Zoomcar, a well-known car-sharing platform, recently reported that a cyberattack exposed the personal details of approximately 8.4 million users. The information that was accessed includes users’ names, phone numbers, and vehicle registration details. The company, based in Bengaluru, India,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cyber Suraksha’: Indian Armed forces Launch Cybersecurity Exercise
Under the direction of the Headquarters Integrated Defence Staff, the Indian Defence Cyber Agency has initiated a cyber security exercise called “Cyber Suraksha.” June 16 marked the start of the exercise, which will last through June 27. A multi-phased…
Aim Security Reveals Zero-Click Flaw in AI Powered Microsoft Copilot
It has recently been reported that a breakthrough cyber threat known as EchoLeak has been documented as the first documented zero-click vulnerability that specifically targets Microsoft 365 Copilot in the enterprise. This raises important concerns regarding the evolving risks…
How Generative AI Is Accelerating the Rise of Shadow IT and Cybersecurity Gaps
The emergence of generative AI tools in the workplace has reignited concerns about shadow IT—technology solutions adopted by employees without the knowledge or approval of the IT department. While shadow IT has always posed security challenges, the rapid proliferation…
UEBA: A Smarter Way to Fight AI-Driven Cyberattacks
As artificial intelligence (AI) grows, cyberattacks are becoming more advanced and harder to stop. Traditional security systems that protect company networks are no longer enough, especially when dealing with insider threats, stolen passwords, and attackers who move through systems…
‘SmartAttack’: New Covert Threat Uses Smartwatches to Steal Data from Air-Gapped Systems via Ultrasound
A new cybersecurity threat dubbed “SmartAttack” demonstrates how smartwatches can covertly capture ultrasonic signals to extract sensitive data from air-gapped computers—systems traditionally considered highly secure due to their physical isolation from external networks. Air-gapped environments are widely used in…
Cyberattack in Dubai Compromises Patient Health Records
During the last few months, the UAE Cyber Security Council (CSC) has revealed that the UAE has seen a surge in cyberattacks that have been reported daily to the highest level of more than 200,000. Cyber threats of this…
Ransomware Attacks Continue to Rise in an Alarming Trend
The frequency and intensity of cyberthreats seem to be increasing despite businesses’ ongoing efforts to thwart malicious actors. Honeywell, a global technology and manufacturing firm that also provides cybersecurity solutions, reported a 46% rise in ransomware extortion attacks between…
Telegram’s Alleged Ties to Russian Intelligence Raise Global Surveillance Fears
A new investigation by Russian media outlet Important Stories, in collaboration with the Organized Crime and Corruption Reporting Project (OCCRP), has sparked fresh scrutiny over Telegram’s connections to Russia’s intelligence services. The popular messaging platform, long regarded for its…
DanaBot Malware Network Disrupted After Researchers Discover Key Flaw
In a major breakthrough, cybersecurity experts uncovered a major weakness in the DanaBot malware system that ultimately led to the disruption of its operations and criminal charges against its operators. DanaBot, which has been active since 2018, is known…
M&S Faces £300M Loss After Cyberattack Involving DragonForce and Scattered Spider
Marks & Spencer has resumed its online services after a serious cyberattack earlier this year that disrupted its operations and is expected to slash profits by £300 million. The British retail giant’s digital operations were hit hard, and recent…
Data Security Posture Insights: Overcoming Complexity and Threat Landscape
In today’s competitive landscape, it is becoming more critical for businesses to find ways to adapt their data security, governance, and risk management strategies to the volatile economy by increasing efficiency or lowering costs while maintaining the structure, consistency,…
AI Integration Raises Alarms Over Enterprise Data Safety
Today’s digital landscape has become increasingly interconnected, and cyber threats have risen in sophistication, which has significantly weakened the effectiveness of traditional security protocols. Cybercriminals have evolved their tactics to exploit emerging vulnerabilities, launch highly targeted attacks, and utilise…
GrayAlpha Exposed: Deploys Malware via Infection Vectors
Experts from Insikt Group have found new infrastructure linked with GrayAlpha, a cybercrime gang overlapping with the financially motivated group called FIN7. Fin7 has been in the cybercrime game since 2013 and is known as one of the most infamous…
AI Skills Shortage Deepens as Enterprise Demand Grows Faster Than Talent Supply
The shortage of skilled professionals in artificial intelligence is becoming a major concern for enterprises, as organizations race to adopt the technology without a matching increase in qualified talent. The latest Harvey Nash Digital Leadership report, released by Nash…
United Natural Foods Confirms Network Disruption from Cyberattack
United Natural Foods Inc.’s operations were disrupted by a serious cybersecurity incident. There have been widespread supply chain issues and widespread product shortages at Whole Foods Market locations all over the United States due to the company’s failure to…
Understanding the Dynamic threat Landscape of Ransomware Attacks
The constant expansion of cyber threats, particularly malware and ransomware, necessitates our undivided attention. Our defence strategy must evolve in tandem with the threats. So far this year, ransomware has targeted Frederick Health Medical Group, Co-op Supermarkets, and Marks…
Cisco Introduces New Tools to Protect Networks from Rogue AI Agents
As artificial intelligence (AI) becomes more advanced, it also creates new risks for cybersecurity. AI agents—programs that can make decisions and act on their own—are now being used in harmful ways. Some are launched by cybercriminals or even unhappy…
AT&T Customers at Risk Again After New Data Leak
AT&T customers are once more facing serious security concerns following reports of a fresh leak involving their personal information. This comes after the telecom company experienced multiple data breaches last year. Previous Data Breaches Raised Alarms In 2024, AT&T…
Mirai Botnet Variant is Building Swarm by Exploiting DVR Flaw
A command injection flaw in internet-connected digital video recorders used for CCTV monitoring is the target of a Mirai botnet malware variant, which allows hackers to take over the devices and add them to a botnet. Cybersecurity researchers at…
Stolen Customer Data from Ticketmaster Incident Resurfaces Online
Ticketmaster, one of the most prominent ticketing companies in the world, suffered a high-profile cyber-attack in May 2024 that affected the entire digital infrastructure of the company. The incident resulted in the unauthorised exposure of vast amounts of customer…
DVLA Scams Target Thousands of UK Drivers with Fake Fines, Car Deals, and Fraudulent Fees
A surge in vehicle-related scams across the UK has left thousands of drivers out of pocket, with fraudulent activity disguised as legitimate DVLA communications. In 2023 alone, nearly 20,000 motorists were tricked by fake car tax messages, insurance schemes,…
Cloudfare CAPTCHA Page Tricks Users Into Downloading Malware
An advanced but simple phishing tactic is being distributed, it deploys fake Cloudflare CAPTCHA pages to target users with malware. A recent research by SlashNext says the technique, called ClickFix tricks users into running commands that deploy malware. ClickFix shows…
Sensata Technologies Confirms Data Breach After April Ransomware Attack, Notifies Employees of Exposed Personal Information
Sensata Technologies has begun notifying current and former employees of a data breach following the conclusion of an internal investigation into a ransomware attack that took place in April 2025. A global leader in industrial technology, Sensata specializes in…
FBI Warns of Luna Moth Ransomware Attacks Targeting U.S. Law Firms
The FBI said that over the last two years, an extortion group known as the Silent Ransom Group has targeted U.S. law firms through callback phishing and social engineering tactics. This threat outfit, also known as Luna Moth, Chatty…
Why Exploring the Dark Web Can Lead to Legal Trouble, Malware, and Emotional Harm
Venturing into the dark web may seem intriguing to some, but even well-intentioned users are exposed to significant risks. While many people associate the dark web with illegal activity, they may not realize that just browsing these hidden spaces…
FBI Urges Immediate Action as Play Ransomware Attacks Surge
The Federal Bureau of Investigation (FBI) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have released a critical warning about the sharp rise in Play ransomware attacks. The agencies report that this cyber threat has affected hundreds of…
Weak Links in Healthcare Infrastructure Fuel Cyberattacks
Increasingly, cybercriminals are exploiting systemic vulnerabilities in order to target the healthcare sector as one of the most frequently attacked and vulnerable targets in modern cybersecurity, with attacks growing both in volume and sophistication. These risks go well beyond…
US Seizes $7.7 Million From Crypto Linked to North Korea’s IT Worker Scam
The US Department of Justice has filed a civil forfeiture complaint against North Korean IT workers for illegally gaining employment with US businesses, and earning millions for the Korean government, which amounts to violations of sanctions. The government seized $7.7m…
FBI Issues Alert as BADBOX 2.0 Malware Infects Over 1 Million Devices, Hijacking Home Networks Worldwide
The FBI has issued a critical warning regarding a massive malware campaign—dubbed BADBOX 2.0—which has compromised over 1 million Internet-connected consumer devices, including smart TVs, Android tablets, projectors, and streaming boxes. The malware, often embedded in Chinese-manufactured IoT devices,…
Predator Spyware Activity Resurfaces in Mozambique Using Novel Techniques
The recent discovery of new equipment tied to Predator spyware implies that the surveillance technology is still finding new customers, despite the fact that its backers have faced rounds of US sanctions since July 2023. In a research published…
Massive Data Leak Exposes Billions of Records in Suspected Chinese Surveillance Database
Cybersecurity experts have uncovered a massive trove of sensitive information left exposed online, potentially placing millions of individuals at significant risk. The discovery, made by researchers from Cybernews in collaboration with SecurityDiscovery.com, revealed an unsecured database totaling 631 gigabytes—containing…
Qilin Ransomware Actors Take Advantage of Newly Discovered Fortinet Bugs
The recently observed increase in ransomware activity linked to the Qilin group has sparked alarms throughout the cybersecurity industry. As a result of these sophisticated Ransomware-as-a-Service (RaaS) operations operating under multiple aliases, including Phantom Mantis and Agenda, Fortinet’s recent…
Beware of Pig Butchering Scams That Steal Your Money
Pig butchering, a term we usually hear in the meat market, sadly, has also become a lethal form of cybercrime that can cause complete financial losses for the victims. Pig Butchering is a “form of investment fraud in the crypto…
Here’s How ‘Alert Fatigue’ Can Be Combated Using Neuroscience
Boaz Barzel, Field CTO at OX Security, recently conducted research with colleagues at OX Security and discovered that an average organisation had more than half a million alerts at any given time. More astonishing is that 95% to 98%…
Kettering Health Ransomware Attack Linked to Interlock Group
Kettering Health, a prominent healthcare network based in Ohio, is still grappling with the aftermath of a disruptive ransomware attack that forced the organization to shut down its computer systems. The cyberattack, which occurred in mid-May 2025, affected operations…
Securing the SaaS Browser Experience Through Proactive Measures
Increasingly, organisations are using cloud-based technologies, which has led to the rise of the importance of security concerns surrounding Software as a Service (SaaS) platforms. It is the concept of SaaS security to ensure that applications and sensitive data…
Cybercriminals Exploit Fake Salesforce Tool to Steal Company Data and Demand Payments
A group of hackers has been carrying out attacks against businesses by misusing a tool that looks like it belongs to Salesforce, according to information shared by Google’s threat researchers. These attacks have been going on for several months…
Reddit Sues Anthropic for Training Claude AI with User Content Without Permission
Reddit, a social media site, filed a lawsuit against Anthropic on Wednesday, claiming that the artificial intelligence firm is unlawfully “scraping” millions of Reddit users’ comments in order to train its chatbot Claude. Reddit alleges that Anthropic “intentionally trained…
Lee Enterprises Ransomware Attack Exposes Data of 40,000 Individuals
Lee Enterprises, a major U.S. news publisher, is alerting nearly 40,000 individuals about a data breach following a ransomware attack that took place in early February 2025. The company, which owns and operates 77 daily newspapers and hundreds of…
US Federal Authorities Disrupt Growing Malware Pyramid Network
A new study by Secureworks’ Counter Threat Unit (CTU) has revealed that ransomware operations have shifted significantly in response to heightened law enforcement crackdowns, forcing threat actors to evolve their strategies accordingly. There has been a tradition of many…
URL Scams Everywhere? These Steps Will Help You Stay Safe
Scam links are difficult to spot, but it has become an everyday issue for internet users who accidentally click on malicious URLs that are part of a phishing attack. Most fake links include standard “https” encryption and domains similar to…
Crocodilus Android Malware Can Now Trick Victims Using Fake Contacts
A dangerous Android malware called Crocodilus has developed a new way to fool smartphone users. It can now secretly add fake names to the contact list on an infected phone. This makes it easier for hackers to pretend they…
Zero-Day Flaw in Chrome and Chromium Puts Windows and Linux Users at Data Risk
A newly revealed zero-day vulnerability identified as CVE-2025-4664 has triggered serious concerns for billions of Google Chrome and Chromium users. Security experts have warned that this flaw, which affects both Windows and Linux platforms, could be exploited to leak…
Contractor Uses AI to Fake Road Work, Sparks Outrage and Demands for Stricter Regulation
In a time when tools like ChatGPT are transforming education, content creation, and research, an Indian contractor has reportedly exploited artificial intelligence for a far less noble purpose—fabricating roadwork completion using AI-generated images. A video that recently went viral…
FBI Alert: Play Ransomware Attacks 900 Organizations
In a recent joint cybersecurity advisory released with its Australian partners, the FBI announced that the Play ransomware group has attacked over 900 organizations since May 2025. “As of May 2025, FBI was aware of approximately 900 affected entities allegedly…
The Strategic Imperatives of Agentic AI Security
In terms of cybersecurity, agentic artificial intelligence is emerging as a transformative force that is fundamentally transforming the way digital threats are perceived and handled. It is important to note that, unlike conventional artificial intelligence systems that typically operate within…
US Embassy Cautions Visa Applicants After Bengaluru Man Falls Prey to Scam
The US Embassy in New Delhi has issued a cautionary alert to individuals applying for US visas, urging them to be wary of online scams that falsely promise to expedite visa interview appointments. This warning comes in the wake…
Mysterious Entity ExposedGang Exposes Cyber Criminals
An anonymous leaker is exposing the identities of the world’s most wanted cybercriminals. Recently, a mysterious leaker exposed leaders behind Trickbot and Conti ransomware, hacking groups that are known for some of the biggest extortions in recent times. Recently, The…
Russian Market Sells Millions of Stolen Credentials
The “Russian Market” cybercrime marketplace has developed as one of the most popular places for purchasing and selling credentials stolen by info stealer malware. Although the marketplace has been functioning for almost six years and has grown in popularity…
Data Breach at Cartier Highlights Growing Cyber Risks in Luxury Sector
In the latest incident involving a high-profile Parisian luxury jeweller, Cartier has been hacked, further heightening the concerns of those who are targeted by digital threats in the fashion and retail industries. In a statement released by the company,…
PocketPal AI Brings Offline AI Chatbot Experience to Smartphones With Full Data Privacy
In a digital world where most AI chatbots rely on cloud computing and constant internet connectivity, PocketPal AI takes a different approach by offering an entirely offline, on-device chatbot experience. This free app brings AI processing power directly onto…
Best Practices for SOC Threat Intelligence Integration
As cyber threats become more complex and widespread, Security Operations Centres (SOCs) increasingly rely on threat intelligence to transform their defensive methods from reactive to proactive. Integrating Cyber Threat Intelligence (CTI) into SOC procedures has become critical for organisations…
Fake AI Tools Are Being Used to Spread Dangerous Malware
As artificial intelligence becomes more popular, scammers are using its hype to fool people. A new warning reveals that hackers are creating fake AI apps and promoting them online to trick users into downloading harmful software onto their devices.…
How Banks Are Battling Digital Fraud
“Unusual activity detected in your account.” A message like this, often accompanied by a suspicious link, is the new face of digital fraud. While you may pause before clicking, banks are already working behind the scenes to block such…
Massive Cyberattack Disrupts KiranaPro’s Operations, Erases Servers and User Data
KiranaPro, a voice-powered quick commerce startup connected with India’s Open Network for Digital Commerce (ONDC), has been hit by a devastating cyberattack that completely crippled its backend infrastructure. The breach, which occurred over the span of May 24–25, led to…
London Startup Allegedly Deceived Microsoft with Fake AI Engineers
There have now been serious allegations of fraud against London-based startup Builder.ai, once considered a disruptor of software development and valued at $1.5 billion. Builder.ai is now in bankruptcy. The company claims that its artificial intelligence-based platform will revolutionise…
Germany Police Have ID’d the Leader of Trickbot Criminal Gang
Cops in Germany have found cybercrime gang leader The Federal Criminal Police of Journey “BKA” has claimed that Stern, the leader of TrickBot and Conti cybercrime gangs, is Vitaly Nikolaevich Kovalev, a 36-year-old Russian. According to BKA, he is suspected…
Rust-Developed InfoStealer Extracts Sensitive Data from Chromium-Based Browsers
Browsers at risk The latest information-stealing malware, made in the Rust programming language, has surfaced as a major danger to users of Chromium-based browsers such as Microsoft Edge, Google Chrome, and others. Known as “RustStealer” by cybersecurity experts, this advanced…
Unimed AI Chatbot Exposes Millions of Patient Messages in Major Data Leak
iA significant data exposure involving Unimed, one of the world’s largest healthcare cooperatives, has come to light after cybersecurity researchers discovered an unsecured database containing millions of sensitive patient-doctor communications. The discovery was made by cybersecurity experts at Cybernews,…
Critical Bug in E-commerce Website, Over 10000 Customers Impacted
WordPress plugin exploit Cybersecurity experts have found a critical unpatched security vulnerability impacting the TI WooCommerce Wishlist plugin for WordPress that unauthorized threat actors could abuse to upload arbitrary files. TI WooCommerce Wishlist has more than 100,000 active installations. It…
TSA Advises Against Using Airport USB Ports to Charge Your Phone
So-called juice jacking is the most controversial topic in cybersecurity circles. In most years, when a new alert is issued by a government agency before the holidays, it creates new headlines. Stories are written and cyber eyebrows are raised…
US Sanctions Philippines-Based Web Host Tied to $200 Million Crypto Scam Network
In a significant move against online fraud, the US Treasury Department has sanctioned a Philippines-based web hosting company accused of enabling massive cryptocurrency scams. The sanctions, announced Thursday, target Funnull Technology and its administrator, Chinese national Liu Lizhi, for…
AI Agents Raise Cybersecurity Concerns Amid Rapid Enterprise Adoption
A growing number of organizations are adopting autonomous AI agents despite widespread concerns about the cybersecurity risks they pose. According to a new global report released by identity security firm SailPoint, this accelerated deployment is happening in a largely…
AI Fraud Emerges as a Growing Threat to Consumer Technology
With the advent of generative AI, a paradigm shift has been ushered in the field of cybersecurity, transforming the tactics, techniques, and procedures that malicious actors have been using for a very long time. As threat actors no longer…
APT41 Exploits Google Calendar in Stealthy Cyberattack; Google Shuts It Down
Chinese state-backed threat actor APT41 has been discovered leveraging Google Calendar as a command-and-control (C2) channel in a sophisticated cyber campaign, according to Google’s Threat Intelligence Group (TIG). The team has since dismantled the infrastructure and implemented defenses to…
How Biometric Data Collection Affects Workers
Modern workplaces are beginning to track more than just employee hours or tasks. Today, many employers are collecting very personal information about workers’ bodies and behaviors. This includes data like fingerprints, eye scans, heart rates, sleeping patterns, and even…
Want to Leave Facebook? Do this.
Confused about leaving Facebook? Many people are changing their social media habits and opting out of many services. Facebook has witnessed a large exodus of users deserting the platform after the announcement in March that Meta was terminating the independent…
WhatsApp Launches First Dedicated iPad App with Full Multitasking and Calling Features
After years of anticipation, WhatsApp has finally rolled out a dedicated iPad app, allowing users to enjoy the platform’s messaging capabilities natively on Apple’s tablet. Available now for download via the App Store, this new version is built to…
Adidas Confirms Data Leak After User Service Provider Hack
Adidas confirmed that a third-party customer service provider’s vulnerability allowed a threat actor to steal company data. Contact details of customers who have previously dealt with the Adidas customer service help desk are among the impacted data. However, passwords,…
North Korea’s Innovative Laptop Farm Scam Alarms Cybersecurity Experts
A group of software engineers, many of whom secretly work on behalf of North Korea, has infiltrated major U.S. companies, many of which are Fortune 500 companies, by masquerading as American developers to obtain money from them. This has…
PumaBot: A New Malware That Sneaks into Smart Devices Using Weak Passwords
A recently found malware called PumaBot is putting many internet-connected devices at risk. This malicious software is designed to attack smart systems like surveillance cameras, especially those that use the Linux operating system. It sneaks in by guessing weak…
Cerebras Unveils World’s Fastest AI Chip, Beating Nvidia in Inference Speed
In a move that could redefine AI infrastructure, Cerebras Systems showcased its record-breaking Wafer Scale Engine (WSE) chip at Web Summit Vancouver, claiming it now holds the title of the world’s fastest AI inference engine. Roughly the size of…
Thousands of ASUS Routers Affected by Stealthy Persistent Backdoor
It seems like someone, possibly nation-state hackers, is building a botnet out of thousands of Asus routers that can withstand firmware patches and reboots. Researchers report that about 9,000 routers have been infiltrated, and the figure is still rising. …
New Self-Spreading Malware Hijacks Docker Servers to Secretly Mine Cryptocurrency
A newly uncovered malware campaign is exploiting unsecured Docker environments across the globe, silently enrolling them into a decentralized cryptojacking network that mines the privacy-focused cryptocurrency, Dero. Cybersecurity firm Kaspersky reports that the attack initiates by targeting exposed Docker…
DragonForce Targets MSPs Using SimpleHelp Exploit, Expands Ransomware Reach
The DragonForce ransomware group has breached a managed service provider (MSP) and leveraged its SimpleHelp remote monitoring and management (RMM) tool to exfiltrate data and launch ransomware attacks on downstream clients. Cybersecurity firm Sophos, which was brought in to…
X Temporarily Disables Encrypted DMs to Launch New Messaging Features
X, formerly known as Twitter, has announced a temporary suspension of its encrypted direct messaging (DM) feature as it works on major upgrades to its messaging infrastructure. In a recent update, the platform confirmed that users will still be…
Vanta Customer Data Exposed Due to Code Bug at Compliance Firm
It was discovered today that Vanta, one of the leading providers of compliance automation solutions, had experienced a critical security lapse that resulted in the unauthorised exposure of confidential customer data, which resulted from a software malfunction. An inadvertent…
NPM Developers Targeted: Fake Packages Secretly Collecting Personal Data
Security experts are warning people who use NPM — a platform where developers share code — to be careful after finding several fake software packages that secretly collect information from users’ computers. The cybersecurity company Socket found around 60…
TCS Investigates Possible Link to M&S Cyberattack
Tata Consultancy Services (TCS), a leading Indian IT services firm under the Tata Group umbrella, is reportedly investigating whether its systems played any role in the recent ransomware attack that disrupted operations at British retail giant Marks & Spencer…
MathWorks Hit by Ransomware Attack Affecting Over 5 Million Clients
The renowned MATLAB programming language and numeric computing environment’s developer has reported a ransomware attack on its IT systems. MathWorks, based in Massachusetts, sent an update to users after initially reporting issues on May 18, stating that the company…
$400Million Coinbase Breach Linked to Customer Data Leak from India
Coinbase data breach linked to India A Reuters investigation revealed that cryptocurrency exchange Coinbase knew in January about a breach affecting outsourced customer support agents in India. Six people who knew about the incident said Coinbase was aware of sensitive…
TSA Cautions Passengers Against Plugging Into Public USB Charging Stations
Despite the Transportation Security Administration’s (TSA) widespread recognition for its role in ensuring air travel security through rigorous passenger screening procedures, the agency is now drawing attention to a lesser-known, yet equally concerning, cybersecurity threat faced by airport travellers.…
FBI Warns of Silent Ransom Group Using Phishing and Vishing to Target U.S. Law Firms
The FBI has issued a warning about a sophisticated cybercriminal group known as the Silent Ransom Group (SRG), also referred to by aliases like Luna Moth, Chatty Spider, and UNC3753. This group has been actively targeting U.S.-based law firms…
OpenAI’s o3 Model Allegedly Alters Shutdown Script in AI Alignment Tests
In a new and potentially alarming development, OpenAI’s latest AI model, o3, has reportedly exhibited behavior suggesting it may be resisting shutdown commands under certain conditions. According to a report published by Palisade Research, a firm that investigates the…
Ransomware Attack Exposes Private Data of Over 280,000 Nova Scotia Power Customers
A major cybersecurity incident has affected Nova Scotia Power, the province’s electricity provider. The company recently confirmed it was hit by a ransomware attack that led to a massive data leak, although electricity services were not disrupted. The cyberattack…
Google Researcher Claims Quantum Computing Could Break Bitcoin-like Encryption Easier Than Thought
Craig Gidney, a Google Quantum AI researcher, has published a new study that suggests cracking popular RSA encryption would take 20 times less quantum resources than previously believed. Bitcoin, and other cryptocurrencies were not specifically mentioned in the study;…
Automatic e-ZERO FIR Filing Introduced for High-Value Cyber Crimes
There has been a significant increase in cybercrime incidents in India recently, and the government of India has responded by launching the e-Zero FIR facility, a landmark initiative that will strengthen the nation’s cybersecurity framework and expedite the investigation…
Undercover Operation Shuts Down Website Helping Hackers Internationally
Hackers used AVCheck to see malware efficiency International police action has shut down AVCheck, an anti-virus scanning website used by threat actors to check whether their malware was detected by mainstream antivirus before using it in the attacks. The official…
WhatsApp Image Scam Uses Steganography to Steal User Data and Money
With over three billion users globally, including around 500 million in India, WhatsApp has become one of the most widely used communication platforms. While this immense popularity makes it convenient for users to stay connected, it also provides fertile…
AI Adoption Accelerates Despite Growing Security Concerns: Report
Businesses worldwide are rapidly embracing artificial intelligence (AI), yet a significant number remain deeply concerned about its security implications, according to the 2025 Thales Data Threat Report. Drawing insights from over 3,100 IT and cybersecurity professionals across 20 countries…
FBI Cracks Down on Dark Web Drug Dealers
A major criminal network operating on the dark web has been disrupted in a large international operation led by the FBI. Over 270 individuals have been arrested for their involvement in the online trade of dangerous illegal drugs such…
Hackers Use Popular Anime Titles to Lure Gen Z into Malware Traps, Warns Kaspersky
Cybercriminals are increasingly camouflaging malware as anime content to exploit the growing global fascination with Japanese animation, according to cybersecurity firm Kaspersky. Their recent analysis of phishing incidents between Q2 2024 and Q1 2025 revealed over 250,000 attacks leveraging…
EU Sanctions Actors Involved in Russian Hybrid Warfare
EU takes action against Russian propaganda The European Union (EU) announced sweeping new sanctions against 21 individuals and 6 entities involved in Russia’s destabilizing activities abroad, marking a significant escalation in the bloc’s response to hybrid warfare threats. European Union…
Vietnam Blocks Telegram Messaging App
Vietnam’s technology ministry has ordered telecommunications service providers to ban the messaging app Telegram for failing to cooperate in the investigation of alleged crimes committed by its users, a move Telegram described as shocking. In a document dated May…
Hackers Tricking Employees with Fake IT Calls and Email Floods in New Ransomware Scam
A growing number of cyberattacks are being carried out by a group linked to the 3AM ransomware. These attackers are using a combination of spam emails and fake phone calls pretending to be a company’s tech support team. Their…
Balancing Consumer Autonomy and Accessibility in the Age of Universal Opt-Outs
The Universal Opt-Out Mechanism (UOOM) has emerged as a crucial tool that streamlines consumers’ data rights exercise in a time when digital privacy concerns continue to rise. Through the use of this mechanism, individuals can express their preferences regarding…
FBI Busts 270 in Operation RapTor to Disrupt Dark Web Drug Trade
Efforts to dismantle the criminal networks operating on the dark web are always welcome, especially when those networks serve as hubs for stolen credentials, ransomware brokers, and cybercrime gangs. However, the dangers extend far beyond digital crime. A substantial…
Governments Release New Regulatory AI Policy
Regulatory AI Policy The CISA, NSA, and FBI teamed with cybersecurity agencies from the UK, Australia, and New Zealand to make a best-practices policy for safe AI development. The principles laid down in this document offer a strong foundation for…
Technology Meets Therapy as AI Enters the Conversation
Several studies show that artificial intelligence has become an integral part of mental health care, changing the way practitioners deliver, document, and conceptualise therapy over the years, as well as how professionals are implementing, documenting, and even conceptualising it.…