Tag: CySecurity News – Latest Information Security and Hacking Incidents

Why Cybersecurity is Critical for Protecting Spatial Data

In a world where almost every service depends on digital connections, one type of information underpins much of our daily lives: spatial data. This data links activities to a place and time, revealing not just “where” something happens, but also…

Fake eSIM Activation Fraud in India Raises Cybersecurity Concerns

  The Indian Cybercrime Coordination Centre (I4C), operating under the Ministry of Home Affairs, has issued a warning about a new and highly sophisticated digital scam that leverages fake eSIM activation to commit financial fraud. Unlike traditional methods of cybercrime…

Beyond Firewalls: How U.S. Schools Are Building a Culture of Cyber Safety

  U.S. district schools are facing a surge in sophisticated cyberattacks, but districts are pushing back by combining strong fundamentals, people-centered training, state partnerships, and community resilience planning to build cyber safety into everyday culture .  Rising threat landscape  An…

Hackers Exploit Zero-Day Bug to Install Backdoors and Steal Data

Sitecore bug abused Threat actors exploited a zero-day bug in legacy Sitecore deployments to install WeepSteel spying malware.  The bug, tracked as CVE-2025-53690, is a ViewState deserialization flaw caused by the addition of a sample ASP.NET machine key in pre-2017…

Massive database of 250 million data leaked online for public access

Around a quarter of a billion identity records were left publicly accessible, exposing people located in seven countries- Saudi Arabia, the United Arab Emirates, Canada, Mexico, South Africa, Egypt, and Turkey.  According to experts from Cybernews, three misconfigured servers, registered…

Russia’s Widespread GPS Jamming Raises Concerns for Air and Sea Safety

  A recent incident involving the European Commission President’s aircraft has drawn attention to a growing risk in international travel: deliberate interference with satellite navigation systems. The plane, flying into Plovdiv, Bulgaria, temporarily lost its GPS signal due to electronic…

Understanding Passkeys and Their Everyday Use

  There has been a longstanding reliance on traditional passwords for digital security; however, these days, more advanced methods of authentication are challenging traditional passwords. As there are billions of compromised login credentials circulating on the dark web, Digital Shadows…

Cybercriminals Weaponize AI for Large-Scale Extortion and Ransomware Attacks

  AI company Anthropic has uncovered alarming evidence that cybercriminals are weaponizing artificial intelligence tools for sophisticated criminal operations. The company’s recent investigation revealed three particularly concerning applications of its Claude AI: large-scale extortion campaigns, fraudulent recruitment schemes linked to…

AdaptixC2 Raises Security Alarms Amid Active Use in Cyber Incidents

  During this time, when digital resilience has become more important than digital innovation, there is an increasing gap between strengthened defences and the relentless adaptability of cybercriminals, which is becoming increasingly evident as we move into the next decade.…

Android’s App Freedom Shrinks As Google Tightens Rules

  For years, the Android vs. iOS debate has centered around one key argument: freedom of choice. Nothing highlighted this more than sideloading apps. “But iOS is a walled garden. Apple controls what you can and can’t install on your…

2 Doctors in Hong Kong Arrested for Leaking Patient Data

Two doctors at a Hong Kong public hospital were arrested on charges of accessing computers with dishonest or criminal intent, allegedly involved in a data leak. According to police superintendent Wong Yick-lung, a 57-year-old consultant and a 35-year-old associate consultant…

2 doctors in Hong Kong arrested for leaking patient data

Two doctors at a Hong Kong public hospital were arrested on charges of accessing computers with dishonest or criminal intent, allegedly involved in a data leak. According to police superintendent Wong Yick-lung, a 57-year-old consultant and a 35-year-old associate consultant…

Q Day: The Quantum Threat Businesses Must Prepare For

  Q Day represents the theoretical moment when quantum computers become powerful enough to break current cryptographic methods and render existing encryption obsolete. While experts estimate this could occur within 10-15 years, the exact timing remains uncertain since quantum computers…

Rethinking Security in the Era of Hybrid Work

  Having witnessed hybrid work become a long-term reality instead of a temporary response to disruption, organisations are facing a tough question: how to safeguard a workforce that can now operate fluidly across offices, homes, devices, and networks without compromising…

Meta Overhauls AI Chatbot Safeguards for Teenagers

  Meta has announced new artificial intelligence safeguards to protect teenagers following a damaging Reuters investigation that exposed internal company policies allowing inappropriate chatbot interactions with minors. The social media giant is now training its AI systems to avoid flirtatious…

Clanker: The Viral AI Slur Fueling Backlash Against Robots and Chatbots

  In popular culture, robots have long carried nicknames. Battlestar Galactica called them “toasters,” while Blade Runner used the term “skinjobs.” Now, amid rising tensions over artificial intelligence, a new label has emerged online: “clanker.”  The word, once confined to…

UK Schools Trust Hit by Knock-On Effects of Intradev Cyber Breach

  A cyberattack on Hull-based software developer Intradev is rippling across the UK education sector, with staff at the Affinity Learning Partnership warned their personal details may have been compromised.  The trust, which runs seven schools and employs more than…

WhatsApp 0-Day Exploited in Targeted Attacks on Mac and iOS Platforms

  Providing a fresh reminder of the constant threat to widespread communication platforms, WhatsApp has disclosed and patched a vulnerability affecting its iOS and macOS applications. The vulnerability has already been exploited in real-world attacks, according to WhatsApp, which warns…

How to Spot and Avoid Credit Card Skimmers

  Credit and debit cards are now central to daily payments, but they remain vulnerable to fraud. Criminals have developed discreet tools, known as skimmers and shimmers, to steal card information at ATMs, fuel pumps, and retail checkout points. These…

Credit Bureau TransUnion Confirms Breach Impacting Millions

  In the apparent wake of growing threats to consumers’ personal information, credit reporting giant TransUnion has recently announced a cybersecurity incident that exposed personal information from more than 4.4 million Americans. Several regulators and state attorneys general have confirmed…

Russia’s New MAX Messaging App Sparks Spying Fears

  From first September, Russia’s new state-backed messaging app MAX will come pre-installed on every smartphone and tablet sold in the country, igniting strong concerns over data privacy and state monitoring. Built by VK, the company behind Mail.ru and VKnote,…

Data Sovereignty in the Age of Geopolitical Uncertainty

  From the ongoing war in Ukraine, to instability in the Middle East, and rising tensions in the South China Sea, global conflicts are proving that digital systems are deeply exposed to geopolitical risks. Speaking at London Tech Week, UK…

Antrhopic to use your chats with Claude to train its AI

Anthropic announced last week that it will update its terms of service and privacy policy to allow the use of chats for training its AI model “Claude.” Users of all subscription levels- Claude Free, Max, Pro, and Code subscribers- will be impacted…

How cybersecurity debts can damage your organization and finances

A new term has emerged in the tech industry: “cybersecurity debt.” Similar to technical debt, cybersecurity debt refers to the accumulation of unaddressed security bugs and outdated systems resulting from inadequate investments in cybersecurity services.  Delaying these expenditures can provide…

Beyond Google: The Rise of Privacy-Focused Search Engines

  For years, the search engine market has been viewed as a two-player arena dominated by Google, with Microsoft’s Bing as the backup. But a quieter movement is reshaping how people explore the web: privacy-first search engines that promise not…

Misuse of AI Agents Sparks Alarm Over Vibe Hacking

  Once considered a means of safeguarding digital battlefields, artificial intelligence has now become a double-edged sword —a tool that can not only arm defenders but also the adversaries it was supposed to deter, giving them both a tactical advantage…

Maryland’s Paratransit Service Hit by Ransomware Attack

  The Maryland Transit Administration (MTA), operator of one of the largest multi-modal transit systems in the United States, is currently investigating a ransomware attack that has disrupted its Mobility paratransit service for disabled travelers.  While the agency’s core transit…

DDoS Attacks Emerge as Geopolitical Weapons in 2025

  The first half of 2025 witnessed more than 8 million distributed denial-of-service (DDoS) attacks worldwide, according to new figures from Netscout. The EMEA region absorbed over 3.2 million incidents, with peak strikes hitting 3.12 Tbps in speed and 1.5…

Experts Advise Homeowners on Effective Wi-Fi Protection

  Today, in a world where people are increasingly connected, the home wireless network has become an integral part of daily life. It powers everything from remote working to digital banking to entertainment to smart appliances, personal communication, and smart…

Salesloft Integration Breach Exposes Salesforce Customer Data

  A recent cyber incident has brought to light how one weak link in software integrations can expose sensitive business information. Salesloft, a sales automation platform, confirmed that attackers exploited its Drift chat integration with Salesforce to steal tokens that…

CISOs fear material losses amid rising cyberattacks

Chief information security officers (CISOs) are worried about the dangers of a cyberattack, and there is an anxiety due to the material losses of data that organizations have suffered in the past year. According to a report by Proofpoint, the…

Malicous npm package exploit crypto wallets

Experts have found a malicious npm package that consists of stealthy features to deploy malicious code into pc apps targeting crypto wallets such as Exodus and Atomic.  About the package Termed as “nodejs-smtp,” the package imitates the genuine email library…

Cybersecurity Breach Leads to Major Disruption at Jaguar Land Rover

  In a major cybersecurity incident which has caused major disruption to the operations of Jaguar Land Rover, it highlights the growing vulnerability of automakers across the world to cyberattacks, underlining the increasing need to maintain communication channels between automakers…

Google to Confirm Identity of Every Android App Developer

  Google announced a new step to make Android apps safer: starting next year, developers who distribute apps to certified Android phones and tablets, even outside Google Play, will need to verify their legal identity. The change ties every app…

Zscaler Confirms Exposure in Salesloft-Linked Data Breach

  Zscaler has confirmed that it is among the latest organizations to be impacted by a major supply chain attack exploiting the Salesloft Drift application, which integrates with Salesforce.  According to the company, attackers managed to steal OAuth tokens tied…

Beware of SIM swapping attacks, your phone is at risk

In today’s digital world, most of our digital life is connected to our phone numbers, so keeping them safe becomes a necessity. Sad news: hackers don’t need your phone to access your number.  What is SIM swapping? Also known as…

Business and IT Leaders Diverge on Cloud and Security Priorities

  Enterprises are preparing to expand their cloud investments, even as many remain dissatisfied with the financial returns of recent technology deployments, according to a new report from Unisys. The study, which surveyed 1,000 C-suite and IT executives across eight…

Researchers Expose AI Prompt Injection Attack Hidden in Images

  Researchers have unveiled a new type of cyberattack that can steal sensitive user data by embedding hidden prompts inside images processed by AI platforms. These malicious instructions remain invisible to the human eye but become detectable once the images…

Age Checks Online: Privacy at Risk?

  Across the internet, the question of proving age is no longer optional, it’s becoming a requirement. Governments are tightening rules to keep children away from harmful content, and platforms are under pressure to comply.  From social media apps and…

How Image Resizing Could Expose AI Systems to Attacks

Security experts have identified a new kind of cyber attack that hides instructions inside ordinary pictures. These commands do not appear in the full image but become visible only when the photo is automatically resized by artificial intelligence (AI) systems.…

ReVault Flaws Expose Dell ControlVault3 Hardware to Persistent Attacks

  RevaUlt, a company marketing itself on advanced endpoint protection and next-generation SOC capabilities, recently suffered a severe security breach. The attackers penetrated its internal environment, exploiting vulnerabilities in the architecture used for their supposed secure SOC platform.  The compromise…

New Shamos Malware Targets Mac Users Through Fake Tech Support Sites

  Cybersecurity researchers have unearthed a new Mac-targeting malware called Shamos that deceives users through fake troubleshooting guides and repair solutions. This information-stealing malware, developed by the cybercriminal organization “COOKIE SPIDER,” represents a variant of the previously known Atomic macOS…

Nissan Confirms Data Leak After Ransomware Attack on Design Unit

Nissan’s Tokyo-based design subsidiary, Creative Box Inc. (CBI), has launched an investigation into a cyberattack after a ransomware group claimed to have stolen a large cache of internal files. The company confirmed that some design data has been compromised but…

Fake Netflix Job Offers Target Facebook Credentials in Real-Time Scam

  A sophisticated phishing campaign is targeting job seekers with fake Netflix job offers designed to steal Facebook login credentials. The scam specifically focuses on marketing and social media professionals who may have access to corporate Facebook business accounts.  Modus…

Aussie Telecom Breach Raises Alarm Over Customer Data Safety

  A recent cyberattack on TPG Telecom has reignited concerns about how safe personal information really is in the hands of major companies. What the provider initially downplayed as a “limited” incident has in fact left hundreds of thousands of…