The Election Commission of India (ECI) said its digital election infrastructure faced more than 68 lakh malicious online hits on the day votes were counted for the recently concluded Assembly elections, with attempts originating from both domestic and overseas…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Ubuntu DDoS Attack Disrupts Installs Updates and Canonical Infrastructure
A wave of traffic overwhelmed systems, briefly halting downloads, patches, and web resources managed by Canonical – the team responsible for Ubuntu Linux. Outages stretched nearly twenty-four hours, blocking access to essential tools during the incident. Midway through the…
Quasar Linux Malware Targets Developers in Stealthy Supply Chain Attack
A newly discovered Linux implant called Quasar Linux, or QLNX, is a serious threat because it goes after the people and systems that build software. Instead of behaving like ordinary malware, it is designed to quietly take root in…
Ubuntu Services Remain Disrupted After DDoS Attack Targets Canonical Infrastructure
Several Ubuntu users reported problems installing updates and downloading packages after parts of Canonical’s infrastructure were disrupted during a Distributed Denial of Service (DDoS) attack. Canonical, the company behind the Ubuntu Linux distribution, confirmed that its online systems had…
Apple Account Data and Bluetooth Signals Tie Suspect to Crypto Robbery
The App Store ecosystem has been infiltrated by a coordinated wave of fraudulent cryptocurrency wallet applications that exploit regional platform restrictions and user trust to steal credentials from iOS users. More than two dozen malicious apps have been identified…
High Court Squashes Ban for Sim-Swap Fraud, Says Zero Customer Liability
In an important ruling amid surging digital financial fraud attacks, the Bombay HC sided with the customer protection norms. It directed Bank of Baroda to return Rs. 1.24 crore to the victim private firm that lost money in a SIM-swap…
Trusted Tools Becoming the New Cybersecurity Threat, Says Bitdefender Report
Cybersecurity threats are evolving rapidly, and according to recent findings, attackers are increasingly relying on tools that organizations already trust. In its latest analysis, Bitdefender highlighted that modern cyberattacks often resemble routine administrative activity rather than traditional malware-based intrusions.…
ShinyHunters Vimeo Data Breach Exposes Information of Over 119,000 Users
Early this year, Vimeo faced a security incident leading to the theft of personal details tied to over 119,000 people by the ShinyHunters hacking collective. Information on the leak became known via Have I Been Pwned, a service tracking…
Linux Copy Fail Vulnerability Puts Major Systems at Risk
A critical Linux kernel vulnerability known as Copy Fail is drawing urgent attention because it can let a local, unprivileged attacker gain root access on affected systems. Security researchers say the issue affects many mainstream Linux distributions and can…
Hacker Claims of Stealing Data from 8,809 Education Institutes, Instructure Hacked
A hacker has claimed to compromise edtech giant Instructure, saying it stole over 280 million records of students and staff from around 8,809 school, colleges, and online education platforms. About Instructure It is a cloud based edtech company famous for…
Critical OpenClaw Flaws Allow Persistent Access and Credential Abuse
OpenClaw, a self-hosted AI agent runtime which has gained rapid adoption by enterprises, introduces a new type of security exposure for enterprises as dynamically executed content, external skill integrations, and cloud-based authentication mechanisms are convergent without adequate defensive control…
AI-Driven Cyberattacks and Global Cybersecurity Shortages Raise Fears of an AI Bugocalypse
Artificial intelligence is rapidly transforming cyber warfare, with experts warning the world may already be entering an “AI bugocalypse.” Modern AI systems can identify hidden software flaws and weaponize them within hours — sometimes before vulnerabilities are even publicly…
Hackers Exploit cPanel Flaw to Gain Control of Thousands of Websites
Hackers are still aggressively exploiting a critical bug in cPanel and WHM, the widely used web hosting control software that powers countless websites across the internet. The flaw, tracked as CVE-2026-41940, lets attackers bypass the login screen and seize…
Instructure Confirms Data Breach as ShinyHunters Claims Responsibility
Educational technology company Instructure has confirmed that user data was compromised following a cyberattack, while the cybercriminal group ShinyHunters has claimed responsibility for the breach. The U.S.-based firm is widely recognized for developing Canvas, a popular learning management platform…
Cybersecurity Can No Longer Be Left to IT Teams Alone, Experts Warn
As cyber attacks continue to grow in frequency and complexity, organizations are facing increasing pressure to rethink who should be responsible for protecting their systems, operations, and sensitive data. Security experts say cybersecurity is no longer simply an IT…
New ChatGPT Settings Will Improve User Privacy and Data Training
Almost everyone has used ChatGPT now. Sometimes we share our personal information and files with the Chatbot. Do not feed your personal info to AI bots To be safe, users should avoid feeding personal data to the AI, as it…
MDASH AI Helps Microsoft Detect 16 Critical Windows Security Flaws
The company has reported that the MDASH framework, developed internally by Microsoft for agentic artificial intelligence, was instrumental in identifying 16 security vulnerabilities affecting core Windows networking and authentication components, including four critical vulnerabilities that can be exploited remotely. …
Indian Banks Step Up IT Spending Over AI Security Fears
Public sector banks are preparing to spend more on technology because a new wave of AI-driven cyber risk is making their existing systems look vulnerable. The main concern is Anthropic’s Claude Mythos, which has raised alarms for its ability…
Axon Police Taser and Body Camera Bluetooth Flaw Raises Officer Tracking Concerns
Australian police may unknowingly be exposing their live locations through Bluetooth-enabled devices made by Axon. Researchers discovered that body cameras and tasers used across the country broadcast signals without modern privacy protections, potentially allowing anyone nearby to detect and…
How Telecom Systems Were Used to Secretly Track Mobile Users Worldwide
A new investigation by the digital rights research group Citizen Lab has revealed how weaknesses inside global telecom infrastructure were allegedly exploited to secretly monitor mobile phone users in more than ten countries over the past three years. The findings,…