Red Hat has acknowledged a cybersecurity incident involving one of its GitLab instances after a hacker group calling itself Crimson Collective claimed to have stolen a significant amount of company data. The enterprise software provider clarified that the breach…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Phishing Campaign Uses Fake PyPI Domain to Steal Login Credentials
Phishing campaign via fake domains A highly advanced phishing campaign targeted maintainers of packages on the Python Package Index (PyPI), utilizing domain confusion methods to obtain login credentials from unsuspecting developers. The campaign leverages fake emails made to copy authentic…
FBI Warns Against Screen Sharing Amid Rise in “Phantom Hacker” Scam
The Federal Bureau of Investigation (FBI) has issued an urgent alert about a fast-spreading scam in which cybercriminals gain access to victims’ devices through screen-sharing features, allowing them to steal money directly from bank accounts. Known as the “phantom…
Sam Altman Pushes for Legal Privacy Protections for ChatGPT Conversations
Sam Altman, CEO of OpenAI, has reiterated his call for legal privacy protections for ChatGPT conversations, arguing they should be treated with the same confidentiality as discussions with doctors or lawyers. “If you talk to a doctor about your…
Google Warns of Cl0p Extortion Campaign Against Oracle E-Business Users
Google Mandiant and the Google Threat Intelligence Group are tracking a suspected extortion campaign by the Cl0p ransomware group targeting executives with claims of stealing Oracle E-Business Suite data. The hackers have demanded ransoms reaching up to $50 million,…
Microsoft Cuts Unit 8200’s Cloud Access, Exposing Gaps in Israel’s Digital Sovereignty
An unprecedented development has rattled Israel’s national security establishment. Reports suggest that Microsoft has cut off access to certain Azure cloud and AI services used by the Israel Defense Forces’ elite intelligence branch, Unit 8200. The move follows allegations…
Healthcare, Banking and Industry in India Struggle Amid Rising Cyber Attacks
The Indian economy today stands at a crossroads of a profound digital transformation, in which technology has seamlessly woven its way into the fabric of everyday life, in both cities and remote villages. Smartphones and internet connectivity are transforming…
Microsoft Probes Outlook Bug Blocking Encrypted Emails Across Tenants
Microsoft is investigating a newly identified issue that prevents users of the classic Outlook client from opening encrypted emails sent by other organizations. The company confirmed the problem in a recently updated support document, noting that the bug affects…
Confucius Espionage: Gang Hijacks to Attack Windows Systems Via Malware
Confucius gang strikes again The Confucius hacking gang, infamous for its cyber-espionage operations and alleged state-sponsored links, has advanced its attack tactics in recent times, shifting from document stealers such as WooperStealer to advanced Python-based backdoors like AnonDoor malware. The…
World’s Largest 22.2Tbps DDoS Attack and Rogue SIM Network Busted by US Secret Service
Earlier this month, reports highlighted a massive 11.5Tbps DDoS attack — the largest on record at the time. However, that figure was quickly overshadowed this week when a new distributed denial-of-service strike reached an unprecedented 22.2Tbps, transmitting 10.6 billion…
Global Supply Chains at Risk as Indian Third-Party Suppliers Face Rising Cybersecurity Breaches
Global supply chains face growing cybersecurity risks as research highlights vulnerabilities in Indian third-party suppliers. According to a recent report by risk management firm SecurityScorecard, more than half of surveyed suppliers in India experienced breaches last year, raising concerns…
Call-Recording App Neon Suspends Service After Security Breach
Neon, a viral app that pays users to record their phone calls—intending to sell these recordings to AI companies for training data—has been abruptly taken offline after a severe security flaw exposed users’ personal data, call recordings, and transcripts…
OnePlus Users Face Security Risks from OxygenOS Vulnerability
With smartphones continuously expanding, OnePlus has long been recognised as one of the leading brands in the market, delivering premium performance at an affordable price point and building a loyal user base within the competitive Android market for years. …
Co-op Faces Heavy Financial Losses Following April Cyberattack
The Co-operative Group in the United Kingdom has revealed the extent of the damage caused by the cyberattack it suffered earlier this year. In its interim financial report for the first half of 2025, the company announced an £80…
Decentralized AI Emerges as Counterweight to Big Tech Dominance
Artificial intelligence has undeniably transformed productivity and daily life, but its development has also concentrated power in the hands of a few corporations. Giants such as Google (Gemini), OpenAI (ChatGPT), X (Grok), and Anthropic (Claude) dominate the ecosystem, holding…
Gemini in Chrome: Google Can Now Track Your Phone
Is the Gemini browser collecting user data? A new warning for 2 billion Chrome users, Google has announced that its browser will start collecting “sensitive data” on smartphones. “Starting today, we’re rolling out Gemini in Chrome,” Google said, which will…
Karnataka Tops Cybercrime Cases in India with Bengaluru Emerging as the Epicenter
Karnataka has earned the unfortunate distinction of being the cybercrime capital of India, accounting for more than a quarter of all reported cases in the country. According to the latest data released by the National Crime Records Bureau (NCRB),…
The Digital Economy’s Hidden Crisis: How Cyberattacks, AI Risks, and Tech Monopolies Threaten Global Stability
People’s dependence on digital systems is deeper than ever, leaving individuals and businesses more exposed to cyber risks and data breaches. From the infamous 2017 Equifax incident to the recent cyberattack on Marks & Spencer, online operations remain highly…
The Spectrum of Google Product Alternatives
It is becoming increasingly evident that as digital technologies are woven deeper into our everyday lives, questions about how personal data is collected, used, and protected are increasingly at the forefront of public discussion. There is no greater symbol…
Project Zero Exposes Apple ASLR Bypass via NSDictionary Serialization Flaw
Google Project Zero has uncovered a sophisticated technique for bypassing Address Space Layout Randomization (ASLR) protections on Apple devices, targeting a fundamental issue in Apple’s serialization framework. Security researcher Jann Horn described how deterministic behaviors in NSKeyedArchiver and NSKeyedUnarchiver…