On March 31, 2026, Anthropic, the safety-focused AI company behind Claude, accidentally leaked over 500,000 lines of proprietary source code for its Claude Code tool through a public npm package update. This incident, the second such breach in a…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Arbitrary File Write Bug in Gigabyte Control Center Sparks Security Alerts
It is becoming increasingly apparent that trusted system utilities are embedded with persistent security risks, as GIGABYTE Control Center, a widely deployed Windows-based management tool that is packaged with select devices, has been put under scrutiny following the disclosure…
New Chaos Malware Variant Expands to Cloud Targets, Introduces Proxy Capability
A newly observed version of the Chaos malware is now targeting poorly secured cloud environments, indicating a defining shift in how this threat is being deployed and scaled. According to analysis by Darktrace, the malware is increasingly exploiting misconfigured…
Critical Fortinet FortiClient EMS Flaw Now Actively Exploited in Cyberattacks
A critical vulnerability in Fortinet’s FortiClient EMS platform is now being actively exploited in real‑world attacks, according to threat‑intelligence firm Defused. Tracked as CVE‑2026‑21643, this SQL injection bug affects FortiClient EMS version 7.4.4 and allows unauthenticated attackers to run…
Infiniti Stealer Targets Mac Users with ClickFix Social Engineering Attack
Not stopping at typical malware tricks, Infiniti Stealer targets Macs using clever social manipulation instead of system flaws. Security firm Malwarebytes uncovered the operation, highlighting how it dodges standard protection tools. Once inside, the software slips under the radar…
How Duck.ai Offer Better Privacy Compared to Commercial Chatbots
Better privacy with DuckDuckGo’s AI bot Privacy issues have always bothered users and business organizations. With the rapid adoption of AI, the threats are also rising. DuckDuckGo’s Duck.ai chatbot benefits from this. The latest report from Similarweb revealed that traffic…
Apple Reinforces Digital Privacy for Users Without Restricting Law Enforcement Oversight
The company has long positioned its privacy architecture as a defining aspect of its ecosystem, marketing it as more than a feature, but a fundamental right built into its products as well. However, the latest disclosures emerging from US…
Claude Mythos 5: Trillion-Parameter AI Powerhouse Unveiled
Anthropic has launched Claude Mythos 5, a groundbreaking AI model boasting 10 trillion parameters, positioning it as a leader in advanced artificial intelligence capabilities. This massive scale enables superior performance in demanding fields like cybersecurity, coding, and academic reasoning,…
Cyber Attacks Threatening Global Digital Landscape, Affecting Human Lives
Cyberattack campaigns have increased against critical infrastructure like power grids, healthcare, and energy. Cyber warfare and global threat The global threat landscape has shifted from data theft to threats against human lives. The convergence of Operational Technology (OT) and Information…
Malware Hidden in Blockchain Networks Is Quietly Targeting Developers Worldwide
A new investigation has uncovered a cyberattack method that uses blockchain networks to quietly distribute malware, raising concerns among security researchers about how difficult it may be to stop once it spreads further. The threat first surfaced when a senior…
Infinity Stealer Targets macOS Using ClickFix Trick and Python-Based Malware
A newly identified information-stealing malware, dubbed Infinity Stealer, is targeting macOS users through a sophisticated attack chain that blends social engineering with advanced evasion techniques. Security researchers at Malwarebytes report that this is the first known campaign combining the…
Generative AI Expanding Capabilities of Fraud and Social Engineering Attacks
In the past, the quiet integration of generative artificial intelligence into financial systems has been framed as a story of optimizing and scaling. However, in the digital banking industry, generative AI is now being rewritten in terms that are…
Cybersecurity Risks Rise as Modern Vehicles Become Complex Digital Ecosystems
Today’s vehicles have evolved into highly interconnected cyber-physical systems, combining mobile apps, backend infrastructure, over-the-air (OTA) update mechanisms, and AI-powered decision-making. This growing integration has significantly expanded the potential attack surface, introducing security risks that traditional IT frameworks were…
Microsoft 365 Accounts Targeted in Large Iran-Linked Cyber Campaign
A cyber operation believed to be linked to Iranian threat actors has been identified targeting Microsoft 365 environments, with a primary focus on organizations in Israel and the United Arab Emirates. The activity comes amid ongoing tensions in the Middle…
Threat Actors Exploit GitHub as C2 in Multi-Stage Attacks Attacking Organizations in South Korea
GitHub attacked by state-sponsored hackers Cyber criminals possibly linked with the Democratic People’s Republic of Korea (DPRK) have been found using GitHub as a C2 infrastructure in multi-stage campaigns attacking organizations in South Korea. The operation chain involves hidden Windows…
Judge Blocks Pentagon’s Retaliatory AI Ban on Anthropic
A federal judge has temporarily halted the Pentagon’s effort to designate AI company Anthropic as a supply chain risk, ruling that the move appeared driven by retaliation rather than legitimate security concerns. In a 48-page order, U.S. District Judge…
AI Datacenter Boom Triggers Global CPU and Memory Shortages, Driving Price Hikes
Spurred by growing reliance on artificial intelligence, computing hardware networks are pushing chip production to its limits – shortages once limited to memory chips now affect core processors too. Because demand for AI-optimized facilities keeps climbing, industry leaders say…
Mistral Debuts New Open Source Model for Realistic Speech Generation
Rather than function as a conventional transcription engine, Mistral’s latest release represents a significant evolution beyond its earlier text-focused systems by expanding its open-weight philosophy into the increasingly complex domain of speech generation. As an alternative to acting as a…
Microsoft 365 Phishing Bypasses MFA via OAuth Device Codes
A recent wave of phishing attacks is bypassing traditional security protections on Microsoft 365, even when multi‑factor authentication (MFA) is enabled. Instead of stealing passwords directly, attackers are abusing legitimate Microsoft login flows to trick users into granting access…
Armenian Suspect Extradited to US Over Role in RedLine Malware Operation
A man from Armenia now faces trial in the U.S., accused of helping run a major cybercriminal network recently uncovered. On March 23, authorities took Hambardzum Minasyan into custody; later that week, he stood before judges in Austin. Officials…