A new study warns that cybercriminals are leveraging artificial intelligence (AI) and automation to strike faster and with greater precision, exposing critical weaknesses in Southeast Asia—a region marked by rapid digital growth and interconnected supply chains. The findings urge…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Data Portability and Sovereign Clouds: Building Resilience in a Globalized Landscape
The emergence of sovereign clouds has become increasingly inevitable as organizations face mounting regulatory demands and geopolitical pressures that influence where their data must be stored. Localized cloud environments are gaining importance, ensuring that enterprises keep sensitive information within…
Cyberattack on New York Business Council Exposes Thousands to Risk
The Business Council of New York State (BCNYS), an influential body representing businesses and professional groups, has confirmed that a recent cyberattack compromised the personal information of more than 47,000 people. In a report submitted to the Office of the…
Orange Belgium Hit by Cyberattack Affecting 850,000 Customers
Orange Belgium, a major telecommunications provider and subsidiary of French telecom giant Orange Group, confirmed in August 2025 a significant cyberattack on its IT systems that resulted in unauthorized access to the personal data of approximately 850,000 customers. The…
Hackers Disclose Why They Targeted North Korean Government Hackers
In a stunning development in the history of cybersecurity, independent hackers managed to successfully break into the system of a North Korean government hacker, enabling them to expose the inner workings of one of the country’s most secretive cyber…
The Rise of the “Shadow AI Economy”: Employees Outpace Companies in AI Adoption
Artificial intelligence has become one of the most talked-about technologies in recent years, with billions of dollars poured into projects aimed at transforming workplaces. Yet, a new study by MIT suggests that while official AI programs inside companies are…
VP.NET Launches SGX-Based VPN to Transform Online Privacy
The virtual private network market is filled with countless providers, each promising secure browsing and anonymity. In such a crowded space, VP.NET has emerged with the bold claim of changing how VPNs function altogether. The company says it is…
Microsoft Boosts Digital Trust through Post Quantum Cryptography
A comprehensive roadmap has been unveiled by Microsoft to enable it to future-proof its security infrastructure, marking a decisive step toward securing the company’s products and services with quantum-safe protection by 2033 — two years ahead of the target…
Major Password Managers Leak User Credentials in Unpatched Clickjacking Attacks
Six popular password managers serving tens of millions of users remain vulnerable to unpatched clickjacking flaws that could allow cybercriminals to steal login credentials, two-factor authentication codes, and credit card information. Modus operandi Security researcher Marek Tóth, who presented…
Hackers Trick Users with Fake Captchas to Steal Data
Cybersecurity researchers have uncovered a new technique where attackers use fake Captcha tests to trick people into installing malware called Lumma Stealer. This malicious program is designed to quietly search infected computers for valuable information, such as login credentials,…
Workday Suffers Data Breach in Broader Salesforce Campaign
Workday, a major player in the human resources sector, has disclosed a recent data breach caused by a social engineering attack targeting a third-party customer relationship management (CRM) system—specifically, a Salesforce instance. Although Workday, headquartered in Pleasanton, California, provides…
Texas Attorney General Probes Meta AI Studio and Character.AI Over Child Data and Health Claims
Texas Attorney General Ken Paxton has opened an investigation into Meta AI Studio and Character.AI over concerns that their AI chatbots may present themselves as health or therapeutic tools while potentially misusing data collected from underage users. Paxton argued…
PayPal Password Leak Puts Millions of Users on High Alert
It has been reported that millions of PayPal accounts have been traded on underground forums, which has raised a new wave of alarm in the ever-evolving landscape of cybercrime. Using the moniker “Chucky_BF”, a hacker announcing the availability of…
Fake Telegram Premium Website Spreads Lumma Stealer Malware
Cybersecurity researchers have uncovered a malicious campaign that uses a fraudulent Telegram Premium website to distribute a dangerous variant of the Lumma Stealer malware. According to a report by Cyfirma, the fake domain telegrampremium[.]app closely imitates the official Telegram…
Federal Judge Allows Amazon Alexa Users’ Privacy Lawsuit to Proceed Nationwide
A federal judge in Seattle has ruled that Amazon must face a nationwide lawsuit involving tens of millions of Alexa users. The case alleges that the company improperly recorded and stored private conversations without user consent. U.S. District Judge…
FBI Warns of Rising Online Threats Targeting Youth and Digital Assets
The Federal Bureau of Investigation (FBI) has raised concern over what it describes as a fast-expanding online threat, warning that criminal groups are becoming more organized and dangerous in cyberspace. The activity includes ransomware, phishing scams, cryptocurrency theft, and even…
New Gmail Phishing Attack Exploits Login Flow to Steal Credentials
Despite today’s technologically advanced society, where convenience and connectivity are the norms, cyber threats continue to evolve at an alarming rate, making it extremely dangerous to live in. It has recently been reported that phishing attacks and online scams…
Pakistani Cybercriminals Turn Piracy Against Pirates in $4M Malware Scheme
A massive cybercrime operation based in Pakistan has been exposed after running a sophisticated infostealer malware campaign for five years, generating over $4 million by targeting software pirates. Operation details The criminal network, primarily operating from Bahawalpur and Faisalabad,…
New Phishing Scam Uses Japanese Character to Perfectly Mimic Legitimate URLs
Cybersecurity researchers have recently flagged a highly sophisticated phishing campaign that leverages a unique tactic: the use of the Japanese hiragana character “ん” to mimic the appearance of a forward slash (“/”) in website URLs. This technique is especially…
Canada’s Parliament Probes Data Breach Linked to Microsoft Flaws
Canada’s House of Commons has launched an investigation after a cyberattack potentially exposed sensitive staff data, raising questions about whether recently discovered Microsoft vulnerabilities played a role. According to national media reports, an internal email to parliamentary employees revealed…
Connex Credit Union Confirms Data Breach Impacting 172,000 Customers
Connex Credit Union, headquartered in North Haven, Connecticut, recently revealed that a data breach may have affected around 172,000 of its members. The compromised data includes names, account numbers, debit card information, Social Security numbers, and government identification used…
VPN Downloads Surge Across the UK as Online Safety Act Triggers Strict Age Verification
Virtual Private Network (VPN) usage has skyrocketed across the UK since the Online Safety Act officially came into force on July 25, 2025. The new legislation mandates that websites, streaming services, and mobile apps hosting adult content implement robust…
Cybercriminals Steal Thousands of Guest ID Documents from Italian Hotels
Thousands of travellers have been left vulnerable to cyberattacks caused by hotel systems that have been breached by a sweeping cyberattack. Identities that have been stolen from hotel systems are now circulating on underground forums. According to the government’s…
Think Twice Before Uploading Personal Photos to AI Chatbots
Artificial intelligence chatbots are increasingly being used for fun, from generating quirky captions to transforming personal photos into cartoon characters. While the appeal of uploading images to see creative outputs is undeniable, the risks tied to sharing private photos…
UnitedHealth Cyberattack Becomes Largest Health Data Breach in History
The recent cyberattack on UnitedHealth has now been confirmed as the biggest health care data breach ever recorded, affecting more than 192 million people, over one-third of the U.S. population. When news of the incident first broke in 2023,…
NIST Issues Lightweight Cryptography Standard to Secure Small Devices
A new lightweight cryptography standard has been finalized by the National Institute of Standards and Technology (NIST), aiming to enhance the security of billions of connected devices worldwide. It is intended to provide protection for small, resource-constrained technologies that…
Crypto24 ransomware uses custom “EDR-blinding” tool to hit high-value targets
A threat group tracked as Crypto24 is attacking large organizations across the U.S., Europe, and Asia, aiming at finance, manufacturing, entertainment, and technology firms. First discussed publicly on security forums in September 2024, the group has since shown mature tradecraft,…
FreeVPN.One Extension Turns from Privacy Tool to Surveillance Threat
Security researchers at Koi Security have discovered troubling behavior from FreeVPN.One, a popular Chrome VPN extension with over 100,000 installations that has begun secretly capturing and transmitting users’ screenshots to remote servers. Threat discovery The extension, which had maintained…
Ransom Payouts Hit Record Levels Amid Social Engineering and Data Exfiltration Attacks
Ransomware payouts surged to unprecedented levels in the second quarter of 2025, driven largely by the rise of highly targeted social engineering schemes. According to new data from Coveware by Veeam, the average ransom payment skyrocketed to $1.13 million,…
Scammers Can Pinpoint Your Exact Location With a Single Click Warns Hacker
With the advent of the digital age, crime has steadily migrated from dark alleys to cyberspace, creating an entirely new type of criminal enterprise that thrives on technology. The adage that “crime doesn’t pay” once seemed so absurd to…
Orange Belgium Data Breach Exposes 850K Users to SIM-Swapping Risks
Orange Belgium has suffered a major data breach in which an attacker accessed the personal information of approximately 850,000 customers, with SIM card numbers and Personal Unblocking Key (PUK) codes among the most sensitive details exposed. The breach, disclosed…
Here’s How ‘AI Poisoning’ Tools Are Sabotaging Data-Hungry Bots
The internet has evolved from a platform mainly used by people for social sharing to one dominated by automated bots, especially those powered by AI. Bots now generate most web traffic, with over half of this stemming from malicious…
Telegram Blocks Black Mirror Hacker Group and Data Leak Channels
Telegram has stepped up its efforts to curb the spread of sensitive information by blocking several channels accused of leaking private data, with the high-profile Black Mirror hacker group being among the most prominent targets. The platform accused Black…
Hackers Steal Medical Data of Nearly Half a Million Women in the Netherlands
Almost 500,000 women in the Netherlands have had their medical information stolen after hackers breached a clinical laboratory responsible for analyzing cervical cancer screening tests. The stolen records, dating from 2022 until now, include names, addresses, dates of birth, social…
Europol Cracks Down on Major Cocaine Trafficking and Money Laundering Network Linked to Sky ECC
Europol has carried out a large-scale operation against a notorious organized crime syndicate involved in cocaine trafficking and money laundering. The coordinated raids led to the arrest of 10 individuals, the seizure of an entire tourist hotel, several real…
Brokers Fuel Underground Market for Bank Accounts in India
An undercover investigation of India’s financial ecosystem has revealed that a troubling black market is quietly emerging – a market where bank accounts are traded just as casually as consumer goods. Undercover investigations have revealed that there is a…
Elastic Denies Serious Security Flaw in Its Defend Software
Elastic, the company known for its enterprise search and security products, has pushed back against recent claims of a serious vulnerability in its Defend endpoint detection and response (EDR) tool. The controversy began after a small cybersecurity group, AshES…
Native Phishing Emerges as a New Microsoft 365 Threat Vector
A recent cybersecurity threat report highlights a tactic known as “native phishing,” where attackers exploit the trusted, built-in features of Microsoft 365 to launch attacks from within an organization. This method moves beyond traditional phishing emails with malicious attachments,…
AI Agents and the Rise of the One-Person Unicorn
Building a unicorn has been synonymous for decades with the use of a large team of highly skilled professionals, years of trial and error, and significant investments in venture capital. That is the path to building a unicorn, which…
Manpower Data Breach Hits 145,000 After RansomHub Ransomware Attack
Manpower, one of the world’s largest staffing and recruitment companies, has confirmed that nearly 145,000 individuals had their personal data compromised following a ransomware attack in late December 2024. The company, which operates as part of ManpowerGroup alongside Experis…
Allianz Data Breach Exposes 1.4 Million Customers — What You Should Do
Nearly 1.4 million people in the United States have had their personal information exposed in a recent cyberattack on the Allianz Life Insurance Company of North America. The breach, which took place on July 16, was carried out through…
RomCom Hackers Exploit WinRAR Zero-Day CVE-2025-8088 in Cyberattacks, ESET Confirms
Cybersecurity researchers have uncovered that the Russian hacking group RomCom exploited a previously unknown flaw in WinRAR, tracked as CVE-2025-8088, in a series of zero-day attacks. The vulnerability was identified as a path traversal bug that enabled attackers to…
Facial Recognition’s False Promise: More Sham Than Security
Despite the rapid integration of facial recognition technology (FRT) into daily life, its effectiveness is often overstated, creating a misleading picture of its true capabilities. While developers frequently tout accuracy rates as high as 99.95%, these figures are typically…
Over a Million Healthcare Devices Hit by Cyberattack
Despite the swell of cyberattacks changing the global threat landscape, Indian healthcare has become one of the most vulnerable targets as a result of these cyberattacks. There are currently 8,614 cyberattacks per week on healthcare institutions in the country,…
Profero Cracks DarkBit Ransomware Encryption After Israel-Iran Cyberattack Links
Cybersecurity company Profero managed to break the encryption scheme used by the DarkBit ransomware group, allowing victims to restore their systems without having to pay a ransom. This achievement came during a 2023 incident response investigation, when Profero was…
University of Western Australia Hit by Cybersecurity Breach
The University of Western Australia (UWA) has confirmed a concerning cybersecurity incident that left thousands of staff, students, and visitors temporarily locked out of their accounts after hackers gained access to password data. The breach was detected late Saturday,…
Gemini Flaw Exposed Via Malicious Google Calendar Invites, Researchers Find
Google recently fixed a critical vulnerability in its Gemini AI assistant, which is tightly integrated with Android, Google Workspace, Gmail, Calendar, and Google Home. The flaw allowed attackers to exploit Gemini via creatively crafted Google Calendar invites, using indirect…
Israel and Iran Cyber War Escalates After June Conflict Despite Ceasefire
The long-running cyber conflict between Israel and Iran has intensified following the June war, according to a recent report by the Financial Times. Israeli officials disclosed that they began receiving suspicious text messages containing malicious links soon after the…
Why Hackers Focus on Certain Smart Home Devices and How to Safeguard Them
In an era where convenience is the hallmark of modern living, smart devices have become a large part of households around the world, offering a range of advantages from voice-activated assistants to connected cameras and appliances. These technologies promise…
Peter Burke Unveils Generative AI-Powered Autonomous Drone Software, Redefining Robotics
In a major leap for artificial intelligence and robotics, computer scientist Peter Burke has introduced a project that uses generative AI to build autonomous drone software. Far from being a routine technical experiment, this initiative marks a pivotal shift…
Hackers Are Spreading Malware Through SVG Images on Facebook
The growing trend of age checks on websites has pushed many people to look for alternative platforms that seem less restricted. But this shift has created an opportunity for cybercriminals, who are now hiding harmful software inside image files that…
How Scammers Use Deepfakes in Financial Fraud and Ways to Stay Protected
Deepfake technology, developed through artificial intelligence, has advanced to the point where it can convincingly replicate human voices, facial expressions, and subtle movements. While once regarded as a novelty for entertainment or social media, it has now become a…
Taiwanese Web Hosting Infrastructure Hit by UAT-7237
A recent report from Cisco Talos exposes a cyber intrusion by a suspected Chinese-government-backed hacking collective, tracked as UAT-7237, into a Taiwanese web hosting provider. The attackers aimed to steal credentials and implant backdoors, enabling persistent and covert access…
Microsoft Flaw Blamed as Hackers Breach Canada’s House of Commons
In a recent security incident involving Canada’s parliamentary network, hackers exploited a recently released Microsoft vulnerability to breach the House of Commons network, shaking up the country’s parliament. According to an internal e-mail obtained by CBC News, the intrusion…
‘Samourai’ Cryptomixer Founders Admit to Money Laundering Charges
Two executives behind a cryptocurrency service called Samourai Wallet have admitted in court that they helped criminals hide more than $200 million. Keonne Rodriguez, the company’s CEO, and William Lonergan Hill, its chief technology officer, pleaded guilty to conspiracy…
Hackers Bypassed Microsoft Defender to Deploy Ransomware on PCs
GuidePoint Security’s latest report reveals a sophisticated Akira ransomware campaign exploiting SonicWall VPNs through the strategic use of malicious Windows drivers. The campaign, which began in late July 2025, represents a significant escalation in the group’s tactics for evading…
Leaked Data Exposes Daily Lives of North Korean IT Workers in Remote Work Scams
A recent data leak has shed rare light on the hidden world of North Korean IT workers who carry out remote work scams worldwide. The revelations not only expose the highly organized operations of these state-sponsored workers but also…
Indian Government Flag Security Concerns with WhatsApp Web on Work PCs
The Indian government has issued a significant cybersecurity advisory urging citizens to avoid using WhatsApp Web on office computers and laptops, highlighting serious privacy and security risks that could expose personal information to employers and cybercriminals. The Ministry of…
Airline suffers data breach, customer information stolen
Air France and KLM announced that threat actors had compromised a customer service platform and stolen customer data. Along with Transavia, KLM and Air France are units of Air France-KLM Group, a Dutch-French multinational airline holding organization. Established in 2004,…
US Lawmakers Raise Concerns Over AI Airline Ticket Pricing Practices
Airline controversies often make headlines, and recent weeks have seen no shortage of them. Southwest Airlines faced passenger backlash after a leaked survey hinted at possible changes to its Rapid Rewards program. Delta Air Lines also reduced its Canadian…
Croatia’s Largest Research Institute Hit by Ransomware in Global ToolShell Exploits
The Ruđer Bošković Institute (RBI) in Zagreb — Croatia’s biggest science and technology research center has confirmed it was one of thousands of organizations worldwide targeted in a massive cyberattack exploiting Microsoft SharePoint’s “ToolShell” security flaws. The incident occurred on…
Pro-Russian Hackers Breach Norwegian Dam Systems
The Norwegian authorities have confirmed, in a development that illustrates the escalation of cyber threats on Europe’s critical infrastructure, that pro-Russian hackers sabotaged a dam in April, affecting water flow for a short period of time. A remote control…
UK Police’s Passport Photo Searches Spark Privacy Row Amid Facial Recognition Surge
. Police in the UK have carried out hundreds of facial recognition searches using the national passport photo database — a move campaigners call a “historic breach of the right to privacy,” The Telegraph has reported. Civil liberties groups…
How ChatGPT prompt can allow cybercriminals to steal your Google Drive data
Chatbots and other AI tools have made life easier for threat actors. A recent incident highlighted how ChatGPT can be exploited to obtain API keys and other sensitive data from cloud platforms. Prompt injection attacks leads to cloud access Experts…
New Hacking Tool Lets Ransomware Groups Disable Security Systems
Cybersecurity experts have discovered a new malicious tool designed to shut down computer security programs, allowing hackers to attack systems without being detected. The tool, which appears to be an updated version of an older program called EDRKillShifter, is…
China’s Ministry of State Security Warns of Biometric Data Risks in Crypto Reward Schemes
China’s Ministry of State Security (MSS) has issued a strong warning over the collection of biometric information by foreign companies in exchange for cryptocurrency rewards, describing the practice as a potential danger to both personal privacy and national security.…
KLM Alerts Customers After Data Theft by Fraudsters
On Wednesday, Air France and KLM announced a breach of a customer service platform, compromising the personal data of an undisclosed number of customers. The breach highlights the increasing cybersecurity challenges faced by the aviation industry. Air France–KLM Group, the…
Security Flaws Found in Police and Military Radio Encryption
Cybersecurity experts have uncovered significant flaws in encryption systems used by police and military radios globally, potentially allowing malicious actors to intercept secure communications. Background and context In 2023, Dutch security researchers from Midnight Blue unearthed an intentional backdoor…
Akira ransomware turns off Windows Defender to install malware on Windows devices
Akira ransomware strikes again. This time, it has abused an Intel CPU tuning driver to stop Microsoft Defender in attacks from EDRs and security tools active on target devices. Windows defender turned off for attacks The exploited driver is called…
Nvidia Pushes Back Against Claims of Secret Backdoors in Its Chips
Nvidia has strongly denied accusations from China that its computer chips include secret ways to track users or shut down devices remotely. The company also warned that proposals to add such features, known as backdoors or kill switches would create…
Rising Underwater Mortgages Signal Strain in Florida and Texas Property Markets
A growing number of American homebuyers are turning to adjustable-rate mortgages (ARMs) and temporary buydowns as a way of easing the initial repayment burden when they are faced with persistently high interest rates. This is a new report from…
Venice Film Festival Cyberattack Leaks Personal Data of Accredited Participants
The Venice Film Festival has reportedly been hit by a cyberattack, resulting in the leak of sensitive personal data belonging to accredited attendees. According to The Hollywood Reporter, the breach exposed information including names, email addresses, contact numbers, and…
Tech Giant Google Introduces an Open-Source AI Agent to Automate Coding Activities
Google has launched Gemini CLI GitHub Actions, an open-source AI agent that automates routine coding tasks directly within GitHub repositories. This tool, now in beta and available globally, acts as an AI coding teammate that works both autonomously and…
From Vibes to Ventures: How AI-First Startups Like Giggles Are Redefining the Rules of Entrepreneurship
In January, 18-year-old Justin Jin introduced Giggles — an AI-powered social entertainment app that has already drawn over 120,000 people to its waitlist and generated 150 million impressions. Remarkably, this momentum came without venture capital backing, a marketing budget,…
Cybercriminals Escalate Client-Side Attacks Targeting Mobile Browsers
Cybercriminals are increasingly turning to client-side attacks as a way to bypass traditional server-side defenses, with mobile browsers emerging as a prime target. According to the latest “Client-Side Attack Report Q2 2025” by security researchers c/side, these attacks are…
Experts decoded encryption keys used by DarkBit ransomware gang
Encryption key for Darkbit ransomware Good news for people affected by the DarkBit ransomware: experts from Profero have cracked the encryption process, allowing victims to recover their files for free without paying any ransom. However, the company has not yet…
Quantum Broadens Distribution Reach in Asia-Pacific Region
Quantum Corporation Expands Asia-Pacific Distribution Network to Accelerate Growth Quantum Corporation (NASDAQ: QMCO) announced a strategic expansion of its distribution network across high-growth Asia-Pacific markets including China, India, Taiwan, and the ASEAN region. This initiative reflects the company’s commitment…
Pandora Admits Customer Data Compromised in Security Breach
A major player in the global fashion jewellery market for many years, Pandora has long been positioned as a dominant force in this field as the world’s largest jewellery brand. However, the luxury retailer is now one of a…
Google Confirms Data Breach in Salesforce System Linked to Known Hacking Group
Google has admitted that some of its customer data was stolen after hackers managed to break into one of its Salesforce databases. The company revealed the incident in a blog post on Tuesday, explaining that the affected database stored…
Cloudflare Accuses AI Startup Perplexity of Bypassing Web Blocking Measures
Cloudflare has accused artificial intelligence company Perplexity of using hidden tactics to bypass restrictions designed to stop automated bots from collecting website data. In a statement published Monday, Cloudflare said it had received multiple complaints from its customers claiming…
NZTA Breach Results in Vehicle Theft, User Data Compromise
Data compromise leads to targeted motor theft A privacy breach has leaked the details of 1000 people (estimate) in a Transport firm’s database over the past year. According to the agency, the breach targeted 13 vehicles for theft. The problem…
Millions Face Potential Harm After Experts Uncovered a Vast Network of 5,000+ Fake Pharmacy Sites
Security experts have exposed “PharmaFraud,” a criminal network of more than 5,000 fraudulent online pharmacies. The operation puts millions of consumers at risk by selling unsafe counterfeit medications while also stealing their private data. The fraudulent campaign mimics legitimate…
New York Lawmaker Proposes Bill to Regulate Gait Recognition Surveillance
New York City’s streets are often packed with people rushing to work, running errands, or simply enjoying the day. For many residents, walking is faster than taking the subway or catching a taxi. However, a growing concern is emerging…
Ingram Micro Faces Alleged Breach by SafePay with Ransom Threat
As Ingram Micro is dealing with a widespread outage in its global technology distribution operations that appears to be directly linked to a ransomware attack by the cybercrime group SafePay, the company appears to be experiencing a significant disruption.…
Cyber Incident Response Needs Dynamic Command Structure Instead of Static Guidelines
The SolarWinds cyberattack, which impacted over 18,000 entities, revealed that many organizations respond to breaches with disorganized, makeshift command centers. Kevin Mandia, CEO of Mandiant, recognized the 2020 attack on his own firm as the work of Russia’s SVR,…
Why Companies Keep Ransomware Payments Secret
Companies hiding ransomware payments Ransomware attacks are ugly. For every ransomware attack news story we see in our feed, a different reality hides behind it. Victims secretly pay their attackers. The shadow economy feeds on corporate guilt and regulatory hysteria.…
New Malware Campaign Using Legitimate-Looking Software Targets Users Worldwide
Cybersecurity experts are warning about a new wave of cyberattacks involving PXA Stealer, a sophisticated info-stealing malware now spreading rapidly across multiple countries. Originally detected by Cisco Talos researchers, PXA Stealer, written in Python was initially deployed against government…
South Dakota Researchers Develop Secure IoT-Based Crop Monitoring System
At the 2025 annual meeting of the American Society of Agricultural and Biological Engineers, researchers from South Dakota State University unveiled a groundbreaking system designed to help farmers increase crop yields while reducing costs. This innovative technology combines sensors,…
Research Raises Concerns Over How Apple’s Siri and AI System Handle User Data
Apple’s artificial intelligence platform, Apple Intelligence, is under the spotlight after new cybersecurity research suggested it may collect and send more user data to company servers than its privacy promises appear to indicate. The findings were presented this week…
DeepSeek Under Investigation Leading to App Store Withdrawals
As one of the world’s leading AI players, DeepSeek, a chatbot application developed by the Chinese government, has been a formidable force in the artificial intelligence arena since it emerged in January 2025, launching at the top of the…
German Mobile Insurance Giant Falls After Devastating Ransomware Attack
A cyberattack has brought down one of Germany’s largest phone insurance and repair networks, forcing the once-thriving Einhaus Group into insolvency. The company, which at its peak generated around €70 million in annual revenue and partnered with big names…
Russia launches messenger app “Max” that could replace WhatsApp
Russia is planning to make a “national messenger” as an alternative to social media apps like WhatsApp and Telegram. Max, a messenger app released earlier this year by the tech giant VK and supported by state media campaigns, seems to…
Pi-hole Data Breach Exposes Donor Names and Emails via GiveWP Plugin Vulnerability
Pi-hole, a well-known network-level ad-blocker, has confirmed that a security flaw in the GiveWP WordPress donation plugin exposed donor names and email addresses. Pi-hole functions as a DNS sinkhole, blocking unwanted content before it reaches users’ devices. Originally built…
FBI Alert: Avoid Scanning This QR Code on Your Phone
The FBI has issued a warning about a new scam in which cybercriminals send unsolicited packages containing a QR code to people’s homes, aiming to steal personal and financial information or install malware on their devices. These packages often…
SonicWall VPN Zero-Day Vulnerability Suspected Amid Rising Ransomware Attacks
Virtual Private Networks (VPNs) have recently been in the spotlight due to the U.K.’s Online Safety Act, which requires age verification for adult content websites. While many consumers know VPNs as tools for bypassing geo-restrictions or securing public Wi-Fi…
Cybercrime Group Claims Theft of MailChimp Client Data
The Russian-speaking cybercrime group Everest says it has stolen a large trove of data from email marketing giant Mailchimp, but the company has denied any evidence of a security incident. Everest announced the alleged breach on its dark web…
BlackSuit Ransomware Capabilities Undermined by Targeted Server Takedown
With the help of U.S Immigration and Customs Enforcement’s Homeland Security Investigations (HSI), as well as domestic and international law enforcement agencies, U.S Immigration and Customs Enforcement’s Homeland Security Investigations has dismantled the backbone of the BlackSuit ransomware group,…
Ransomware Attacks Threaten CEOs to Get Results
Ransomware gangs are getting desperate for results. Generally known for encrypting and leaking data on the internet, they have now started blackmailing CEOs with physical violence. CEO’s get physically threatened Cybersecurity experts from Semperis say that over the past year,…
Hackers Breach French Military Systems, Leak 30GB of Classified Data
A hacker group has claimed responsibility for a cyberattack targeting France’s state-owned Naval Group, one of the country’s most important military shipbuilders. The attackers say they have already released 30 gigabytes of information and are threatening to publish more,…
Akira Ransomware Wave Targets SonicWall Firewall Devices
Cybersecurity firms report a late-July surge of Akira ransomware intrusions against SonicWall firewall devices, with evidence pointing to attackers entering via SonicWall SSL VPN connections and rapidly moving to encrypt data shortly after gaining access. While a previously unknown…