For years, CAPTCHAs have been a familiar online hurdle—click a box, identify a few blurry images, and prove you’re human. They’ve long served as digital gatekeepers to help websites filter out bots and protect against abuse. But now, cybercriminals…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Massive Data Breach Hits Elon Musk’s X Platform
A potentially massive data breach has reportedly compromised Elon Musk’s social media platform X, previously known as Twitter, raising significant privacy concerns for millions of users. Cybersecurity researchers from SafetyDetectives discovered a troubling post over the weekend on BreachForums,…
Apple and Google App Stores Host VPN Apps Linked to China, Face Outrage
Google (GOOGL) and Apple (AAPL) are under harsh scrutiny after a recent report disclosed that their app stores host VPN applications associated with a Chinese cybersecurity firm, Qihoo 360. The U.S government has blacklisted the firm. The Financial Times reports…
Triada Malware Embedded in Counterfeit Android Devices Poses Global Security Risk
There has been a significant increase in counterfeit Android smartphones in recent years. Recently, cybersecurity investigations have revealed a concern about counterfeit Android smartphones. These unauthorized replicas of popular mobile devices, which are being widely circulated and are pre-loaded…
Google sets new rules to improve internet safety through better website security
Google is taking major steps to make browsing the web safer. As the company behind Chrome, the most widely used internet browser, Google’s decisions shape how people all over the world experience the internet. Now, the company has announced…
Fake Zoom Download Sites Spreading BlackSuit Ransomware, Experts Warn
A new cyberattack campaign is targeting Zoom users by disguising ransomware as the popular video conferencing tool, according to Cybernews. Researchers from DFIR have uncovered a scheme by the BlackSuit ransomware gang, which uses deceptive websites to distribute malicious…
North Korean Hackers Use 11 Malicious npm Packages to Propagate BeaverTail Malware
The North Korean threat actors behind the ongoing Contagious Interview campaign are expanding their tentacles on the npm ecosystem by distributing more malicious packages including the BeaverTail malware and a new remote access trojan (RAT) loader. “These latest samples…
Russia Accused of Carrying Out Over 50 Secret Operations Across Europe
In the last few years since the war in Ukraine began, several European countries have experienced unusual and suspicious activities. These events include online attacks, spying, fires, and efforts to spread false information. Investigations suggest that many of these…
Hackers Exploit WordPress Logins, Secretly Run Codes
Threat actors are exploiting the WordPress mu-plugins (“Must-Use Plugins”) directory to secretly execute malicious code on each page while avoiding detection. The technique was first observed by security researchers at Sucuri in February 2025, but adoption rates are on the…
What Are USB Kill Sticks and How They Can Destroy Your Devices
Most people think of USB drives as simple tools for storing and transferring files. But not all USB sticks are as harmless as they appear. Some, known as “USB Kill Sticks” or “USB Killers,” are specifically designed to damage…
Check Point Downplays Hacker’s Claims Amid Alleged Data Breach
A hacker using the alias “CoreInjection” has claimed responsibility for stealing what they describe as a “highly sensitive” dataset from cybersecurity firm Check Point. According to several media reports, the alleged stolen data includes user login credentials, employee contracts,…
Smishing Triad Broadens Fraud Campaign to Include Toll Payment Services
Tolling agencies throughout the United States are battling an escalating cybersecurity threat that is causing deceptive text message scams, which are often called smishing, to escalate. As a result of these fraudulent campaigns, unsuspecting motorists are lured into clicking…
APIsec Secures Exposed Customer Data After Unprotected Database Found Online
API security firm APIsec has confirmed it secured an exposed internal database that was left accessible on the internet without a password for several days, potentially exposing sensitive customer information. The database, which was discovered by cybersecurity research firm…
Turned Into a Ghibli Character? So Did Your Private Info
A popular trend is taking over social media, where users are sharing cartoon-like pictures of themselves inspired by the art style of Studio Ghibli. These fun, animated portraits are often created using tools powered by artificial intelligence, like ChatGPT-4o.…
Oracle Finally Acknowledges Cloud Hack
Oracle is reportedly trying to downplay the impact of the attack while quietly acknowledging to clients that some of its cloud services have been compromised. A hacker dubbed online as ‘rose87168’ recently offered to sell millions of lines of…
Phishing Scams Are Getting Smarter – And More Subtle : Here’s All You Need to Know
Cybercriminals are evolving. Those dramatic emails warning about expired subscriptions, tax threats, or computer hacks are slowly being replaced by subtler, less alarming messages. New research suggests scammers are moving away from attention-grabbing tactics because people are finally catching…
Hackers Can Spy on Screens Using HDMI Radiation and AI Models
You may feel safe behind your screen, but it turns out that privacy might be more of an illusion than a fact. New research reveals that hackers have found an alarming way to peek at what’s happening on your…
Massive Data Breach at Samsung Exposes 270000 Records
During the analysis of the Samsung Germany data breach, a wide range of sensitive information was found to be compromised, including customer names, addresses, email addresses, order history, and internal communications, among other sensitive data. Those findings were contained…
Revolution or Hype? Meet the AI Agent That’s Automating Invoicing for Thousands
French startup Twin has introduced its very first AI-powered automation tool to help business owners who use Qonto. Qonto is a digital banking platform that offers financial services to companies across Europe. Many Qonto users spend hours each month…
Vulnerabilities Alert: Solar Power Grids Worldwide Under Threat of Cyber Attacks
Global solar power industry under threat The rise in the use of solar power worldwide has revealed gaps in cybersecurity in cloud computing devices, inverters, and monitoring platforms. As these become prone to critical vulnerabilities, it creates an unsafe ecosystem…