A newly identified infostealer called Storm has emerged on underground cybercrime forums in early 2026, signalling a change in how attackers steal and use credentials. Priced at under $1,000 per month, the malware collects browser-stored data such as login…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Surge in Digital Fraud Prompts Consumer Reports to Issue Safety Guidance
By incorporating digitally mediated communication into nearly every aspect of modern life, digital media has fundamentally reshaped the way individuals interact, transact, and manage daily responsibilities, adding convenience to nearly every aspect of life. However, this same interconnected infrastructure…
AI Scams Are Becoming Harder to Detect — 7 Warning Signs You Should Watch Closely
Artificial intelligence is not only improving everyday technology but also strengthening both traditional and emerging scam techniques. As a result, avoiding fraud now requires greater awareness of how these schemes are taking new shapes. Being able to identify scams…
Bengaluru Businessman Duped of Rs 15.45 Crore in Fake CBI ‘Digital Arrest’ Scam
A Bengaluru businessman, Ajit Gopalakrishna Saraf from Belagavi, fell victim to a sophisticated cyber fraud orchestrated by imposters posing as Central Bureau of Investigation (CBI) officials, resulting in a staggering loss of Rs 15.45 crore. The scam unfolded through…
Physical AI Talent War Drives Salaries Surge Across Robotics And Autonomous Vehicle Industry
Salaries climb fast as demand surges for experts who blend AI know-how with hands-on hardware skills. Firms in robotics, military tech, and self-operating machines now pay between three hundred thousand and five hundred thousand dollars just to attract top…
Uffizi Cyber Incident Serves as a Warning for Europe’s Cultural Sector
The cyber intrusion at the Uffizi Galleries in early 2026 has quickly evolved from an isolated security lapse into a case study of systemic digital exposure within Europe’s cultural infrastructure. One of the continent’s most prestigious custodians of artistic…
UNC6692 Uses Microsoft Teams Impersonation to Deploy SNOW Malware
A newly tracked threat cluster identified as UNC6692 has been observed carrying out targeted intrusions by abusing Microsoft Teams, relying heavily on social engineering to deliver a sophisticated and multi-stage malware framework. According to findings from Mandiant, the attackers…
OpenAI Tightens macOS Security After Axios Supply Chain Attack and Physical Threat Incident
Security updates rolled out by OpenAI for macOS apps follow discovery of a flaw tied to the common Axios library. Because of risks exposed through a software supply chain breach, checks on app validation tightened noticeably. One outcome: stronger…
Anthropic’s Mythos: AI-Powered Vulnerability Discovery Forces Cybersecurity Reckoning
Anthropic’s Mythos is less a single “hacker AI” than a signal that cybersecurity is entering a new phase. The real reckoning is not that one model can break everything at once, but that software weakness will be found faster,…
Open Source Security Tools impacted by Microsoft Account Suspensions
Several widely trusted security tools have been affected by the disruption beyond routine enforcement, including the distribution pipelines. Microsoft suspended developer accounts associated with VeraCrypt, WireGuard, and Windscribe without any prior technical clarification, effectively preventing them from accessing Microsoft’s…
Why Stolen Passwords Are Now the Biggest Cyber Threat
Organizations today often take confidence in hardened perimeters, well-configured firewalls, and constant monitoring for software vulnerabilities. Yet this defensive focus can overlook a more subtle reality. While attention remains fixed on preventing break-ins, attackers are increasingly entering systems through…
Karnataka Unveils AI-Driven Bill to Enforce Swift Social Media Safety
Karnataka is set to revolutionize social media regulation with the draft Karnataka Responsible Social Media & Digital Safety Bill, 2026, submitted to Chief Minister Siddaramaiah. Prepared by the Karnataka State Policy and Planning Commission (KSPPC), this legislation emphasizes artificial…
Wall Street Banks Test Anthropic Mythos AI as Regulators Warn of Rising Cybersecurity Threats
Now showing up in high-security finance circles: early tests of cutting-edge AI aimed at boosting cyber resilience, driven by rising regulator unease over smart-tech dangers. Leading the charge – an emerging system called Mythos, developed by Anthropic, notable not…
SystemBC Infrastructure Breach Sheds Light on The Gentlemen Ransomware Network
Parallel to this, operators appear to employ public channels to reinforce coercion, selectively disclosing victim information in order to increase pressure and speed up payment, demonstrating a hybrid strategy combining technical sophistication with calculated psychological advantage. Check Point recently…
DARWIS Taka: A Web Vulnerability Scanner with AI-Powered Validation
DARWIS Taka, a new web vulnerability scanner, is now available for free and runs via Docker. It pairs a rules-based scanning engine with an optional AI layer that reviews each finding before it reaches the report, aimed squarely at the…
Google Expands Gemini in Gmail, Forcing Billions to Reconsider Privacy, Control, and AI Dependence
Google has introduced one of the most extensive updates to Gmail in its history, warning that the scale of change driven by artificial intelligence may feel overwhelming for users. While some discussions have focused on surface-level changes such as…
Anthropic AI Cyberattack Capabilities Raise Alarm Over Vulnerability Exploitation Risks
Now emerging: artificial intelligence reshapes cybersecurity faster than expected, yet evidence from Anthropic shows it might fuel digital threats more intensely than ever before. Recently disclosed results indicate their high-level AI does not just detect flaws in code –…
CISO Burnout Is Costing Businesses More Than Money
Businesses are increasingly feeling the financial and operational impact of CISO burnout, as overstretched security leaders make slower decisions, miss critical signals, and eventually leave their roles. The pressure of rising cyber threats, regulatory demands, and limited resources is…
Chrome Advances User Protection with new Infostealer Mitigation Features
Google Chrome has taken a significant step toward hardening browser-level authentication security in response to the growing threat landscape by introducing Device Bound Session Credentials in its latest Windows update. As part of Chrome 146, this mechanism has been…
Critical SGLang Vulnerability Allows Remote Code Execution via Malicious AI Model Files
A newly disclosed high-severity flaw in SGLang could enable attackers to remotely execute code on affected servers through specially crafted AI model files. The issue, tracked as CVE-2026-5760, has received a CVSS score of 9.8 out of 10, placing…