The European Commission has accused Meta of breaching the European Union’s Digital Services Act (DSA), alleging that Facebook and Instagram fail to provide users with simple and accessible ways to report illegal content. In a preliminary ruling, the Commission…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Tata Motors Fixes Security Flaws That Exposed Sensitive Customer and Dealer Data
Indian automotive giant Tata Motors has addressed a series of major security vulnerabilities that exposed confidential internal data, including customer details, dealer information, and company reports. The flaws were discovered in the company’s E-Dukaan portal, an online platform used…
Shadow AI Quietly Spreads Across Workplaces, Study Warns
A growing number of employees are using artificial intelligence tools that their companies have never approved, a new report by 1Password has found. The practice, known as shadow AI, is quickly becoming one of the biggest unseen cybersecurity risks…
Microsoft Warns Windows 10 Users: Hackers Target Outdated Systems
Modern cyberattacks rarely target the royal jewels. Instead, they look for flaws in the systems that control the keys, such as obsolete operating systems, aging infrastructure, and unsupported endpoints. For technical decision makers (TDMs), these blind spots are more than…
India Moves to Mandate Labels on AI-Generated Content Across Social Media
India’s Ministry of Electronics and Information Technology has proposed new regulations that would make it compulsory for all social media platforms to clearly label artificial intelligence (AI)-generated or “synthetic” content. Under the draft amendment to the Information Technology (Intermediary Guidelines…
Stop Using Public Wi-Fi: Critical Security Risks Explained
Public Wi-Fi networks, commonly found in coffee shops and public spaces, are increasingly used by remote workers and mobile device users seeking internet access outside the home or office. While convenient, these networks pose significant security risks that are…
Ribbon Targeted in Cyber Espionage Campaign by Nation-State Actors
Among the many revelations which illustrate how sophisticated state-backed cyber intrusions are, Ribbon Communications has confirmed that its internal network was compromised by government-backed hackers who kept unauthorised access for almost a year before they were detected, a revelation…
Apple Removes Controversial Dating Apps After Data Leak and Privacy Violations
Apple has removed two dating apps, Tea and TeaOnHer, from the App Store months after a major data breach exposed users’ private information. The removal comes amid continued criticism over the apps’ privacy failures and lack of effective content…
The Threats of Agentic AI Data Trails
What if you install a brand new smart-home assistant that looks surreal, and if it can precool your living room at ease. However, besides the benefits, the system is secretly generating a huge digital trace of personal information? That’s the…
ChatGPT Atlas Surfaces Privacy Debate: How OpenAI’s New Browser Handles Your Data
OpenAI has officially entered the web-browsing market with ChatGPT Atlas, a new browser built on Chromium: the same open-source base that powers Google Chrome. At first glance, Atlas looks and feels almost identical to Chrome or Safari. The key…
Western Sydney University Hit by Major Cyberattack
Western Sydney University has suffered a significant cyberattack, marking the latest in a series of incidents targeting the institution since 2023. Sensitive data belonging to students, staff, and alumni—including tax file numbers, bank account details, passport and driver license…
AWS Apologizes for Massive Outage That Disrupted Major Platforms Worldwide
Amazon Web Services (AWS) has issued an apology to customers following a widespread outage on October 20 that brought down more than a thousand websites and services globally. The disruption affected major platforms including Snapchat, Reddit, Lloyds Bank, Venmo,…
Growing VPN Exploits Trigger Fresh Ransomware Crisis in APAC
Despite the growing cyber risk landscape in Asia-Pacific, ransomware operations continue to tighten their grip on India and the broader region, as threat actors more often seek to exploit network vulnerabilities and target critical sectors in order to get…
New Vidar Variant Uses API Hooking to Steal Data Before Encryption
A recent investigation by Aryaka Threat Research Labs has revealed a new version of the Vidar infostealer that demonstrates how cybercriminals are refining existing malware to make it more discreet and effective. Vidar, which has circulated for years through…
Iran Attacks Israeli Cybersecurity Infrastructure
The National Cyber Directorate found a series of cyberattacks that targeted Israeli organisations that offer IT services to companies in the country, and might be linked to Iran. Earlier this month, the failed cyberattack against Shamir Medical Center on Yom…
TikTok ‘Free Photoshop’ Scam Steals User Data via Malicious Commands
A sophisticated scam targeting TikTok users is exploiting the platform’s reach to steal personal data by promising free access to expensive software like Adobe Photoshop. Cybercriminals are using a social engineering technique called ClickFix to trick victims into executing…
Online Identity Is Evolving: From Data Storage to Proof-Based Verification with zkTLS
The next phase of online identity is shifting from data storage to proof-based verification. Today, the internet already contains much of what verification and compliance teams require — from academic credentials and payment confirmations to loyalty program details. The…
How to Make Zoom Meetings More Secure and Protect Your Privacy
Zoom calls remain an essential part of remote work and digital communication, but despite their convenience, they are not entirely private. Cybercriminals can exploit vulnerabilities to steal sensitive information, intercept conversations, or access meeting data. However, several practical measures…
Proxy Servers: How They Work and What They Actually Do
When browsing online, your device usually connects directly to a website’s server. However, in certain cases, especially for privacy, security, or access control — a proxy server acts as a go-between. It stands between your device and the internet, forwarding…
The Growing Role of Cybersecurity in Protecting Nations
It is becoming increasingly complex and volatile for nations to cope with the threat landscape facing them in an age when the boundaries between the digital and physical worlds are rapidly dissolving. Cyberattacks have evolved from isolated incidents of…