Three newly uncovered vulnerabilities in the runC container runtime have raised significant concerns for organizations relying on Docker, Kubernetes, and other container-based systems. The flaws, identified as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were disclosed by SUSE engineer and Open Container…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Screen Sharing on WhatsApp Turns Costly with Major Financial Loss
Several disturbing patterns of digital deception have quietly developed in recent months, revealing just how readily everyday communications tools can be turned into instruments of financial ruin in an instant. According to security researchers, there has been an increase…
LG Energy Solution Hit by Akira Ransomware, Data Breach Confirmed
LG Energy Solution, a leading South Korean battery manufacturer with global operations, confirmed a significant ransomware incident affecting one of its overseas facilities in mid-November 2025. The company announced that only a “specific overseas facility” was targeted, emphasizing that…
U.S. Agencies Consider Restrictions on TP-Link Routers Over Security Risks
A coordinated review by several federal agencies in the United States has intensified scrutiny of TP-Link home routers, with officials considering whether the devices should continue to be available in the country. Recent reporting indicates that more than six…
Pro-Hamas Hackers Leak Alleged Redback IFV Plans and Israeli Defense Employee Data After Major Cyber Breach
A hacker collective aligned with Hamas has allegedly released sensitive information tied to Australia’s Redback next-generation infantry fighting vehicle program, along with hundreds of photographs of staff from Israeli defense companies. The group, known as Cyber Toufan and widely believed…
Why Oslo’s Bus Security Tests Highlight the Hidden Risks of Connected Vehicles
Modern transportation looks very different from what it used to be, and the question of who controls a vehicle on the road no longer has a simple answer. Decades ago, the person behind the wheel was unquestionably the one…
Continuous Incident Response Is Redefining Cybersecurity Strategy
With organizations now faced with relentless digital exposure, continuous security monitoring has become an operational necessity instead of a best practice, as organizations navigate an era where digital exposure is ubiquitous. In 2024, cyber-attacks will increase by nearly 30%,…
USB Drives Are Handy, But Never For Your Only Backup
Storing important files on a USB drive offers convenience due to their ease of use and affordability, but there are significant considerations regarding both data preservation and security that users must address. USB drives, while widely used for backup,…
How Modern Application Delivery Models Are Evolving: Local Apps, VDI, SaaS, and DaaS Explained
Since the early 1990s, the methods used to deliver applications and data have been in constant transition. Today, IT teams must navigate a wider range of options—and a greater level of complexity—than ever before. Because applications are deployed in…
How Oversharing, Weak Passwords, and Digital IDs Make You an Easy Target and What You Can Do
The more we share online, the easier it becomes for attackers to piece together our personal lives. Photos, location tags, daily routines, workplace details, and even casual posts can be combined to create a fairly accurate picture of who we…
Android Malware Hits 42 Million Downloads, Risking Mobile Payments
Android malware is surging globally, with attackers increasingly targeting mobile payments and IoT devices, exposing critical vulnerabilities in systems heavily relied upon for communication, work, and financial activity. Recent findings from Zscaler indicate that 239 malicious Android apps were…
$116 Million at Risk as Balancer Suffers Major Smart Contract Breach
Security experts are becoming increasingly concerned about a developing anomaly in the JavaScript ecosystem after researchers discovered a massive cluster of self-replicating npm packages that seem to have no technical function but instead indicate a well-thought-out and financially motivated…
Knownsec Data Leak Exposes Deep Cyber Links and Global Targeting Operations
A recent leak involving Chinese cybersecurity company Knownsec has uncovered more than 12,000 internal documents, offering an unusually detailed picture of how deeply a private firm can be intertwined with state-linked cyber activities. The incident has raised widespread concern…
Landfall Spyware Exploited a Samsung Image Flaw to Secretly Target Users For Nearly a Year
Security specialists at Palo Alto Networks’ Unit 42 have uncovered a complex spyware tool named Landfall that silently infiltrated certain Samsung Galaxy phones for close to a year. The operation relied on a serious flaw in Samsung’s Android image-processing system,…
Google Password Warning Explained: Why Gmail Users Should Switch to Passkeys Now
Despite viral claims that Google is instructing every Gmail user to urgently change their password because of a direct breach, the reality is more nuanced. Google is indeed advising users to reset their credentials, but not due to a…
Tech Park Operation in Bengaluru Uncovered in Cross-Border Malware Sca
The Bengaluru police have made a major breakthrough in their fight against a far-reaching cybercrime syndicate that was operating inside one of the city’s bustling technology parks by uncovering and dismantling an alleged tech-support fraud operation that was operating…
Investment Scams Surge Across the US as Fraudsters Exploit Social Media, Texts, and Crypto Boom
If you’ve ever received a random “Hi, how are you?” message from a stranger on text or social media, it may not be an accident. While sometimes harmless, these unexpected greetings are increasingly being used by cybercriminals attempting to…
Tesla’s Humanoid Bet: Musk Pins Future on Optimus Robot
Elon Musk envisions human-shaped robots, particularly the Optimus humanoid, as a pivotal element in Tesla’s future AI and robotics landscape, aiming to revolutionize both industry and daily life. Musk perceives these robots not merely as automated tools but as…
How MCP is preparing AI systems for a new era of travel automation
Most digital assistants today can help users find information, yet they still cannot independently complete tasks such as organizing a trip or finalizing a booking. This gap exists because the majority of these systems are built on generative AI…
Russian Sandworm Hackers Deploy New Data-Wipers Against Ukraine’s Government and Grain Sector
Russian state-backed hacking group Sandworm has intensified its destructive cyber operations in Ukraine, deploying several families of data-wiping malware against organizations in the government, education, logistics, energy, and grain industries. According to a new report by cybersecurity firm ESET,…