A recent cyberattack on Salesforce customers has prompted Workiva to disclose a breach linked to a recent wave of attacks, serving as a reminder of the increasing cybersecurity risks faced by global organisations. Workiva provides financial reporting, compliance, and…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Experts Advise Homeowners on Effective Wi-Fi Protection
Today, in a world where people are increasingly connected, the home wireless network has become an integral part of daily life. It powers everything from remote working to digital banking to entertainment to smart appliances, personal communication, and smart…
Salesloft Integration Breach Exposes Salesforce Customer Data
A recent cyber incident has brought to light how one weak link in software integrations can expose sensitive business information. Salesloft, a sales automation platform, confirmed that attackers exploited its Drift chat integration with Salesforce to steal tokens that…
CISOs fear material losses amid rising cyberattacks
Chief information security officers (CISOs) are worried about the dangers of a cyberattack, and there is an anxiety due to the material losses of data that organizations have suffered in the past year. According to a report by Proofpoint, the…
Google Messages Adds QR Code Verification to Prevent Impersonation Scams
Google is preparing to roll out a new security feature in its Messages app that adds another layer of protection against impersonation scams. The update, now available in beta, introduces a QR code system to verify whether the person…
Spotify Launches In-App Messaging for Private Music, Podcast, and Audiobook Sharing
Spotify has introduced an in-app messaging feature called “Messages,” allowing users to share music, podcasts, and audiobooks directly within the app. This new feature aims to make music sharing easier and more social by keeping conversations about content within…
Malicous npm package exploit crypto wallets
Experts have found a malicious npm package that consists of stealthy features to deploy malicious code into pc apps targeting crypto wallets such as Exodus and Atomic. About the package Termed as “nodejs-smtp,” the package imitates the genuine email library…
Cybersecurity Breach Leads to Major Disruption at Jaguar Land Rover
In a major cybersecurity incident which has caused major disruption to the operations of Jaguar Land Rover, it highlights the growing vulnerability of automakers across the world to cyberattacks, underlining the increasing need to maintain communication channels between automakers…
Google to Confirm Identity of Every Android App Developer
Google announced a new step to make Android apps safer: starting next year, developers who distribute apps to certified Android phones and tablets, even outside Google Play, will need to verify their legal identity. The change ties every app…
Data I/O Ransomware Attack Exposes Vulnerability in Global Electronics Supply Chain
Data I/O, a leading manufacturer specializing in device programming and security provisioning solutions, experienced a major ransomware attack in August 2025 that crippled core operations and raised industry-wide concerns about supply chain vulnerabilities in the technology sector. The attack,…
Malicious Go Package Disguised as SSH Tool Steals Credentials via Telegram
Researchers have uncovered a malicious Go package disguised as an SSH brute-force tool that secretly collects and transmits stolen credentials to an attacker-controlled Telegram bot. The package, named golang-random-ip-ssh-bruteforce, first appeared on June 24, 2022, and was linked to…
Zscaler Confirms Exposure in Salesloft-Linked Data Breach
Zscaler has confirmed that it is among the latest organizations to be impacted by a major supply chain attack exploiting the Salesloft Drift application, which integrates with Salesforce. According to the company, attackers managed to steal OAuth tokens tied…
Beware of SIM swapping attacks, your phone is at risk
In today’s digital world, most of our digital life is connected to our phone numbers, so keeping them safe becomes a necessity. Sad news: hackers don’t need your phone to access your number. What is SIM swapping? Also known as…
Business and IT Leaders Diverge on Cloud and Security Priorities
Enterprises are preparing to expand their cloud investments, even as many remain dissatisfied with the financial returns of recent technology deployments, according to a new report from Unisys. The study, which surveyed 1,000 C-suite and IT executives across eight…
India’s Biggest Cyber Fraud: Businessman Duped of ₹25 Crore Through Fake Trading App
A Kochi-based pharmaceutical company owner has suffered a loss of ₹25 crore in what is being described as the largest single-person cyber fraud case in India. The incident involved a sophisticated online trading scam, executed through a fake trading…
New Forensic System Tracks Ghost Guns Made With 3D Printing Using SIDE
The rapid rise of 3D printing has transformed manufacturing, offering efficient ways to produce tools, spare parts, and even art. But the same technology has also enabled the creation of “ghost guns” — firearms built outside regulated systems and…
Password Managers Face Clickjacking Flaw, Millions of Users at Risk
For years, password managers have been promoted as one of the safest ways to store and manage login details. They keep everything in one place, help generate strong credentials, and protect against weak or reused passwords. But new research has…
Cybersecurity Landscape Shaken as Ransomware Activity Nearly Triples in 2024
Ransomware is one of the most persistent threats in the evolving landscape of cybercrime, but its escalation in 2024 has marked an extremely alarming turning point. Infiltrating hospitals, financial institutions, and even government agencies in a manner that has…
Researchers Expose AI Prompt Injection Attack Hidden in Images
Researchers have unveiled a new type of cyberattack that can steal sensitive user data by embedding hidden prompts inside images processed by AI platforms. These malicious instructions remain invisible to the human eye but become detectable once the images…
Age Checks Online: Privacy at Risk?
Across the internet, the question of proving age is no longer optional, it’s becoming a requirement. Governments are tightening rules to keep children away from harmful content, and platforms are under pressure to comply. From social media apps and…