It has been said by experts that Jaguar Land Rover (JLR) has found itself at the epicentre of the biggest cyber crisis in UK history, an event that has been described as a watershed moment for British industrial resilience.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
FinWise Data Breach Exposes Insider Threats, Highlights Need for Strong Encryption and Key Management
The 2024 FinWise data breach underscores the rising risk of insider threats within financial institutions. Unlike cyberattacks initiated by external hackers, this breach resulted from unauthorized access by a former employee who retained system credentials after leaving the company.…
Cybercrime Gang Busted for Massive Fake Welfare Portal Scam in India
A massive inter-state cybercrime syndicate targeting government welfare schemes in India was busted by police under an operation code-named “Shutterdown,” revealing one of the largest frauds of recent years involving over 36 arrests and millions siphoned off from government…
Google’s Quantum Breakthrough Rekindles Concerns About Bitcoin’s Long-Term Security
Google has announced a verified milestone in quantum computing that has once again drawn attention to the potential threat quantum technology could pose to Bitcoin and other digital systems in the future. The company’s latest quantum processor, Willow, has…
Prosper Marketplace Cybersecurity Breach Exposes Data of 17 Million Users, Sparks Renewed Fintech Security Concerns
Prosper Marketplace has confirmed a major cybersecurity breach that compromised the personal data of over 17 million users, underscoring the persistent challenges faced by financial institutions in protecting sensitive consumer information. According to the peer-to-peer lending firm, an unauthorized…
Madras High Court says cryptocurrencies are property, not currency — what the ruling means for investors
Chennai, India — In a paradigm-shifting judgment that reshapes how India’s legal system views digital assets, the Madras High Court has ruled that cryptocurrencies qualify as property under Indian law. The verdict, delivered by Justice N. Anand Venkatesh, establishes…
AI Poisoning: How Malicious Data Corrupts Large Language Models Like ChatGPT and Claude
Poisoning is a term often associated with the human body or the environment, but it is now a growing problem in the world of artificial intelligence. Large language models such as ChatGPT and Claude are particularly vulnerable to this…
Volkswagen Faces Cybersecurity Concerns Amid Ransomware Claims
According to a report by the German media, Volkswagen has experienced an unexpected halt to its global operations following the alleged occurrence of a major cybersecurity incident that has rippled through one of the world’s largest automotive networks. According…
Critical Oracle Suite Flaw Actively Exploited; CISA Orders Urgent Patch
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that attackers are actively exploiting a critical server-side request forgery (SSRF) vulnerability, CVE-2025-61884, in Oracle E-Business Suite’s Configurator runtime component. Federal agencies have been directed to patch this flaw…
Arctic Wolf Report Reveals IT Leaders’ Overconfidence Despite Rising Phishing and AI Data Risks
A new report from Arctic Wolf highlights troubling contradictions in how IT leaders perceive and respond to cybersecurity threats. Despite growing exposure to phishing and malware attacks, many remain overly confident in their organization’s ability to withstand them —…
US Judge Permanently Bans NSO Group from Targeting WhatsApp Users
A U.S. federal judge has issued a permanent injunction barring Israeli spyware maker NSO Group from targeting WhatsApp users with its notorious Pegasus spyware, marking a landmark victory for Meta following years of litigation. The decision, handed down by…
Users Warned to Check This Setting as Meta Faces Privacy Concerns
A new AI experiment launched by Meta Platforms Inc. continues to blur the lines between innovation and privacy in the rapidly evolving digital landscape of connectivity. There has been a report that the tech giant, well known for changing…
Prosper Data Breach Exposes 17.6 Million Users’ Personal Information — Company Offers Free Credit Monitoring
Prosper, the popular peer-to-peer lending platform that connects borrowers with investors, suffered a major data breach on September 2nd. According to details shared on the company’s official FAQ page, the incident was caused by “unauthorized queries made on company…
The Fragile Internet: How Small Failures Trigger Global Outages
The modern internet, though vast and advanced, remains surprisingly delicate. A minor technical fault or human error can disrupt millions of users worldwide, revealing how dependent our lives have become on digital systems. On October 20, 2025, a technical error…
Smart Devices Redefining Productivity in the Home Workspace
Remote working, once regarded as a rare privilege, has now become a key feature of today’s professional landscape. Boardroom discussions and water-cooler chats have become much more obsolete, as organisations around the world continue to adapt to new work…
GlassWorm Malware Exploits Invisible Unicode to Infect VS Code Extensions
A major and ongoing supply-chain attack is currently targeting developers through the OpenVSX and Microsoft Visual Studio Code (VS Code) extension marketplaces via a self-spreading malware dubbed “GlassWorm” that has triggered an estimated 35,800 installations to date. The campaign…
Microsoft’s Copilot Actions in Windows 11 Sparks Privacy and Security Concerns
When it comes to computer security, every decision ultimately depends on trust. Users constantly weigh whether to download unfamiliar software, share personal details online, or trust that their emails reach the intended recipient securely. Now, with Microsoft’s latest feature in…
Windows 11’s Auto-Enabled BitLocker Locks User Out of Terabytes of Data — Here’s What Happened
Microsoft first introduced BitLocker drive encryption with Windows Vista back in 2007, though it was initially limited to the Enterprise and Ultimate editions. Over the years, it evolved into a core security feature of Windows. With Windows 11, Microsoft…
Amigo Mesh Network Empowers Protesters to Communicate During Blackouts
Researchers from City College of New York, Harvard University, and Johns Hopkins University have developed Amigo, a prototype mesh network specifically designed to maintain communication during political protests and internet blackouts imposed by authoritarian regimes. The system addresses critical…
Using a VPN Is Essential for Online Privacy and Data Protection
Virtual Private Networks, or VPNs, have evolved from tools used to bypass geographic content restrictions into one of the most effective defenses for protecting digital privacy and data security. By encrypting your internet traffic and concealing your real IP…