< p style=”text-align: justify;”>Are cybercriminals trafficking your private data on the Dark Web? This article provides a comprehensive overview of how data transfers on the Dark Web can impact your privacy and security. The Dark Web is often portrayed…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Why Clearing Cache and Cookies Matters for Safe Browsing
It seems to be a minor step, clearing your cache and cookies, but it is really a big factor in improving online safety and making your browsing easier. While these tools are intended to make navigation on the web…
Global Apps Exploited to Harvest Sensitive Location Data
Rogue actors within the advertising industry are reportedly exploiting major global apps to collect sensitive user location data on a massive scale. This data is then funneled to a location data firm whose subsidiary has previously sold global tracking…
Three Russian Nationals Charged with Money Laundering via Crypto-Mixing Services
The U.S. Department of Justice (DOJ) has charged three Russian nationals with money laundering for operating two sanctioned cryptocurrency mixing services, Blender.io and Sinbad.io. A federal grand jury in Georgia indicted Roman Vitalyevich Ostapenko, Alexander Evgenievich Oleynik, and Anton…
Play Ransomware Threat Intensifies with State-Sponsored Links and Advanced Tactics
Play ransomware continues to be a formidable cybersecurity threat, with over 300 successful attacks reported globally since its first detection in 2022. Named for the “.PLAY” extension it appends to encrypted files, this ransomware has been linked to Andariel,…
Malicious GitHub PoC Exploit Spreads Infostealer Malware
A malicious GitHub repository disguises a proof-of-concept (PoC) exploit for CVE-2024-49113, also known as “LDAPNightmare,” delivering infostealer malware that sends sensitive data to an external FTP server. Disguised as a legitimate PoC, the exploit tricks users into executing malware.…
Meta’s AI Bots on WhatsApp Spark Privacy and Usability Concerns
WhatsApp, the world’s most widely used messaging app, is celebrated for its simplicity, privacy, and user-friendly design. However, upcoming changes could drastically reshape the app. Meta, WhatsApp’s parent company, is testing a new feature: AI bots. While some view this…
HexaLocker V2: A More Sophisticated Threat in the Ransomware Landscape
On August 9th, the HexaLocker ransomware group announced the release of HexaLocker V2, a significantly advanced version of its Windows-based ransomware. Developed using the Go programming language, this new version is reportedly supported by contributors from notorious hacking…
Rajasthan Police Arrest 30 in ₹30 Crore Cyber Fraud Under ‘Operation Cyber Shield’
In a significant crackdown on cybercrime, Rajasthan Police arrested 30 individuals involved in cyber fraud on Saturday, January 11, 2025. The arrests were the result of coordinated raids conducted across 40 locations in five police station areas in Jaipur.…
Researchers Hijack Hacker Backdoors Through Abandoned Infrastructure
Shadow IT has long been a pressing concern for Chief Information Security Officers (CISOs). Forgotten systems, infrastructure, or hardware connected to enterprise networks often resurface as entry points for data breaches or compromises years later. However, new findings from…
New Crypto Threat: Transaction Simulation Spoofing Leads to $460,000 Ethereum Theft
Cybercriminals are employing a sophisticated technique called “transaction simulation spoofing” to steal cryptocurrency, with a recent attack resulting in the theft of 143.45 Ethereum (ETH), valued at nearly $460,000. This exploit, identified by blockchain security platform ScamSniffer, targets vulnerabilities…
New Version of Banshee Malware Targets macOS Users
According to the latest study published this week, a new variant of the info-stealing malware known as “Banshee” has been targeting macOS users’ passwords, cryptocurrency wallets, browser credentials, and other data for at least the past four months. Check…
U.S. soldier linked to BSNL data breach: Arrest reveals cybercrime
The arrest of Cameron John Wagenius, a U.S. Army communications specialist, has unveiled potential connections to a significant data breach targeting India’s state-owned telecom provider, BSNL. The breach highlights the global reach of cybercrime networks and raises concerns about…
Ensuring Governance and Control Over Shadow AI
AI has become almost ubiquitous in software development, as a GitHub survey shows, 92 per cent of developers in the United States use artificial intelligence as part of their everyday coding. This has led many individuals to participate in…
Navigating 2025: Emerging Security Trends and AI Challenges for CISOs
Security teams have always needed to adapt to change, but 2025 is poised to bring unique challenges, driven by advancements in artificial intelligence (AI), sophisticated cyber threats, and evolving regulatory mandates. Chief Information Security Officers (CISOs) face a rapidly…
How Hackers Sell Access to Corporate Systems Using Stolen Credentials
In the cybercrime world, Initial Access Brokers (IABs) are essential for facilitating attacks. These specific hackers break into company systems, steal login credentials, and then sell access to other criminals who use it to launch their own attacks. They…
Millions of People’s ‘Intimate’ Location Data Compromised in Apparent Hack
Major apps worldwide are potentially being exploited by rogue members within the advertising sector to collect sensitive location data extensively, which subsequently is transferred to a location data firm whose subsidiary has previously sold global location data to US…
GDPR Violation by EU: A Case of Self-Accountability
There was a groundbreaking decision by the European Union General Court on Wednesday that the EU Commission will be held liable for damages incurred by a German citizen for not adhering to its own data protection legislation. As a…
Medusind Data Breach Exposes Health and Personal Information of 360,000+ Individuals
Medusind, a major provider of billing and revenue management services for healthcare organizations, recently disclosed a data breach that compromised sensitive information of over 360,000 individuals. The breach, which occurred in December 2023, was detected more than a year…
This Phishing Trend is Exploiting YouTube URLs Through O365 Expiry Themes
A recent surge in phishing campaigns has revealed attackers leveraging cleverly obfuscated URLs and Microsoft 365 password expiry warnings to trick users into surrendering their credentials. Here’s a breakdown of the latest findings: The phishing emails consistently use subject…