Malware that can automatically spread between systems, commonly referred to as worms, has long been a recurring threat in cybersecurity. What makes the latest campaign unusual is not just its ability to propagate, but the decision by its operators…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
New RBI Rule Makes 2FA Mandatory for All Digital Payments
Two-factor authentication (2FA) will be required for all digital transactions under the new framework, drastically altering how customers pay with cards, mobile wallets, and UPI. India plans to change its financial landscape as the Reserve Bank of India (RBI) brings…
Six Month DPRK Campaign Behind $285 Million Drift Cyber Theft
The Drift Protocol, widely considered to be the largest perpetual futures exchange operating on the Solana blockchain, became the focal point of a highly coordinated attack on April 1, 2026, which is rapidly turning into one of the most…
GPS Spoofing: Digital Warfare in the Persian Gulf Manipulating Ship Locations
Digital warfare targeting the GPS location After the U.S and Israel’s “pre-emptive” strikes against Iran last month, research firm Kpler found vessels in the Persian Gulf going off course. The location data from ships in the Gulf showed vessels maneuvering…
Quantum Computing: The Silent Killer of Digital Encryption
Quantum computing poses a greater long-term threat to digital security than AI, as it could shatter the encryption underpinning modern systems. While AI grabs headlines for ethical and societal risks, quantum advances quietly erode the foundations of data protection,…
Anthropic Claude Code Leak Sparks Frenzy Among Chinese Developers
A fresh wave of interest emerged worldwide after Anthropic’s code surfaced online, drawing sharp focus from tech builders across China. This exposure came through a misstep – shipping a tool meant for coding tasks with hidden layers exposed, revealing…
UNC1069 Uses Social Engineering to Hijack Axios npm Package via Maintainer
A sophisticated social engineering operation by UNC1069 has led to the compromise of the widely used Axios npm package, raising serious concerns across the JavaScript ecosystem. The attack targeted a member of the Axios project’s maintainer team by masquerading…
Dutch Court Issues Order Against X and Grok Over Sexual Abuse Content
A court in the Netherlands has taken strict action against the platform X and its artificial intelligence system Grok, directing both to stop enabling the creation of sexually explicit images generated without consent, as well as any material involving…
Port of Vigo Operations Interrupted by Significant Cyberattack
Upon finding its digital backbone compromised by a calculated act of cyber extortion, the Port of Vigo found itself in the midst of the morning rhythms of one of Spain’s most strategically located maritime gateways. Early in the morning…
US Lawmakers Question VPN Surveillance, Seek Transparency on Privacy Risks
Now under scrutiny: demands from American legislators for clearer rules on state tracking of online tools like virtual private networks. Backed by six congressional Democrats – including Ron Wyden – a letter reaches out to intelligence chief Tulsi Gabbard,…
Why Single-Signal Fraud Detection Fails Against Modern Multi-Stage Cyber Attacks
A Modern fraud operations resemble a coordinated relay, where multiple tools and actors manage different stages—from account creation to final cash-out. Focusing on just one indicator, such as IP address or email, leaves gaps that attackers can easily exploit…
China-based TA416 Targets European Businesses via Phishing Campaigns
Chinese state-sponsored attacks A China-based hacker is targeting European government and diplomatic entities; the attack started in mid-2025, after a two-year period of no targeting in the region. The campaign has been linked to TA416; the activities coincide with DarkPeony,…
Microsoft Identifies Cookie Driven PHP Web Shells Maintaining Access on Linux Servers
Server-side intrusions are experiencing a subtle but consequential shift in their anatomy, where visibility is no longer obscured by complexity, but rather clearly visible. Based on recent findings from Microsoft Defender’s Security Research Team, there is evidence of a…
NoVoice Android Malware Infects 2.3 Million Devices on Google Play
Cybersecurity firm McAfee has uncovered a dangerous new threat called NoVoice, a sophisticated Android malware campaign that infiltrated the Google Play Store and infected over 2.3 million devices. Disguised within more than 50 seemingly legitimate apps—ranging from system cleaners…
Netherlands Ministry of Finance Cyberattack Exposes Gaps in Government Security Defenses
A fresh wave of worry now surrounds how well government digital safeguards really hold up, after hackers struck the Dutch Ministry of Finance. Fast response by authorities limited immediate damage – yet the event peeled back layers on long-standing…
Attackers Exploit Critical Flaw to Breach 766 Next.js Hosts and Steal Data
Credential-stealing operation A massive credential-harvesting campaign was found abusing the React2Shell flaw as an initial infection vector to steal database credentials, shell command history, Amazon Web Services (AWS) secrets, GitHub, Stripe API keys. Cisco Talos has linked the campaign to…
Hackers Use Fake Legal Emails to Spread Casbaneiro Malware
A coordinated phishing operation is targeting Spanish-speaking users in both Latin America and Europe, using layered infection methods to deploy banking malware on Windows systems. The campaign delivers the Casbaneiro trojan, also referred to as Metamorfo, and relies on…
The Middle East Conflict Is Redefining Global Cybersecurity Priorities
It has gradually permeated a far more diffuse and consequential arena, the global digital ecosystem, which is now at the forefront of the conflict unfolding across the Middle East. During this phase of confrontation, conventional force is not merely…
Cybercriminals Exploit Telnyx Package in Latest Supply Chain Attack
A cybercriminal group previously associated with a supply chain compromise involving the Trivy vulnerability scanner has launched another attack, this time targeting developers through manipulated Telnyx packages on the Python Package Index (PyPI). According to findings from Ox Security,…
Why Email Aliases Are Important for Every User
Email spam was once annoying in the digital world. Recently, email providers have improved overflowing inboxes, which were sometimes confused with distractions and unwanted mail, such as hyperbolic promotions and efforts to steal user data. But the problem has not…