A new phishing operation is misleading users through an extremely subtle visual technique that alters the appearance of Microsoft’s domain name. Attackers have registered the look-alike address “rnicrosoft(.)com,” which replaces the single letter m with the characters r and…
Category: CySecurity News – Latest Information Security and Hacking Incidents
North Korean APT Collaboration Signals Escalating Cyber Espionage and Financial Cybercrime
Security analysts have identified a new escalation in cyber operations linked to North Korea, as two of the country’s most well-known threat actors—Kimsuky and Lazarus—have begun coordinating attacks with unprecedented precision. A recent report from Trend Micro reveals that…
X’s New Location Feature Exposes Foreign Manipulation of US Political Accounts
X’s new location feature has revealed that many high-engagement US political accounts, particularly pro-Trump ones, are actually operated from countries outside the United States such as Russia, Iran, and Kenya. This includes accounts that strongly claim to represent American…
More Breaches, More Risks: Experts say Protect Your Data Now
As data breaches surge, experts warn consumers to guard personal information before it reaches the dark web With data breaches becoming almost routine, more consumers are being forced to confront the risks of having their personal information exposed online. …
Indian Teen Enables Apple-Exclusive AirPods Features on Android
As Apple’s AirPods have long been known, they offer a wide range of intelligent features, such as seamless device switching, adaptive noise control, and detailed battery indicators, but only if they are paired with an iPhone. This has left Android…
Banking Malware Can Hack.Communications via Encrypted Apps
Sturnus hacks communication A new Android banking malware dubbed Sturnus can hack interactions from entirety via encrypted messaging networks like Signal, WhatsApp, and Telegram, as well as take complete control of the device. While still under growth, the virus is…
Your Phone Is Being Tracked in Ways You Can’t See: One Click Shows the Truth
Many people believe they are safe online once they disable cookies, switch on private browsing, or limit app permissions. Yet these steps do not prevent one of the most persistent tracking techniques used today. Modern devices reveal enough technical…
Nvidia’s Strong Earnings Ease AI Bubble Fears Despite Market Volatility
Nvidia (NVDA) delivered a highly anticipated earnings report, and the AI semiconductor leader lived up to expectations. “These results and commentary should help steady the ship for the AI trade into the end of the year,” Jefferies analysts wrote…
AI Emotional Monitoring in the Workplace Raises New Privacy and Ethical Concerns
As artificial intelligence becomes more deeply woven into daily life, tools like ChatGPT have already demonstrated how appealing digital emotional support can be. While public discussions have largely focused on the risks of using AI for therapy—particularly for younger…
Streaming Platforms Face AI Music Detection Crisis
Distinguishing AI-generated music from human compositions has become extraordinarily challenging as generative models improve, raising urgent questions about detection, transparency, and industry safeguards. This article explores why even trained listeners struggle to identify machine-made tracks and what technical, cultural,…
CrowdStrike Fires Insider Who Leaked Internal Screenshots to Hacker Groups, Says no Customer Data was Breached
American cybersecurity company CrowdStrike has confirmed that screenshots taken from its internal systems were shared with hacker groups by a now-terminated employee. The disclosure follows the appearance of the screenshots on Telegram, posted by the cybercrime collective known as…
IGT Responds to Reports of Significant Ransomware Intrusion
An investigation by the Russian-linked ransomware group Qilin has raised fresh concerns within the global gaming and gambling industry after they claimed responsibility for the cyber intrusion that targeted global gambling giant IGT in recent weeks. A dark-web leak…
PlushDaemon Group Reroutes Software Updates to Deploy Espionage Tools
A cyberespionage group known in security research circles as PlushDaemon has been carrying out a long-running operation in which they take advantage of software update systems to secretly install their own tools on targeted computers. According to new analysis…
WhatsApp Enumeration Flaw Exposes Data of 3.5 Billion Users in Massive Scraping Incident
Security researchers in Austria uncovered a significant privacy vulnerability in WhatsApp that enabled them to collect the personal details of more than 3.5 billion registered users, an exposure they believe may be the largest publicly documented data leak to…
UK Loses £11 Billion to Scams and NordVPN Responds with Call Protection
With a surge in digital fraud that has continued to erupt throughout the past year, NordVPN has introduced a new defense system aimed at protecting mobile users against the rapidly evolving tactics of cybercriminals. In order to provide a…
Salesforce Probes Gainsight Breach Exposing Customer Data
Salesforce has disclosed that some of its customers’ data was accessed following a breach of Gainsight, a platform used by businesses to manage customer relationships. The breach specifically affected Gainsight-published applications that were connected to Salesforce, with these apps…
Massive Data Breach Hits Italy’s FS Italiane After Cyberattack on IT Provider Almaviva
Data belonging to Italy’s state-owned railway operator, the FS Italiane Group, has been exposed after a cybercriminal infiltrated the systems of its IT partner, Almaviva. The attacker claims to have exfiltrated a massive 2.3 terabytes of information, later publishing…
Growing Concern as Authorities Assess Cyber Incident at Real Estate Finance Firm
An extreme cyber intrusion which led to considerable concern among U.S. financial institutions over the weekend has been hailed by leading American banks and mortgage lenders as a major development that must be addressed urgently in order to reduce…
Big Tech’s New Rule: AI Age Checks Are Rolling Out Everywhere
Large online platforms are rapidly shifting to biometric age assurance systems, creating a scenario where users may lose access to their accounts or risk exposing sensitive personal information if automated systems make mistakes. Online platforms have struggled for decades…
Google’s High-Stakes AI Strategy: Chips, Investment, and Concerns of a Tech Bubble
At Google’s headquarters, engineers work on Google’s Tensor Processing Unit, or TPU—custom silicon built specifically for AI workloads. The device appears ordinary, but its role is anything but. Google expects these chips to eventually power nearly every AI action…