Category: CySecurity News – Latest Information Security and Hacking Incidents

Hackers Exploit WordPress Logins, Secretly Run Codes

Threat actors are exploiting the WordPress mu-plugins (“Must-Use Plugins”) directory to secretly execute malicious code on each page while avoiding detection.  The technique was first observed by security researchers at Sucuri in February 2025, but adoption rates are on the…

Check Point Downplays Hacker’s Claims Amid Alleged Data Breach

  A hacker using the alias “CoreInjection” has claimed responsibility for stealing what they describe as a “highly sensitive” dataset from cybersecurity firm Check Point.  According to several media reports, the alleged stolen data includes user login credentials, employee contracts,…

Turned Into a Ghibli Character? So Did Your Private Info

  A popular trend is taking over social media, where users are sharing cartoon-like pictures of themselves inspired by the art style of Studio Ghibli. These fun, animated portraits are often created using tools powered by artificial intelligence, like ChatGPT-4o.…

Oracle Finally Acknowledges Cloud Hack

  Oracle is reportedly trying to downplay the impact of the attack while quietly acknowledging to clients that some of its cloud services have been compromised.  A hacker dubbed online as ‘rose87168’ recently offered to sell millions of lines of…

Massive Data Breach at Samsung Exposes 270000 Records

  During the analysis of the Samsung Germany data breach, a wide range of sensitive information was found to be compromised, including customer names, addresses, email addresses, order history, and internal communications, among other sensitive data. Those findings were contained…

Threat Actors Compromised by Security Firms Working to Protect Victims

  An outstanding example of counter-cybercrime has been the successful penetration of the digital infrastructure associated with the ransomware group BlackLock. Threat intelligence professionals succeeded in successfully infiltrating this infrastructure. As a result of this operation, researchers were able to…