LameHug, a novel malware family, generates commands for execution on compromised Windows systems using a large language model (LLM). Russia-backed threat group APT28 (also known as Sednit, Sofacy, Pawn Storm, Fancy Bear, STRONTIUM, Tsar Team, and Forest Blizzard) was…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
UK Connects Stealth Malware Targeting Microsoft 365 to Russian GRU
A series of sophisticated cyber espionage activities has been officially attributed to Russia’s military intelligence agency, the GRU, in an important development that aims to strengthen the cybersecurity of both the United Kingdom and its allied countries. On 18…
Sensitive Records of Over 1 Million People Exposed by U.S. Adoption Organization
A large scale data exposure incident has come to light involving the Gladney Center for Adoption, a U.S.-based non-profit that helps connect children with adoptive families. According to a cybersecurity researcher, an unsecured database containing over a million sensitive…
How Tech Democratization Is Helping SMBs Tackle 2025’s Toughest Challenges
Small and medium-sized businesses (SMBs) are entering 2025 grappling with familiar hurdles: tight budgets, economic uncertainty, talent shortages, and limited cybersecurity resources. A survey of 300 decision-makers highlights how these challenges are pushing SMBs to seek smarter, more affordable…
Here’s How Everyday Tech Is Being Weaponized to Deploy Trojan
The technology that facilitates your daily life, from the smartphone in your hand to the car in your garage, may simultaneously be detrimental to you. Once the stuff of spy thrillers, consumer electronics can today be used as tools…
Zimperium Warns of Rising Mobile Threats Over Public WiFi During Summer Travel
Public WiFi safety continues to be a contentious topic among cybersecurity professionals, often drawing sarcastic backlash on social media when warnings are issued. However, cybersecurity firm Zimperium has recently cautioned travelers about legitimate risks associated with free WiFi networks,…
Core Cryptographic Technique Compromised Putting Blockchain Security at Risk
The concept of randomness is often regarded as a cornerstone of fairness, security, and predictability in both physical and digital environments. Randomness must be used to ensure impartiality, protect sensitive information, and ensure integrity, whether it is determining which…
Legal Battle Over Meta’s AI Training Likely to Reach Europe’s Top Court
The ongoing debate around Meta’s use of European data to train its artificial intelligence (AI) systems is far from over. While Meta has started training its large language models (LLMs) using public content from Facebook and Instagram, privacy regulators…
Armenian Man Extradited to US After Targeting Oregon Tech Firm
The Justice Department said Wednesday last week that an Armenian national is in federal custody on charges related to their alleged involvement in a wave of Ryuk ransomware attacks in 2019 and 2020. On June 18, Karen Serobovich Vardanyan,…
Dell Confirms Breach of Demo Platform by WorldLeaks-Linked Hackers, No Sensitive Data Compromised
Dell Technologies has confirmed that one of its internal platforms used for showcasing products was recently accessed by a hacker. The company assured that no sensitive or customer-related data was exposed during the incident. In an official statement to…
Belk Hit by Ransomware Attack as DragonForce Claims Responsibility for Data Breach
The department store chain Belk recently became the target of a ransomware attack, with the hacking group DragonForce taking responsibility for the breach. The cybercriminals claim to have stolen 156 GB of sensitive data from the company’s systems in…
Scattered Spider Broadens Attack Techniques in Latest Cyber Incidents
Known by aliases such as UNC3944, Scatter Swine, and Muddled Libra, Scatter Spider is an extremely persistent and adaptable cybercriminal group focused on financial gain. In the current cyber threat environment, the Scatter Spider group stands out as one…
Sensitive AI Key Leak : A Wave of Security Concerns in U.S. Government Circles
A concerning security mistake involving a U.S. government employee has raised alarms over how powerful artificial intelligence tools are being handled. A developer working for the federal Department of Government Efficiency (DOGE) reportedly made a critical error by accidentally…
Trustwave Reveals Dark Web Travel Agencies’ Secrets
Within the underground economy, dark web travel agencies have become one of the more sophisticated and profitable businesses. According to the Wall Street Journal’s report on Trustwave’s findings, these shady companies use credit card fraud, compromised loyalty program accounts,…
China Hacks Seized Phones Using Advanced Forensics Tool
There has been a significant concern raised regarding digital privacy and the practices of state surveillance as a result of an investigation conducted by mobile security firm Lookout. Police departments across China are using a sophisticated surveillance system, raising…
Hackers Exploit End-of-Life SonicWall Devices Using Overstep Malware and Possible Zero-Day
Cybersecurity experts from Google’s Threat Intelligence Group (GTIG) have uncovered a series of attacks targeting outdated SonicWall Secure Mobile Access (SMA) devices, which are widely used to manage secure remote access in enterprise environments. These appliances, although no longer…
Ukrainian Hackers Claim Major Cyberattack on Russian Drone Manufacturer
In an unsettling development in the ongoing cyber conflict linked to the Russia-Ukraine war, Ukrainian-aligned hacking groups have claimed responsibility for a large-scale cyberattack targeting a major Russian drone manufacturing company. The targeted firm, identified as Gaskar Group, is believed…
Hackers Use DNS Records to Hide Malware and AI Prompt Injections
Cybercriminals are increasingly leveraging an unexpected and largely unmonitored part of the internet’s infrastructure—the Domain Name System (DNS)—to hide malicious code and exploit security weaknesses. Security researchers at DomainTools have uncovered a campaign in which attackers embedded malware directly…
Healthcare Firms Face Major Threats from Risk Management and Legacy Tech, Report Finds
With healthcare facilities scrambling to pinpoint and address their top cyber threats, Fortified’s report provides some guidance on where to begin. The report identifies five major security gaps in healthcare organisations: inadequate asset inventories, a lack of unified risk…
UK Tax Fraud Scheme Uncovered Following Arrests in Romania
Despite being organized and waged on a global scale, phishing-based tax fraud schemes that target the United Kingdom have emerged in recent years as a significant development in the fight against transnational cyber-enabled financial crime. An operation coordinated by…