Category: CySecurity News – Latest Information Security and Hacking Incidents

Iran Claims it Thwarted Sophisticated Cyberattack on its Infrastructure

  Iran thwarted a “widespread and complex” cyberattack on Sunday that targeted the nation’s infrastructure, a senior official told Tasnim News Agency, which is affiliated with the Islamic Revolutionary Guard Corps.  Behzad Akbari, the head of the government’s Telecommunications Infrastructure…

Digital Danger Zone: America’s Rising Cybersecurity Threats

  A major firm being hacked, facing a cyber threat, or having critical digital data leaked seems to make headlines every day. Cyberattacks increased dramatically worldwide in the first quarter of 2025, with an average of 1,925 attacks per organisation…

Microsoft Alerts Users About Password-spraying Attack

Microsoft alerts users about password-spraying attacks Microsoft has warned users about a new password-spraying attack by a hacking group Storm-1977 that targets cloud users. The Microsoft Threat Intelligence team reported a new warning after discovering threat actors are abusing unsecured…

Data Security Alert as Novel Exfiltration Method Emerges

Global cybersecurity experts are raising serious concerns over the newly identified cyber threat known as Data Splicing Attacks, which poses a significant threat to thousands of businesses worldwide. It seems that even the most advanced Data Loss Prevention (DLP) tools…

Apple Sends Spyware Threat Alerts to Users in 100 Countries

  Apple has issued threat notifications to users across 100 countries, warning them that their devices may have been targeted by sophisticated commercial spyware. The alerts, sent earlier this week, were confirmed by at least two recipients, including Italian journalist…

Threat Alert: Hackers Using AI and New Tech to Target Businesses

Hackers are exploiting the advantages of new tech and the availability of credentials, commercial tools, and other resources to launch advanced attacks faster, causing concerns among cybersecurity professionals.  Global Threat Landscape Report 2025 The 2025 Global Threat Landscape Report by…

US Targets Chinese Hacker with $10 Million Bounty.

  There has been a rare and pointed move by the Federal Bureau of Investigation (FBI), which highlights the growing threat of state-sponsored cyberespionage. This was announced through a public announcement earlier this week, stating they would offer a reward…

Pakistan State-sponsored Hackers Attack Indian Websites, Attempts Blocked

Pakistan’s cyber warfare against India Recently, Pakistan state-sponsored hacker groups launched multiple failed hacking attempts to hack Indian websites amid continuous cyber offensives against India after the Pahalgam terror attack. These breach attempts were promptly identified and blocked by the…

New Report Reveals Hackers Now Aim for Money, Not Chaos

Recent research from Mandiant revealed that financially motivated hackers are the new trend, with more than (55%) of criminal gangs active in 2024 aiming to steal or extort money from their targets, a sharp rise compared to previous years.  About…

Large-Scale Data Breach at Frederick Health Exposes Patient Records

  Two separate ransomware incidents have recently affected healthcare providers in Maryland and California and exposed sensitive information belonging to more than 1.1 million patients as a result, according to disclosures filed with federal regulators that recently broke the story.…

Android Spyware Concealed in Mapping App Targets Russian Military

  Doctor Web researchers discovered a new spyware, tracked as Android. Spy.1292.origin, targets Russian military people. The malicious code was concealed in a trojanized Alpine Quest app and distributed via Russian Android catalogues. The malware acquires contacts, geolocation, and file…

Don’t Delete Spam Emails Too Quickly — Here’s Why

  Most of us delete spam emails as soon as they land in our inbox. They’re irritating, unwanted, and often contain suspicious content. But what many people don’t know is that keeping them, at least briefly can actually help improve…

Scientists Warn of Cybersecurity Threats in Next-Gen DNA Sequencing

  Next-generation DNA sequencing (NGS) is under increasing criticism for its cyber risks. While NGS has transformed disciplines ranging from cancer diagnosis to infectious disease tracking, a recent study warns that the platforms that enable these advancements could also be…

Google Ends Privacy Sandbox, Keeps Third-Party Cookies in Chrome

  Google has officially halted its years-long effort to eliminate third-party cookies from Chrome, marking the end of its once-ambitious Privacy Sandbox project. In a recent announcement, Anthony Chavez, VP of Privacy Sandbox, confirmed that the browser will continue offering…

Investigating the Role of DarkStorm Team in the Recent X Outage

  It has been reported that Elon Musk’s social media platform, X, formerly known as Twitter, was severely disrupted on Monday after a widespread cyberattack that has caused multiple service disruptions. Data from outage monitoring service Downdetector indicates that at…

SK Telecom Malware Attack Exposes USIM Data in South Korea

  SK Telecom, South Korea’s top mobile carrier, has disclosed a security incident involving a malware infection that exposed sensitive information tied to users’ Universal Subscriber Identity Modules (USIMs). The breach was detected on the night of April 19, 2025,…

Zoom Platform Misused by Elusive Comet Attackers in Fraud Scheme

  Recent reports suggest that North Korean threat actors are now employing an alarming evolution in the tactics they employ to launch a sophisticated cybercrime operation known as Elusive Comet, a sophisticated cybercrime operation. This newly uncovered campaign demonstrates a…

How to Protect Your Smartphone During US Border Crossings

  Crossing into the United States has become riskier since the start of Trump’s second administration. Foreign visitors and US visa holders are increasingly being detained, questioned, or deported. As uncertainty grows, travel demand from Canada and Europe has dropped…

‘Fog’ Attackers Mock Victims With DOGE Ransom Notes

  Fog ransomware assaults over the last month have included a new ransom note mentioning the US Department of Government Efficiency (DOGE) and enticing victims to propagate the malware to other PCs, Trend Micro said earlier this week.  Analysis of…

Preventing Unauthorised Recovery of Deleted Files

  As far as users are concerned, once a file is removed from their computer, it is forever gone. However, the reality is more complex. The likelihood of recovering a deleted file depends on how it was deleted, as well…

Rise in Data-Stealing Malware Targeting Developers, Sonatype Warns

  A recent report released on April 2 has uncovered a worrying rise in open-source malware aimed at developers. These attacks, described as “smash and grab” operations, are designed to swiftly exfiltrate sensitive data from development environments. Brian Fox, co-founder…

Eight Arrested Over Financial Scam Using Deepfakes

  Hong Kong police have detained eight people accused of running a scam ring that overcame bank verification checks to open accounts by replacing images on lost identification cards with deepfakes that included scammers’ facial features.  Senior Superintendent Philip Lui…

Over 16,000 Fortinet Devices Infected With the Symlink Backdoor

  Over 16,000 internet-connected Fortinet devices have been identified as having a new symlink backdoor that permits read-only access to sensitive data on previously compromised systems.  The Shadowserver Foundation, a threat monitoring platform, has stated that 14,000 machines were exposed.…

Unexpected 4Chan Downtime Leads to Cybersecurity Speculation

  There has been a significant breach of security at 4chan recently, which has been widely reported. According to several online sources, a hacker may have managed to penetrate the platform’s internal systems after successfully infiltrating the platform’s anonymous and…

Black Basta: Exposing the Ransomware Outfit Through Leaked Chat Logs

  The cybersecurity sector experienced an extraordinary breach in February 2025 that revealed the inner workings of the well-known ransomware gang Black Basta.  Trustwave SpiderLabs researchers have now taken an in-depth look at the disclosed contents, which explain how the…

Google Plans Big Messaging Update for Android Users

  Google is preparing a major upgrade to its Messages app that will make texting between Android and iPhone users much smoother and more secure. For a long time, Android and Apple phones haven’t worked well together when it comes…

PDPC Probes Bangchak Data Breach Impacting 6.5 Million Records

  A major data breach involving Bangchak Corporation Public Company Limited is being swiftly investigated by Thailand’s Personal Data Protection Committee (PDPC). The company stated that unauthorised access to its customer feedback system had affected roughly 6.5 million records.  A…

Understanding ACR on Smart TVS and the Reasons to Disable It

  Almost all leading TV models in recent years have been equipped with Automatic Content Recognition (ACR), a form of advanced tracking technology designed to analyse and monitor viewing habits that is a key component of most television sets. As…

Microsoft: CLFS Zero-Day Flaw Exploited in Ransomware Attacks

  Ransomware attackers abused a zero-day flaw in a widely used Windows logging system for managing transactional information to launch attacks against organisations in the US real estate sector, Microsoft revealed Tuesday.  In a blog post, the tech giant stated…

AI-Powered Tools Now Facing Higher Risk of Cyberattacks

  As artificial intelligence becomes more common in business settings, experts are warning that these tools could be the next major target for online criminals. Some of the biggest software companies, like Microsoft and SAP, have recently started using AI…

Fake Microsoft Office Add-Ins Targeting Crypto Transactions

  The attackers are leveraging SourceForge to distribute fraudulent Microsoft add-ins that install malware on victims’ PCs to mine and siphon crypto. SourceForge.net is a legitimate software hosting and distribution platform that also offers version control, issue tracking, and dedicated…

Building Smarter AI Through Targeted Training

  In recent years, artificial intelligence and machine learning have been in high demand across a broad range of industries. As a consequence, the cost and complexity of constructing and maintaining these models have increased significantly. Artificial intelligence and machine…