As businesses adopt employee monitoring tools to improve output and align team goals, they must also consider the implications for privacy. The success of these systems doesn’t rest solely on data collection, but on how transparently and respectfully they…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Malicious Firefox Extension Steals Verification Tokens: Update to stay safe
Credential theft and browser security were commonly found in Google Chrome browsers due to its wide popularity and usage. Recently, however, cyber criminals have started targeting Mozilla Firefox users. A recent report disclosed a total of eight malicious Firefox extensions…
Why Running AI Locally with an NPU Offers Better Privacy, Speed, and Reliability
Running AI applications locally offers a compelling alternative to relying on cloud-based chatbots like ChatGPT, Gemini, or Deepseek, especially for those concerned about data privacy, internet dependency, and speed. Though cloud services promise protections through subscription terms, the reality…
Malware Masquerading as AI Tools Targets 8,500+ SMB Users in an SEO Poisoning Campaign
Cybersecurity researchers have discovered a malicious campaign that uses SEO-optimized phoney landing pages to propagate the Oyster malware loader. Security experts at Arctic Wolf unearthed that threat actors have designed numerous landing sites that mimic two well-known Windows tools…
Germany’s Warmwind May Be the First True AI Operating System — But It’s Not What You Expect
Artificial intelligence is starting to change how we interact with computers. Since advanced chatbots like ChatGPT gained popularity, the idea of AI systems that can understand natural language and perform tasks for us has been gaining ground. Many have…
How to Safeguard Your Phone Number From SIM Swap Attacks in 2025
In 2025, phone numbers have become woven into nearly every part of our digital lives. Whether you’re creating accounts on e-commerce sites, managing online banking, accessing health services, or logging in to social networks, your phone number is the…
Social Engineering Identified as Catalyst for M&S Ransomware Breach
Marks & Spencer (M&S), one of the largest and most established retailers in the United Kingdom, has confirmed that a highly targeted social engineering operation triggered the ransomware attack in April 2025. This breach, which is associated with DragonForce…
Millions of Resumes Exposed Online Due to Unsecured Hiring Platform
A major data exposure has come to light after cybersecurity experts discovered an unsecured online storage system containing nearly 26 million documents, many of which appear to be resumes of job seekers in the United States. The exposed files…
Attackers Exploit Compromised Shellter Red Team Tool to Deploy Infostealers
Shellter Project, which makes a commercial AV/EDR evasion loader for penetration testing, admitted that hackers exploited its Shellter Elite product in assaults after a client leaked a copy of the software. The exploitation has been ongoing for several months,…
AI and the Rise of Service-as-a-Service: Why Products Are Becoming Invisible
The software world is undergoing a fundamental shift. Thanks to AI, product development has become faster, easier, and more scalable than ever before. Tools like Cursor and Lovable—along with countless “co-pilot” clones—have turned coding into prompt engineering, dramatically reducing…
Google Gemini Bug Exploits Summaries for Phishing Scams
False AI summaries leading to phishing attacks Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links. Google…
Telefónica Investigates Claims of Major Data Breach by Cybercriminal
An investigation has been conducted into a significant cybersecurity incident that occurred in 2025 at Telefónica, a global telecommunications company serving millions across Europe and Latin America. In addition to allegedly obtaining a considerable cache of confidential corporate data…
Here’s Why Cyber Security is Critical For Healthcare Sector
Healthcare organisations provide an essential service that, if disrupted by a cyber attack, could jeopardise patient safety, disrupt care delivery, and even result in death. In the case of a security incident, the implications could impact not only the…
Can AI Be Trusted With Sensitive Business Data?
As artificial intelligence becomes more common in businesses, from retail to finance to technology— it’s helping teams make faster decisions. But behind these smart predictions is a growing problem: how do you make sure employees only see what they’re…
Weak Passwords Still Common in Education Sector, Says NordVPN Report
A new study by NordVPN has revealed a serious cybersecurity issue plaguing the education sector: widespread reliance on weak and easily guessable passwords. Universities, schools, and training centres continue to be highly vulnerable due to the reuse of simple…
NVIDIA Urges Users to Enable ECC to Defend GDDR6 GPUs Against Rowhammer Threats
NVIDIA has issued a renewed advisory encouraging customers to activate System Level Error-Correcting Code (ECC) protections to defend against Rowhammer attacks targeting GPUs equipped with GDDR6 memory. This heightened warning follows recent research from the University of Toronto demonstrating…
Latest Malware “Mamona” Attacks Locally, Hides by Self Deletion
Cybersecurity experts are tracing Mamona, a new ransomware strain that is famous for its stripped-down build and silent local execution. Experts believe that the ransomware prevents the usual command-and-control (C2) servers, choosing instead a self-contained method that moves past tools…
Ingram Micro Faces Major Outage Following Ransomware Incident
An assault on Ingram Micro’s global network started on July 3, which crippled parts of the company’s global network as well as disrupted its ordering portals and customer service channels. Ingram Micro is currently restoring critical systems. It became…
CISA Lists Citrix Bleed 2 as Exploit, Gives One Day Deadline to Patch
CISA confirms bug exploit The US Cybersecurity & Infrastructure Security Agency (CISA) confirms active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777 in Citrix NetScaler ADC and Gateway. It has given federal parties one day to patch the bugs. This unrealistic…
Is Your Bank Login at Risk? How Chatbots May Be Guiding Users to Phishing Scams
Cybersecurity researchers have uncovered a troubling risk tied to how popular AI chatbots answer basic questions. When asked where to log in to well-known websites, some of these tools may unintentionally direct users to the wrong places, putting their…