Tag: CySecurity News – Latest Information Security and Hacking Incidents

Indonesia Hit by $2m Fraud Wave Using Fake ‘Coretax’ Tax Apps

  A massive fraud campaign abusing Indonesia’s official Coretax tax platform has siphoned off an estimated 1.5–2 million dollars in losses nationwide, highlighting how cybercriminals now weaponize public digital services at industrial scale.  Launched around July 2025 and ramped up…

Nitrogen Ransomware Bug Locks Out Attackers from Victims’ Data

  Nitrogen ransomware developers have suffered a self-inflicted blow due to a critical coding error that permanently locks victims’ data, even from themselves. This bug in their VMware ESXi-targeting malware corrupts the public key during encryption, rendering decryption impossible despite…

Malicious dYdX Packages Drain User Wallets in Supply Chain Attack

  Malicious open-source packages targeting the dYdX cryptocurrency exchange have enabled attackers to drain user wallets, exposing once again how fragile software supply chains can be in the crypto ecosystem. Researchers found that legitimate-looking libraries on popular repositories were quietly…

Hackers Use Fake Oura AI Server to Spread StealC Malware

  Cybersecurity analysts have uncovered a fresh wave of malicious activity involving the SmartLoader malware framework. In this campaign, attackers circulated a compromised version of an Oura Model Context Protocol server in order to deploy a data-stealing program known as…

The Growing Threat of DNS Powered Email and Web Attacks

  As an important component of the internet architecture, the Domain Name System has historically played the role of an invisible intermediary converting human intent into machine-readable destinations without much scrutiny or suspicion. However, this quiet confidence has now been…

Conduent Data Breach Expands to Tens of Millions of Americans

  A massive data breach at Conduent, a leading government technology contractor, has escalated dramatically, now affecting tens of millions of Americans across multiple states. Initially detected in January 2025, the intrusion originated from an unauthorized access on October 21,…

ISPsystem VMs Hijacked for Silent Ransomware Distribution

  The evolution of cybercrime has led to infrastructure becoming less of a matter of ownership and more of a convenience issue. As opposed to investing time and resources in the construction and maintenance of dedicated command-and-control servers, ransomware operators…