Opening a project in a code editor is supposed to be routine. In this case, it is enough to trigger a full malware infection. Security researchers have linked an ongoing campaign associated with North Korean actors, tracked as Contagious…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
China-Linked Hackers Exploit Middle East Conflict to Launch Cyberattacks on Qatar
A recent investigation by Check Point Research has uncovered a surge in cyberattacks targeting Qatar, orchestrated by China-linked threat actors such as the Camaro Dragon group. These campaigns are cleverly disguised as breaking news related to escalating tensions in…
AWS Bedrock Security Risks Exposed as Researchers Identify Eight Key Attack Vectors
Unexpectedly, Amazon Web Services’ Bedrock – built for crafting AI-driven apps – is drawing sharper attention from cybersecurity experts. Several exploit routes have emerged, threatening to reveal corporate infrastructure. Although the system smooths links between artificial intelligence models and…
Cybercriminals Misuse Microsoft Azure Monitor Alerts for Phishing Operations
Using trusted enterprise monitoring systems as a tool for credentialing their deception, threat actors have begun to make a subtle but highly effective shift in phishing tradecraft. Through the use of Microsoft Azure Monitor alerting mechanisms, attackers are orchestrating callback…
Microsoft Alerts 29,000 Users Hit by IRS-Themed Phishing Wave
Microsoft is warning of a major IRS‑themed phishing wave that hit 29,000 users in a single day, using tax‑season panic to steal credentials and deploy remote access malware. The campaigns piggyback on the urgency of the U.S. tax season,…
Telus Digital Faces Scrutiny Following Claims of Large-Scale Data Extraction
Canadian outsourcing and digital services firm Telus Digital has confirmed that it experienced a cybersecurity incident after threat actors alleged they had extracted an enormous volume of data, estimated at nearly one petabyte, over a prolonged period of unauthorized…
Global Law Enforcement Disrupts SocksEscort Proxy Network Powered by AVRecon Malware
Federal and regional police units, working alongside independent digital security experts, took down the SocksEscort hacking infrastructure. This setup used hacked gateway gadgets – infected by AVRecon – to route illicit online traffic through hidden channels. A team at…
AiLock Ransomware Hits England Hockey: 129GB Data Breach Under Probe
England Hockey, the national governing body for field hockey in England, is grappling with a serious cybersecurity incident as the ransomware group AiLock claims responsibility for stealing 129GB of sensitive data.The organization, which supports over 800 clubs, 150,000 players,…
Deceptive VPN Websites Become Gateway for Corporate Data Theft
The financial motivation of a threat group tracked by Microsoft as Storm-2561 has been quietly exploiting the familiarity of enterprise VPN ecosystems in a campaign intended to demonstrate how easy it is to weaponize trust in routine IT processes. …
Stryker Hit by Major Cyberattack as Hacktivist Group Claims Wiper Malware Operation
A major cybersecurity breach hit Stryker, the international medical tech company, throwing operations into disarray across continents. Claiming responsibility is a hacktivist faction supportive of Palestine, said to have ties to Iranian networks. Outages spread quickly through digital infrastructure…
AI Actress Tilly Norwood’s Controversial Oscars Music Video Sparks Debate
Tilly Norwood, billed as the world’s first AI-generated actress, has released a new music video titled “Take The Lead” just ahead of the Oscars, promoting AI’s role in entertainment. Created by Particle6 Group’s Xicoia division under CEO Eline van…
Large Scale Data Breach at Conduent Hits 25 Million Users Nationwide
A central component of public service delivery, Conduent is entrusted with the invisible yet indispensable machinery that keeps the system running from healthcare eligibility systems to benefits administration, and occupies a unique position at the intersection of government operations…
Ransomware Attack Hits South Africa’s Land Bank, Hackers Demand Bitcoin Payment
South Africa’s Finance Minister Enoch Godongwana has disclosed that the Land and Agricultural Development Bank of South Africa was targeted in a ransomware incident earlier this year. The cyberattack took place on January 12, according to official confirmation. Details…
China Warns Government Staff Against Using OpenClaw AI Over Data Security Concerns
Recently, Chinese government offices along with public sector firms began advising staff not to add OpenClaw onto official gadgets – sources close to internal discussions say. Security issues are a key reason behind these alerts. As powerful artificial intelligence…
North Korean Hackers Orchestrate Impeccable Multi Million Dollar Crypto Theft
Several highly calculated cloud intrusion campaigns have been linked to a North Korean threat actor identified as UNC4899, demonstrating the growing convergence between cyber espionage and financial crime. Using a sophisticated methodology, the operation appears to have been meticulously…
Fake IT Support on Microsoft Teams Used to Deliver New A0Backdoor Threat
A contemporary cyber campaign has been identified where attackers are using Microsoft Teams to target employees in financial and healthcare organizations, eventually infecting systems with a newly observed malware known as A0Backdoor. Research from BlueVoyant shows that the attackers…
Zombie ZIP Evasion Exposes Antivirus Blind Spot
A recently revealed technique known as Zombie ZIP demonstrates how attackers can embed malware inside fragmented and corrupted archives that can’t be fully scanned by most security solutions. By exploiting the way ZIP headers are processed, it enables malicious payloads to…
HPE Patches Critical Aruba AOS-CX Vulnerabilities Including Authentication Bypass Flaw
Hewlett Packard Enterprise (HPE) has released security updates to address multiple vulnerabilities in its Aruba AOS-CX network operating system, including a critical flaw that could allow attackers to bypass authentication and gain administrative control. AOS-CX comes from Aruba Networks,…
APT28 Deploys Enhanced Version of Covenant in Ongoing Threat Activity
In recent months, the contours of cyber warfare have once again become clearer as APT28 – an agent of Russian intelligence that has operated in Ukraine for a number of years – elicits renewed precision and technological sophistication in…
Termite Ransomware Linked to Velvet Tempest’s ClickFix, CastleRAT Attacks
Cyber threat actors known as Velvet Tempest have been observed deploying sophisticated attacks involving Termite ransomware, utilizing the ClickFix social engineering technique and the CastleRAT backdoor.These intrusions, tracked by MalBeacon researchers, unfolded over 12 days in a simulated U.S.…