Stryker’s latest cyber incident is a stark reminder that attackers do not always need malware to cause major damage. The medical technology company said the breach was confined to its internal Microsoft environment and did not affect its products,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
eth.limo DNS Hijack Thwarted By DNSSEC After Social Engineering Attack On EasyDNS
Unexpectedly, the ENS gateway known as eth.limo revealed a DNS hijack stemming from a social engineering scheme aimed at EasyDNS, its domain provider. Though settings shifted temporarily under unauthorized access, safeguards held firm throughout. Protection layers blocked harm, keeping…
Retailer Secures Website After Customer Data Leak Risk Identified
Express has quietly fixed a security flaw that permitted unauthorized access to customer order data following a significant lapse in web application security. This vulnerability exposed sensitive information ranging from customer names, emails, telephone numbers, shipping details, and partial…
Fake Court Summons And Survey Scams Surge As Regions Bank Warns Of Rising Consumer Fraud Risks
Fear remains one of the most powerful tools scammers use, and today’s fraud tactics are evolving to exploit it more effectively than ever. Fake court summons and deceptive online survey scams are now being widely used to trick individuals…
Bank of America Bets Big on Risky Anthropic AI
Bank of America is aggressively expanding its use of Anthropic’s advanced AI technology, even as U.S. regulators issue stark cybersecurity warnings. The bank’s commitment highlights a broader trend where nearly 70% of financial institutions integrate AI into operations, prioritizing…
Hackers Use Hidden QEMU Linux VMs to Evade Windows Security and Launch Stealth Attacks
Cybersecurity experts have uncovered a stealthy tactic where attackers bypass Windows defenses by running concealed Linux virtual machines using QEMU. Researchers warn that these hidden environments allow threat actors to maintain persistent access, steal sensitive data, and even deploy…
Security Researchers Uncover QEMU-Powered Evasion in Payouts King Ransomware
Several recent incidents of ransomware activity attributed to the Payouts King operation have highlighted a systematic shift toward virtualization-assisted intrusions, with attackers embedding QEMU as an execution layer within compromised systems. QEMU instances can be configured as reverse SSH…
Salesforce’s New “Headless 360” Lets AI Agents Run Its Platform
Salesforce has introduced what it describes as the most crucial architectural overhaul in its 27-year history, launching a new initiative called “Headless 360.” The update is designed to allow artificial intelligence agents to control and operate the company’s entire…
Tinder And Zoom Introduce World ID Iris Scanning To Verify Humans Amid Rising AI Fake Profiles
Now comes eye-scan tech on Tinder and Zoom, rolling out to confirm real people behind profiles amid rising fears about AI mimics and bots. This move leans on identity checks from World ID – backed by Tools for Humanity…
Nvidia’s AI Launch Sparks Quantum Stock Surge, Minting Xanadu’s CEO a Billionaire
Quantum computing stocks jumped after Nvidia unveiled its Ising open-source AI model family, a move that investors interpreted as a strong validation of the sector. The result was a sharp rally in several names, with Xanadu standing out as…
Fake CAPTCHA Lures Power IRSF Fraud and Crypto Theft Campaigns
Research by Infoblox reveals a new fraud operation that combines routine web security practices with telecom billing abuse, resulting in unauthorized mobile activity by using counterfeit CAPTCHA interfaces. In this scheme, familiar human verification prompts are repurposed as covert…
ShinyHunters Targets McGraw Hill In Salesforce Data Leak Dispute Over Breach Scope
A breach at McGraw Hill came to light when details appeared on a leak page run by ShinyHunters, a hacking collective now seeking payment. Appearing online without warning, the listing suggested sensitive data had been taken. The firm acknowledged…
PhantomCore Exploits TrueConf Flaws to Breach Russian Networks
A pro-Ukrainian hacktivist group known as PhantomCore has been exploiting vulnerabilities in TrueConf video conferencing software to infiltrate Russian networks since September 2025. According to a Positive Technologies report, the attackers chained three undisclosed flaws in TrueConf Server, allowing…
The Shift from Cyber Defense to Recovery-Driven Security
There has been a structural recalibration of cybersecurity strategies as organizations recognize that breaches impact operations, finances, and reputation in ways that extend far beyond the moment of intrusion. Incidents that once remained within the domain of IT are…
AI Was Meant to Help. So Why Is It Making Work Harder for Women in Indonesia?
Artificial intelligence is often presented as a neutral and forward-looking force that improves efficiency and removes human bias from decision-making. In practice, however, many women working in Indonesia’s gig economy experience these systems very differently. Rather than easing workloads,…
Rival Ransomware Gangs 0APT And Krybit Clash In Unusual Cyber Extortion Battle
A clash almost unseen among digital outlaws has begun – 0APT, a hacking collective, now warns it will unmask operatives from enemy faction Krybit. This shift came to light through surveillance of hidden online forums. Tension simmers beneath the…
UAE Businesses Warned of Escalating AI‑Powered Cyber Threats
UAE businesses are being urgently warned about a sharp rise in AI‑powered cyber threats that can compromise systems within hours, and sometimes even minutes, if organisations remain unprepared. Cybercriminals are increasingly using artificial intelligence to craft highly realistic phishing…
Pre Stuxnet Fast16 Threat Revealed Targeting Engineering Environments
New discoveries regarding early stages of cyber sabotage are changing the historical timeline of offensive digital operations and revealing that sophisticated disruption techniques were developed well before they became widely popular. An undocumented malware framework that was discovered in…
ChipSoft Ransomware Incident Disrupts Dutch Healthcare Systems And Hospital Operations
Early in April, a ransomware incident struck ChipSoft, a Dutch firm supplying healthcare software. Hospitals relying on its systems faced major interruptions. Some had to go offline – cutting access to essential tools. Instead of regular operations, backup plans took…
AI-Driven Hack Breach Hits Government Agencies
A lone attacker reportedly used Claude and GPT-4.1 to breach nine Mexican government agencies, exposing data tied to 195 million citizens and showing how generative AI can accelerate cybercrime. The incident, which ran from December 2025 to February 2026,…