Federal contract to spy Earlier this year, the US Immigration and Customs Enforcement (ICE) paid $825,000 to a manufacturing company that makes vehicles installed with tech for law enforcement, which also included fake cellphone towers called “cell-site” simulators used to…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Danish Developer’s Website Sparks EU Debate on Online Privacy and Child Protection
In August, a 30-year-old developer from Aalborg, identified only as Joachim, built a platform called Fight Chat Control to oppose a proposed European Union regulation aimed at tackling the spread of child sexual abuse material (CSAM) online. The EU…
Indian Tax Department Fixes Major Security Flaw That Exposed Sensitive Taxpayer Data
The Indian government has patched a critical vulnerability in its income tax e-filing portal that had been exposing sensitive taxpayer data to unauthorized users. The flaw, discovered by security researchers Akshay CS and “Viral” in September, allowed logged-in users…
Discord Third-Party Breach Exposes User Data and Government IDs
Discord has confirmed a significant data breach affecting users who interacted with their customer support or trust & safety teams, stemming not from a direct attack on Discord’s own systems but through a compromised third-party vendor that handled customer…
AI Startup by Dhravya Shah Gains $3 Million Investment and O-1 Visa Recognition
As one of the youngest innovators in the global tech landscape, Mumbai-born innovator Dhravya Shah is just 20 years old and makes a big impact in the industry every day. It was Shah’s unconventional decision to move away from…
Bitcoin Developer Warns NSA May Be Pushing “Quantum-Only” Cryptography Backdoor
Prominent Bitcoin developer Peter Todd has accused the U.S. National Security Agency (NSA) of attempting to “backdoor crypto again” through the introduction of so-called quantum-secure algorithms that could exclude traditional cryptographic safeguards. “Tl;dr: the NSA is clearly looking to…
Paying Ransom Does Not Guarantee Data Restoration: Report
A new report claims that smaller firms continue to face dangers in the digital domain, as ransomware threats persistently target organizations. Hiscox’s Cyber Readiness Report surveyed 6,000 businesses, and over 59% report they have been hit by a cyber attack…
Spanish Police Dismantle AI-Powered Phishing Network and Arrest Developer “GoogleXcoder”
Spanish authorities have dismantled a highly advanced AI-driven phishing network and arrested its mastermind, a 25-year-old Brazilian developer known online as “GoogleXcoder.” The operation, led by the Civil Guard’s Cybercrime Department, marks a major breakthrough in the ongoing fight…
Red Hat Data Breach Deepens as Extortion Attempts Surface
The cybersecurity breach at enterprise software provider Red Hat has intensified after the hacking collective known as ShinyHunters joined an ongoing extortion attempt initially launched by another group called Crimson Collective. Last week, Crimson Collective claimed responsibility for infiltrating…
Sensitive Information of NSW Flood Victims Mistakenly Entered into ChatGPT
A serious data breach involving the personal details of thousands of flood victims has been confirmed by the New South Wales government in an unsettling development that highlights the fragile boundary between technology and privacy. There has been an…
Clop Ransomware Exploits Oracle Zero-Day in Major Extortion Campaign
The Clop ransomware gang has orchestrated a massive extortion campaign targeting Oracle E-Business Suite customers by exploiting a critical zero-day vulnerability tracked as CVE-2025-61882. The vulnerability, which carries a CVSS score of 9.8, affects Oracle EBS versions 12.2.3 through…
Discord confirms third-party support breach; some users’ ID photos, support messages and limited payment details were accessed
Discord, the popular communication platform used by millions worldwide, has confirmed a data breach that compromised the systems of one of its third-party customer support providers. The incident, which occurred on September 20, 2025, allowed an unauthorized individual to…
Microsoft to end support for Windows 10, 400 million PCs will be impacted
Microsoft is ending software updates for Windows 10 From October 14, Microsoft will end its support for Windows 10, experts believe it will impact around 400 million computers, exposing them to cyber threats. People and groups worldwide are requesting that…
Zimbra Zero-Day Exploit Used in ICS File Attacks to Steal Sensitive Data
Security researchers have discovered that hackers exploited a zero-day vulnerability in Zimbra Collaboration Suite (ZCS) earlier this year using malicious calendar attachments to steal sensitive data. The attackers embedded harmful JavaScript code inside .ICS files—typically used to schedule and…
Ransomware Gang Claims Boeing, Samsung Supplier Breach in 11GB Data Theft
A ransomware group named J GROUP claims to have breached Dimensional Control Systems (DCS), stealing 11GB of sensitive data, including proprietary software architecture, client metadata, and internal security procedures. DCS, a Michigan-based provider of dimensional engineering software, serves major…
Thousands of Government IDs at Risk Following Breach Involving Discord’s Verification Partner
Currently, one of the threats associated with digital identity verification can often be found in the form of cyberattacks targeting third-party service providers linked to Discord, with the result that sensitive personal data belonging to nearly 70,000 users may have…
Zero-click Exploit AI Flaws to Hack Systems
What if machines, not humans, become the centre of cyber-warfare? Imagine if your device could be hijacked without you opening any link, downloading a file, or knowing the hack happened? This is a real threat called zero-click attacks, a covert…
Rise of Evil LLMs: How AI-Driven Cybercrime Is Lowering Barriers for Global Hackers
As artificial intelligence continues to redefine modern life, cybercriminals are rapidly exploiting its weaknesses to create a new era of AI-powered cybercrime. The rise of “evil LLMs,” prompt injection attacks, and AI-generated malware has made hacking easier, cheaper, and…
Payroll Hackers Target U.S. Universities, Microsoft Warns
Microsoft researchers have surfaced a new phishing campaign where cybercriminals are stealing university employees’ salaries by redirecting their payroll deposits to accounts under their control. The group behind the attacks has been named “Storm-2657” by Microsoft. The hackers have…
How Reporting Spam Calls and Texts Helps Stop Scammers for Everyone
Almost everyone has experienced an unexpected call or text from an unknown number. While some turn out to be harmless misdials, many are actually spam or phishing attempts aimed at stealing personal or financial information. In some cases,…