Cybercriminals are increasingly turning to client-side attacks as a way to bypass traditional server-side defenses, with mobile browsers emerging as a prime target. According to the latest “Client-Side Attack Report Q2 2025” by security researchers c/side, these attacks are…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Experts decoded encryption keys used by DarkBit ransomware gang
Encryption key for Darkbit ransomware Good news for people affected by the DarkBit ransomware: experts from Profero have cracked the encryption process, allowing victims to recover their files for free without paying any ransom. However, the company has not yet…
Quantum Broadens Distribution Reach in Asia-Pacific Region
Quantum Corporation Expands Asia-Pacific Distribution Network to Accelerate Growth Quantum Corporation (NASDAQ: QMCO) announced a strategic expansion of its distribution network across high-growth Asia-Pacific markets including China, India, Taiwan, and the ASEAN region. This initiative reflects the company’s commitment…
Pandora Admits Customer Data Compromised in Security Breach
A major player in the global fashion jewellery market for many years, Pandora has long been positioned as a dominant force in this field as the world’s largest jewellery brand. However, the luxury retailer is now one of a…
Google Confirms Data Breach in Salesforce System Linked to Known Hacking Group
Google has admitted that some of its customer data was stolen after hackers managed to break into one of its Salesforce databases. The company revealed the incident in a blog post on Tuesday, explaining that the affected database stored…
Cloudflare Accuses AI Startup Perplexity of Bypassing Web Blocking Measures
Cloudflare has accused artificial intelligence company Perplexity of using hidden tactics to bypass restrictions designed to stop automated bots from collecting website data. In a statement published Monday, Cloudflare said it had received multiple complaints from its customers claiming…
NZTA Breach Results in Vehicle Theft, User Data Compromise
Data compromise leads to targeted motor theft A privacy breach has leaked the details of 1000 people (estimate) in a Transport firm’s database over the past year. According to the agency, the breach targeted 13 vehicles for theft. The problem…
Millions Face Potential Harm After Experts Uncovered a Vast Network of 5,000+ Fake Pharmacy Sites
Security experts have exposed “PharmaFraud,” a criminal network of more than 5,000 fraudulent online pharmacies. The operation puts millions of consumers at risk by selling unsafe counterfeit medications while also stealing their private data. The fraudulent campaign mimics legitimate…
New York Lawmaker Proposes Bill to Regulate Gait Recognition Surveillance
New York City’s streets are often packed with people rushing to work, running errands, or simply enjoying the day. For many residents, walking is faster than taking the subway or catching a taxi. However, a growing concern is emerging…
Ingram Micro Faces Alleged Breach by SafePay with Ransom Threat
As Ingram Micro is dealing with a widespread outage in its global technology distribution operations that appears to be directly linked to a ransomware attack by the cybercrime group SafePay, the company appears to be experiencing a significant disruption.…
Cyber Incident Response Needs Dynamic Command Structure Instead of Static Guidelines
The SolarWinds cyberattack, which impacted over 18,000 entities, revealed that many organizations respond to breaches with disorganized, makeshift command centers. Kevin Mandia, CEO of Mandiant, recognized the 2020 attack on his own firm as the work of Russia’s SVR,…
Why Companies Keep Ransomware Payments Secret
Companies hiding ransomware payments Ransomware attacks are ugly. For every ransomware attack news story we see in our feed, a different reality hides behind it. Victims secretly pay their attackers. The shadow economy feeds on corporate guilt and regulatory hysteria.…
New Malware Campaign Using Legitimate-Looking Software Targets Users Worldwide
Cybersecurity experts are warning about a new wave of cyberattacks involving PXA Stealer, a sophisticated info-stealing malware now spreading rapidly across multiple countries. Originally detected by Cisco Talos researchers, PXA Stealer, written in Python was initially deployed against government…
South Dakota Researchers Develop Secure IoT-Based Crop Monitoring System
At the 2025 annual meeting of the American Society of Agricultural and Biological Engineers, researchers from South Dakota State University unveiled a groundbreaking system designed to help farmers increase crop yields while reducing costs. This innovative technology combines sensors,…
Research Raises Concerns Over How Apple’s Siri and AI System Handle User Data
Apple’s artificial intelligence platform, Apple Intelligence, is under the spotlight after new cybersecurity research suggested it may collect and send more user data to company servers than its privacy promises appear to indicate. The findings were presented this week…
DeepSeek Under Investigation Leading to App Store Withdrawals
As one of the world’s leading AI players, DeepSeek, a chatbot application developed by the Chinese government, has been a formidable force in the artificial intelligence arena since it emerged in January 2025, launching at the top of the…
German Mobile Insurance Giant Falls After Devastating Ransomware Attack
A cyberattack has brought down one of Germany’s largest phone insurance and repair networks, forcing the once-thriving Einhaus Group into insolvency. The company, which at its peak generated around €70 million in annual revenue and partnered with big names…
FBI Alert: Avoid Scanning This QR Code on Your Phone
The FBI has issued a warning about a new scam in which cybercriminals send unsolicited packages containing a QR code to people’s homes, aiming to steal personal and financial information or install malware on their devices. These packages often…
Russia launches messenger app “Max” that could replace WhatsApp
Russia is planning to make a “national messenger” as an alternative to social media apps like WhatsApp and Telegram. Max, a messenger app released earlier this year by the tech giant VK and supported by state media campaigns, seems to…
Pi-hole Data Breach Exposes Donor Names and Emails via GiveWP Plugin Vulnerability
Pi-hole, a well-known network-level ad-blocker, has confirmed that a security flaw in the GiveWP WordPress donation plugin exposed donor names and email addresses. Pi-hole functions as a DNS sinkhole, blocking unwanted content before it reaches users’ devices. Originally built…