A dangerous malware campaign known as BadBox 2.0 has infected more than 10 million Android-powered devices, according to a recent alert from the FBI and major cybersecurity researchers. Users are being advised to immediately disconnect any suspicious smart devices…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Luxembourg Probes Cyberattack Behind Telecom Outage, Cites “Exceptionally Sophisticated” Assault
The Luxembourg government has launched a formal investigation into a major nationwide telecom outage that occurred on July 23, following what officials say was a deliberate cyberattack. The disruption, which lasted over three hours, knocked out the country’s 4G…
FBI Warns Chrome Users Against Unofficial Updates Downloading
If you use Windows, Chrome is likely to be the default browser. Despite Microsoft’s ongoing efforts to lure users to the Edge and the rising threat of AI browsers, Google’s browser remains dominant. However, Chrome is a victim of…
Ransomware Defence Begins with Fundamentals Not AI
The era of rapid technological advancements has made it clear that artificial intelligence isn’t only influencing cybersecurity, it is fundamentally redefining its boundaries and capabilities as well. The transformation was evident at the RSA Conference in San Francisco in…
Singapore Companies Struggle to Recover from Ransomware Despite Paying Hackers
Many businesses in Singapore continue to face prolonged and expensive recovery periods after ransomware attacks, even when they choose to pay the ransom. A new report from cybersecurity firm Sophos reveals that 50% of local organizations affected by ransomware…
Wi-Fi Signals Can Now Identify You Without Devices or Cameras, Raising New Privacy Fears
A new technology developed by researchers at La Sapienza University of Rome could transform how individuals are identified in connected environments and reignite urgent debates over privacy. In a breakthrough that bypasses traditional biometrics, the research team has demonstrated…
Top 5 Ways CISOs Can Shift to a Proactive Cybersecurity Strategy
In today’s threat-filled digital ecosystem, being one step ahead of attackers is no longer a luxury—it’s a requirement. Yet, 81% of security leaders report being pushed by regulations and business needs to move toward a preventative approach, even as…
Insurance Provider Reports June Cyber Breach
Philadelphia Indemnity Insurance Company has confirmed that customer information was exposed during a cyber incident that occurred in June. The company shared the update through a recent filing with California’s Attorney General, marking the latest in a growing number…
Hackers Stole 384 Crore From Bengaluru Cryptocurrency Firm
In what is arguably the biggest cyberattack on an Indian cryptocurrency company, Neblio Technologies Private Limited, located in Bengaluru, was allegedly robbed off Rs. 384 crore. The company owns CoinDCX, a cryptocurrency exchange platform. The company claims that someone…
How to Stay Safe on Public Wi-Fi: Myths, Real Risks, and Smart Habits
Many people view public Wi-Fi as an open invitation for hackers to steal their personal data, but this perception isn’t entirely accurate. While using Wi-Fi in public places such as cafés, airports, or hotels does come with certain cybersecurity…
Emerging Koske Malware Leverages Visual Deception on Linux Platforms
The new Linux malware strain, Kosk, has emerged in a striking demonstration of how artificial intelligence is being used to fight cybercrime. In a remarkable development in how cybercrime intersects with artificial intelligence, the malware uses stealthy delivery mechanisms…
Don’t Wait for a Cyberattack to Find Out You’re Not Ready
In today’s digital age, any company that uses the internet is at risk of being targeted by cybercriminals. While outdated software and unpatched systems are often blamed for these risks, a less obvious but equally serious problem is the…
Delta Airline is Using AI to Set Ticket Prices
With major ramifications for passengers, airlines are increasingly using artificial intelligence to determine ticket prices. Now, simple actions like allowing browser cookies, accepting website agreements, or enrolling into loyalty programs can influence a flight’s price. The move to AI-driven…
Why Web3 Exchanges Must Prioritize Security, Privacy, and Fairness to Retain Users
In the evolving Web3 landscape, a platform’s survival hinges on its ability to meet community expectations. If users perceive an exchange as unfair, insecure, or intrusive, they’ll swiftly move on. This includes any doubts about the platform’s transparency, ability…
CoinDCX Suffers Rs 380 Crore Crypto Theft Linked to Insider Involvement
An important development underlining the growing threat of insider cybercrime has occurred in Bengaluru, when police arrested a software engineer who was suspected of committing a massive cryptocurrency heist that defrauded CoinDCX of approximately Rs 379 crore. Agarwal, a…
Malware Discovered in Endgame Gear Gaming Mouse Tool: Company Investigates, Assures Data Safety
A configuration utility designed for an Endgame Gear gaming mouse was recently found to have been compromised with malware, raising concerns among users and prompting a swift response from the company. Endgame Gear issued a public alert on Wednesday…
Amazon’s Coding Tool Hacked — Experts Warn of Bigger Risks
A contemporary cyber incident involving Amazon’s AI-powered coding assistant, Amazon Q, has raised serious concerns about the safety of developer tools and the risks of software supply chain attacks. The issue came to light after a hacker managed to…
UK Government Proposes Mandatory Reporting of Ransomware Attacks
The British government’s proposals to amend its ransomware strategy marked a minor milestone on Tuesday, when the Home Office issued its formal answer to a survey on modifying the law, but questions remain regarding the effectiveness of the measures. …
Emerging Threat Uses Windows Tools to Facilitate Banking Credential Theft
An alarming development that underscores how financial cybercrime is evolving is a Windows-based banking trojan dubbed Coyote. It has been observed for the first time that a malware strain leveraging the Microsoft UI Automation (UIA) framework for stealthy extraction of…
CISA Urges Immediate Patching of Critical SysAid Vulnerabilities Amid Active Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert about two high-risk vulnerabilities in SysAid’s IT service management (ITSM) platform that are being actively exploited by attackers. These security flaws, identified as CVE-2025-2775 and CVE-2025-2776, can…