The number of active ransomware groups has reached an unprecedented high, marking a new phase in the global cyber threat landscape. According to GuidePoint Security’s latest Ransomware & Cyber Threat Report, the total number of active groups surged 57%,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Astaroth Malware Adopts GitHub Infrastructure to Target Crypto Investors
A new attack is now underway involving the notorious Astaroth banking Trojan, a banking Trojan which is used to steal cryptocurrency credentials, and cybersecurity researchers at McAfee have discovered that this Trojan exploited the GitHub platform for distribution. This…
Crypto Vanishes: North Korea’s $2B Heist, Discord Breach Exposes Millions
North Korean hackers have stolen over $2 billion in cryptocurrency in 2025, while a Discord breach exposed sensitive user data, including government IDs of approximately 70,000 individuals. These incidents highlight the growing sophistication of cyber threats targeting both financial…
Gmail Users Face New AI Threats as Google Expands Encryption and Gemini Features
Gmail users have a fresh security challenge to watch out for — the mix of your Gmail inbox, Calendar, and AI assistant might pose unexpected risks. From malicious prompts hidden in emails or calendar invites to compromised assistants…
BreachForums Taken Down by FBI and French Authorities as LAPSUS$-Linked Group Threatens Salesforce Data Leak
U.S. and French law enforcement agencies have seized the latest version of BreachForums, a cybercrime platform known for hosting stolen databases and leaked information. The takedown was carried out by the Federal Bureau of Investigation (FBI), the U.S. Department…
Chrome vs Comet: Security Concerns Rise as AI Browsers Face Major Vulnerability Reports
The era of AI browsers is inevitable — the question is not if, but when everyone will use one. While Chrome continues to dominate across desktops and mobiles, the emerging AI-powered browser Comet has been making waves. However, growing…
Asahi Beer Giant Hit by Cyberattack, Forced to Manual Operations
Japanese brewing giant Asahi Group Holdings, the manufacturer of Japan’s most popular beer Super Dry, suffered a devastating ransomware attack in late September 2025 that forced the company to revert to manual operations using pen, paper, and fax machines.…
Data Breach at Bectu Exposes Members’ Information and Bank Details
Prospect, one of the UK’s leading trade unions, has revealed that in June 2025, it was seriously affected by a cyberattack which had been discovered in the wake of a sophisticated cyberattack that had been launched against it. This…
AI Can Models Creata Backdoors, Research Says
Scraping the internet for AI training data has limitations. Experts from Anthropic, Alan Turing Institute and the UK AI Security Institute released a paper that said LLMs like Claude, ChatGPT, and Gemini can make backdoor bugs from just 250 corrupted…
India’s Expanding Digital Reach Brings New Cybersecurity Challenges
India’s digital transformation has advanced rapidly over the past decade. With more than 86% of households now online, the Digital India initiative has helped connect citizens, businesses, and services like never before. However, this growing connectivity has also exposed…
AI Chatbot Truth Terminal Becomes Crypto Millionaire, Now Seeks Legal Rights
Truth Terminal is an AI chatbot created in 2024 by New Zealand-based performance artist Andy Ayrey that has become a cryptocurrency millionaire, amassed nearly 250,000 social media followers, and is now pushing for legal recognition as an independent entity.…
South Korea Loses 858TB of Government Data After Massive Fire at National Data Center
In a shocking turn of events, South Korea’s National Information Resources Service (NIRS) lost 858 terabytes of critical government data after a devastating fire engulfed its data center — and there were no backups available. The incident occurred on…
CoMaps: The Open-Source, Privacy-Focused Google Maps Alternative You’ll Actually Want to Use
Google Maps may be convenient, but for some users, its constant tracking and battery drain are reason enough to look for an alternative. One such option is CoMaps, an open-source navigation app built for privacy and efficiency. Users frustrated…
Exposing the Misconceptions That Keep Users Misusing VPNs
The idea of privacy has become both a luxury and a necessity in an increasingly interconnected world. As cyber surveillance continues to rise, data breaches continue to occur, and online tracking continues to rise, more and more Internet users…
Salesforce Refuses to Pay Extortion Demand After Alleged Theft of Nearly One Billion Records
Salesforce has confirmed it will not pay a ransom to an extortion group that claims to have stolen close to one billion records belonging to several of its customers. The company stated that it will not enter negotiations or make…
Wake-Up Call for Cybersecurity: Lessons from M&S, Co-op & Harrods Attacks
The recent cyberattacks on M&S, Co-op, and Harrods were more than just security breaches — they served as urgent warnings for every IT leader charged with protecting digital systems. These weren’t random hacks; they were carefully orchestrated, multi-step campaigns that…
Qilin Ransomware Gang Claims Cyberattack on Japanese Beer Giant Asahi
The Qilin ransomware group has claimed responsibility for the recent cyberattack on Japanese brewing giant Asahi, adding the company’s name to its dark web data leak site. The cybercriminals alleged that they had stolen over 9,300 files amounting to…
Workplace AI Tools Now Top Cause of Data Leaks, Cyera Report Warns
A recent Cyera report reveals that generative AI tools like ChatGPT, Microsoft Copilot, and Claude have become the leading source of workplace data leaks, surpassing traditional channels like email and cloud storage for the first time. The alarming trend…
Incognito Mode Is Not Private, Use These Instead
Incognito (private mode) is a famous privacy feature in web browsers. Users may think that using Incognito mode ensures privacy while surfing the web, allowing them to browse without restrictions, and that everything disappears when the tab is closed. With…
Cyber Risks Emerge as a Direct Threat to Clinical Care
Even though almost every aspect of modern medicine is supported by digital infrastructure, the healthcare sector finds itself at the epicentre of an escalating cybersecurity crisis at the same time. Cyberattacks have now evolved from being just a financial…