The United States Treasury has announced sweeping sanctions against criminal groups accused of running large-scale online scams that cost Americans more than $10 billion last year. The targeted networks, mainly operating out of Myanmar and Cambodia, are accused not…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Cybercriminals Hide Malware in Trusted Tools and File Formats, HP Wolf Security Warns
Attackers are increasingly disguising malicious activity inside everyday business tools and file formats that employees and IT teams typically trust. According to the latest HP Wolf Security Threat Insights Report (Q2 2025), threat actors are refining their strategies to…
Clorox Blames $380M Breach on Service Desk Social Engineering, Sues Cognizant
In August 2023, the Scattered Spider group orchestrated a devastating social engineering attack against Clorox that resulted in approximately $380 million in damages, demonstrating how a simple phone call can lead to catastrophic business disruption . Modus operandi The…
Blackpool Credit Union Cyberattack Exposes Customer Data in Cork
A Cork-based credit union has issued a warning to its customers after a recent cyberattack exposed sensitive personal information. Blackpool Credit Union confirmed that the breach occurred late last month and subsequently notified members through a formal letter. Investigators…
Sensitive Intelligence Exposed in DHS Data Hub Security Lapse
There has been a serious concern about the integrity of federal data security in the wake of a critical vulnerability in a central data hub of the Department of Homeland Security (DHS). This vulnerability is thought to have exposed…
Salesloft Hack Shows How Developer Breaches Can Spread
Salesloft, a popular sales engagement platform, has revealed that a breach of its GitHub environment earlier this year played a key role in a recent wave of data theft attacks targeting Salesforce customers. The company explained that attackers gained…
The Cookie Problem. Should you Accept or Reject?
It is impossible for a user today to surf the internet without cookies, to reject or accept. A pop-up shows in our browser that asks to either “accept all” or “reject all.” In a few cases, a third option allows…
Muzaffarpur Man Loses ₹3.5 Lakh in Remote Access App Bank Fraud
A resident of Muzaffarpur, Bihar fell victim to a sophisticated remote access application scam that resulted in the loss of ₹3.5 lakh from his bank account. The cybercrime incident occurred when the victim was searching online for courier service…
MostereRAT Malware Leverages Evasion Tactics to Foil Defenders
Despite the fact that cybercrime has become increasingly sophisticated over the years, security researchers have uncovered a stealthy phishing campaign in which a powerful malware strain called MostereRAT was deployed. This remote access trojan allows attackers to take full…
GitHub Supply Chain Attack ‘GhostAction’ Exposes Over 3,000 Secrets Across Ecosystems
A newly uncovered supply chain attack on GitHub, named GhostAction, has compromised more than 3,300 secrets across multiple ecosystems, including PyPI, npm, DockerHub, GitHub, Cloudflare, and AWS. The campaign was first identified by GitGuardian researchers, who traced initial signs…
Nx “s1ngularity” Supply Chain Attack Exposes Thousands of Secrets
The recent Nx “s1ngularity” NPM supply chain attack has led to a massive security fallout, exposing thousands of account tokens and repository secrets, according to Wiz researchers. A post-incident analysis revealed that the breach compromised 2,180 accounts and 7,200…
Great Firewall of China Compromised in Historic 600GB Data Exposure
It has been reported that on September 11, 2025, nearly 600 gigabytes of classified materials linked to the Great Firewall of China have emerged online in a breach of China’s closely guarded internet censorship machinery, which is a breach…
Smart Meters: A Growing Target in Data Security
Smart electricity meters, once simple devices for recording household consumption, are now central to modern energy systems. They track usage patterns, support grid balancing, and enable predictive maintenance. But as their role has expanded, so has the volume of…
SVG Phishing Campaign Bypasses Antivirus, Targets Colombian Judiciary
VirusTotal has uncovered a sophisticated phishing campaign that leverages SVG (Scalable Vector Graphics) files to bypass traditional antivirus detection while impersonating Colombia’s judicial system. The campaign was discovered after VirusTotal added SVG support to its AI Code Insight platform,…
Czechia Warns of Chinese Data Transfers and Espionage Risks to Critical Infrastructure
Czechia’s National Cyber and Information Security Agency (NÚKIB) has issued a stark warning about rising cyber espionage campaigns linked to China and Russia, urging both government institutions and private companies to strengthen their security measures. The agency classified the…
Panama and Vietnam Governments Suffer Cyber Attacks, Data Leaked
Hackers stole government data from organizations in Panama and Vietnam in multiple cyber attacks that surfaced recently. About the incident According to Vietnam’s state news outlet, the Cyber Emergency Response Team (VNCERT) confirmed reports of a breach targeting the National…
Ransomware Groups Still Exploiting SonicWall Firewall Vulnerability Despite Patch
More than a year after SonicWall released a patch for CVE-2024-40766, a critical vulnerability affecting its next-generation firewalls, attackers linked to the Akira ransomware-as-a-service operation continue to exploit the flaw to breach organizations. Similar to incidents in September 2024…
Why Cybersecurity is Critical for Protecting Spatial Data
In a world where almost every service depends on digital connections, one type of information underpins much of our daily lives: spatial data. This data links activities to a place and time, revealing not just “where” something happens, but also…
Fake eSIM Activation Fraud in India Raises Cybersecurity Concerns
The Indian Cybercrime Coordination Centre (I4C), operating under the Ministry of Home Affairs, has issued a warning about a new and highly sophisticated digital scam that leverages fake eSIM activation to commit financial fraud. Unlike traditional methods of cybercrime…
VoidProxy Phishing Platform Emerges as Threat Capable of Bypassing MFA
Researchers in the field of cybersecurity are warning that a sophisticated phishing-as-a-service (PhaaS) platform known as VoidProxy is being used by criminal groups for the purpose of evading widespread security controls and is demonstrating just how far this technology…