Bitcoin transactions are transparent by design, they work as a pseudonym where operations are visible but identity is hidden. But the increasing amount of identity-based data around users is affecting the transparency into a personal security threat. The problem The…
Category: CySecurity News – Latest Information Security and Hacking Incidents
LexisNexis Confirms Data Breach After Hackers Exploit Unpatched React App
A breach at LexisNexis Legal & Professional exposed some customer and business data, the firm confirmed. News surfaced after FulcrumSec claimed responsibility and leaked about two gigabytes of files on underground platforms. Hackers accessed parts of the company’s systems,…
China Tightens Control Over Official Data Available to the Outside World
Early in the Internet’s history, the global network architecture was widely recognized as an evolving system for transferring government documents, statistical records, and institutional disclosures across jurisdictions a borderless repository of knowledge that enabled government documents to travel freely…
Coruna Exploit Kit Targets iPhones With 23 Vulnerabilities Across Multiple iOS Versions
Security researchers have identified a powerful exploit framework targeting Apple iPhones running older versions of the iOS operating system. The toolkit, called Coruna and also known as CryptoWaters, includes multiple exploit chains capable of targeting devices running iOS versions…
Fake FileZilla Website Distributes Malware-Infected Download
A fraudulent website is distributing a modified portable edition of FileZilla version 3.69.5 that contains embedded malware. The archive appears legitimate and includes the authentic open-source FTP client, but attackers inserted one additional file, a rogue dynamic-link library named…
BYOVD Attacks Turn Trusted Windows Drivers Into Security Threats
Cybersecurity researchers are warning about a growing wave of attacks that exploit legitimate Windows drivers to bypass security protections and gain deep control over targeted systems. The technique, known as Bring Your Own Vulnerable Driver or BYOVD, involves attackers…
Rhysida Claims Responsibility for November 2025 Ransomware Attack on Southold, New York
A ransomware gang known as Rhysida has claimed it was behind a cyberattack carried out in November 2025 against the local government of Southold, New York. Town authorities first disclosed the incident on November 24, 2025, revealing that a…
University of Hawaiʻi Cancer Center Suffers Data Breach from Ransomware Attacks
A ransomware attack on the University of Hawaii Cancer Center’s epidemiology division last year resulted in information leaks for up to 1.2 million people. About the incident According to a statement issued by the organization last week, hackers gained access…
Rocket Software Research Highlights Data Security and AI Infrastructure Gaps in Enterprise IT Modernization
Stress is rising among IT decision-makers as organizations accelerate technology upgrades and introduce AI into hybrid infrastructure. Data security now leads modernization concerns, with nearly 70 percent identifying it as their primary pressure point. As transformation speeds up, safeguarding…
Microsoft Copilot Bug Exposes Confidential Outlook Emails
A critical bug in Microsoft 365 Copilot, tracked as CW1226324, allowed the AI assistant to access and summarize confidential emails in Outlook’s Sent Items and Drafts folders, bypassing sensitivity labels and Data Loss Prevention (DLP) policies. Microsoft first detected…
Qualcomm Zero Day Among 129 Issues Fixed in Android Security Push
With its latest security bulletin, Google has taken steps to address a broad range of Android vulnerabilities, releasing patches for 129 vulnerabilities spanning core platform components and third party modules. These vulnerabilities include ten that are rated critical, and…
Two AI Data Breaches Leak Over Billion KYC Records
About the leaks Two significant data leaks connected to two AI-related apps have been discovered by cybersecurity researchers, exposing the private information and media files of millions of users worldwide. The security researchers cautioned that more than a billion records…
SLH Pays Up to $1,000 Per Call to Expand IT Help Desk Vishing Operations
A cybercrime network known as Scattered LAPSUS$ Hunters, or SLH, is offering financial rewards ranging from $500 to $1,000 per call to recruit women for voice phishing operations targeting corporate IT help desks. The development was detailed in a…
Korean Tax Agency Leaks Seed Phrase, Loses $4.8M in Crypto
South Korea’s National Tax Service (NTS) turned a major tax evasion crackdown into a $4.8 million cryptocurrency catastrophe by accidentally exposing a seized wallet’s seed phrase in a public press release. Hackers drained 4 million Pre-Retogeum (PRTG) tokens from…
Google Chrome Introduces Merkle Tree Certificates to Build Quantum-Resistant HTTPS
A fresh move inside Google Chrome targets long-term security of HTTPS links against risks tied to quantum machines. Instead of dropping standard X.509 certificates straight into the Chrome Root Store – ones using post-quantum methods – the team leans…
New Massiv Malware Targets Android Banking Users Through Fake IPTV App
As a result of the convenience of mobile streaming, user behavior has quietly been reshaped, normalizing the practice of downloading applications outside of official app marketplaces that have been guarded. In this gray area of digital consumption, a recently…
How a Single Brick Helped Homeland Security Rescue an Abused Child from the Dark Web
A years-long investigation by the US Department of Homeland Security led to the dramatic rescue of a young girl whose abuse images had been circulating on the dark web — with a crucial clue hidden in the background of…
Madison Square Garden Notifies Victims of SSN Data Breach
The Madison Square Garden Family of Companies has disclosed that it recently alerted an undisclosed number of individuals about a cybersecurity incident that occurred in August 2025. The company confirmed that the exposed information includes names and Social Security…
U.S. Blacklists Anthropic as Supply Chain Risk as OpenAI Secures Pentagon AI Deal
The Trump administration has designated AI startup Anthropic as a supply chain risk to national security, ordering federal agencies to immediately stop using its AI model Claude. The classification has historically been applied to foreign companies and marks a…
Threat Actors Hit Iranian Sites and Apps After the US-Israel Strike
A series of cyber attacks happened last week during the U.S- Israel attack on targets throughout Iran. The cyberattacks included hijacking the various news sites to show messages and also hacking BadeSaba, a religious calendar application over 5 million downloads,…