations tracking and documenting large-scale data leaks perpetrated by bank staff and third party contractors. According to a senior Indian government official, the issue has…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Call Merging Scams and Financial Security Risks with Prevention Strategies
It is not uncommon for fraudsters to develop innovative tactics to deceive their targets, with one of the latest scams being the called merging scam in which the scammers attempt to gain unauthorized access to the victim’s accounts to…
BlackLock Ransomware: The Fastest-Growing Cyber Threat and How to Stay Safe
Ransomware remains a major problem for businesses, and a new cybercriminal group is expanding at an alarming rate. Security researchers at ReliaQuest have identified BlackLock as the fastest-growing ransomware operation today, with its activity increasing by 1,425% since late…
Bybit Crypto Exchange Hacked for $1.5 Billion in Largest Crypto Heist
Bybit, one of the world’s largest cryptocurrency exchanges, has suffered a massive security breach, resulting in the loss of $1.5 billion in digital assets. The hack, now considered the largest in crypto history, compromised the exchange’s cold wallet—an offline…
Building Robust AI Systems with Verified Data Inputs
Artificial intelligence is inherently dependent on the quality of data that powers it for it to function properly. However, this reliance presents a major challenge to the development of artificial intelligence. There is a recent report that indicates that…
Role of Continuous Threat Exposure Management in Business Security
Continuous threat exposure management (CTEM) is a framework for proactively managing and mitigating threat exposure using an iterative approach that emphasises on developing structured organisational procedures as well as leveraging security tools. In this article, we’ll go over CTEM,…
Massive Banking Data Leaks Under Scrutiny as Cyber Fraud Cases Surge
A concerning rise in large-scale data breaches has put cybersecurity agencies on high alert, with central cyber and intelligence bodies actively tracking incidents linked to bank employees and third-party vendors. According to a senior government official, the matter has…
University of Notre Dame Hit by Cyberattack— Hackers Say They Stole Everything
A cybercriminal group known as Fog Ransomware has claimed responsibility for a cyberattack on the University of Notre Dame in Perth, Australia. According to reports, the group has allegedly stolen 62.2GB of sensitive data, including student medical records, staff…
Black Basta’s Slowdown Coincides with BlackLock’s Growth
The activity level of ransomware groups with “black” in their name has varied greatly over the early months of the new year. Despite the significant increase in attacks caused by the BlackLock ransomware group, the long-established Black Basta ransomware…
European Healthcare Entities Targeted With NailaoLocker Ransomware
A previously undocumented ransomware payload named NailaoLocker has been detected in assaults targeting European healthcare entities between June and October 2024. The attackers employed CVE-2024-24919, a Check Point Security Gateway vulnerability, to obtain access to targeted networks and install…
Hidden Bluetooth Security Threats and How to Protect Your Devices
Bluetooth technology has made wireless connectivity effortless, powering everything from headphones and smartwatches to home automation systems. However, its convenience comes with significant security risks. Many users unknowingly leave their devices vulnerable to cyber threats that can steal personal…
Serious Security Flaw in Exim Email Servers Could Let Hackers Steal Data
A dangerous security flaw has been discovered in Exim, a widely used email server software. The vulnerability, officially tracked as CVE-2025-26794, allows hackers to inject harmful commands into the system, potentially leading to data theft or even complete control…
Internal Chat Logs of Black Basta Ransomware Gang Leaked Online
A previously unidentified source has leaked what is claimed to be an archive of internal Matrix chat logs linked to the Black Basta ransomware group. The individual behind the leak, known as ExploitWhispers, initially uploaded the stolen messages to…
Hackers Use Invisible Unicode Trick to Hide Phishing Attacks
Cybercriminals have discovered a new way to conceal malicious code inside phishing attacks by using invisible Unicode characters. This technique, identified by Juniper Threat Labs, has been actively used in attacks targeting affiliates of a U.S. political action committee…
Lack of Phishing Awareness Among Executives Poses a Security Threat
Even though phishing scams are predicted to continue to pose a serious cybersecurity threat in the years to come, recent research has highlighted the fact that a worrying gap in awareness among business leaders has been identified as a…
Australian IVF Giant Genea Suffers Data Breach Following Cyber Incident
A leading Australian IVF clinic suspects personal patient information may have been compromised during a cyber attack earlier this month. On February 14, Genea suspended several services and launched an inquiry into suspicious activity discovered on its network. In…
US Defense Industry Targeted in Infostealer Malware Campaign
Several major defence contractors, such as Lockheed Martin, Boeing, and Honeywell, as well as the United States Army, and Navy, and several major defence contractors have been recently revealed to be infected with the Infostealer malware, according to Hudson…
FBI And CISA Issues Warning of Ongoing ‘Ghost’ Ransomware Attack
Ghost, a ransomware outfit, has been exploiting software and firmware flaws since January, according to an FBI and Cybersecurity and Infrastructure Security Agency (CISA) advisory issued last week. The outfit, also known as Cring and based in China, focusses…
Hackers Release Powerful Tool to Unlock Microsoft Software for Free
A group of hackers has created a tool that allows people to activate Microsoft Windows and Office software without needing an official license. This method, described as a major breakthrough in software piracy, completely bypasses Microsoft’s security system. Surprisingly,…
Lee Enterprises Faces Prolonged Ransomware Attack Disrupting Newspaper Operations
Lee Enterprises, one of the largest newspaper publishers in the United States, is facing an ongoing ransomware attack that has severely disrupted its operations for over three weeks. The company confirmed the attack in a filing with the U.S.…