A newly discovered security vulnerability in the widely used mail transfer agent Exim has raised serious concerns among cybersecurity experts, as attackers could exploit the flaw to potentially execute malicious code remotely on vulnerable email servers. According to researchers,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Hackers Exploit Telegram Mini Apps, Distribute Malware and Crypto Scams
Cybersecurity experts found a large-scale fraud campaign that used Telegram’s Mini App feature to launch crypto attacks, mimic famous brands and spread Android malware. FEMITBOT malware Research by CTM360 has dubbed the platform as FEMITBOT, it is based on…
Maryland’s New Grocery Pricing Rules Leave Critics Unconvinced
Despite the increasing acceptance of algorithmic pricing systems in today’s retail ecosystem, Maryland has taken action to establish the first statewide legal ban on grocery pricing that incorporates consumer surveillance data. Upon signing House Bill 895 into law on…
Automated OAuth Abuse by ConsentFix v3 Raises Azure Security Concerns
Researchers discovered that a newly identified phishing framework called ConsentFix v3 is having a direct impact on identity-based attacks in cloud environments after finding its ability to systematically compromise Microsoft Azure accounts using automated OAuth abuse. The latest iteration…
Experts Say ‘Ghost Tapping’ Payment Scams Are Uncommon, But Consumers Should Still Stay Alert
As contactless payment systems become increasingly common at stores, public events, and seasonal markets, cybersecurity and payment security experts are reminding consumers to remain aware of how digital transactions work and to regularly monitor their financial activity. The warning…
AI Deepfake Scam Changes Aadhaar Mobile Without OTP
AI-enabled fraudsters are now using deepfake tools to change Aadhaar details, such as the mobile number linked to an account, without victims noticing, enabling identity theft and loan fraud. In Ahmedabad, cybercrime investigators uncovered a racket that quietly replaced…
AI Chatbot Training Raises Growing Privacy and Data Security Concerns
Most conversations with AI bots carry hidden layers behind simple replies. While offering answers, some firms quietly gather exchanges to refine machine learning models. Personal thoughts, job-related facts, or private topics might slip into data pools shaping tomorrow’s algorithms.…
Workplace Apps May Be Selling Employee Data Without Consent, Study Warns
A growing number of workplace applications are collecting vast amounts of employee data and, in many cases, sharing or selling that information to third-party companies without workers’ knowledge or permission, according to a recent analysis by privacy-focused tech company…
22 Year Old Developer Reverse Engineered Code in Claude Mythos, Tech Industry Shocked
Earlier this year, AI tech giant Anthropic launched its powerful new model called Claude Mythos. It created storms in the silicon valley and tech industry. The general-purpose model could find software bugs that no human knew ever existed. About…
AI Polling Reshapes Political Research as Firms Turn Conversations Into Data
Artificial intelligence is rapidly transforming the world of political opinion polling, replacing time-consuming human-led interviews with automated conversational systems capable of analysing public sentiment at scale. “When you hear the word ‘politician’, what is the first image or emotion…
India’s Cybersecurity Workforce Struggles to Keep Pace as AI and Cloud Systems Expand
India’s fast-growing digital economy is creating an urgent demand for cybersecurity professionals, but companies across the country are finding it increasingly difficult to hire people with the technical expertise required to secure modern systems. A new study released by…
OpenAI Codex Bug Leads to GitHub Token Breach
In March 2026, researchers from BeyondTrust showed that a tailored GitHub branch name was enough to steal Codex’s OAuth token in cleartext. Tech giant OpenAI termed it as “Critical P1”. Soon after, Anthropic’s Claude Code source code leaked into…
Ransomware Attacks Reach All Time High, Leaked Over 2.6 Billion Records
A recent analysis of cybercrime data of last year (2025) disclosed that ransomware victims have risen rapidly by 45% in the previous year. But this is not important, as there exists something more dangerous. The passive dependence on hacked…
Friendly AI Chatbots More Likely to Give Wrong Answers, Study Finds
Artificial intelligence chatbots that are designed to sound warm, friendly, and empathetic may be more likely to give wrong or misleading answers than their more neutral counterparts, according to a new study by researchers at the Oxford Internet Institute…
Spotify Verified Badge Targets AI Music Confusion as Human Artist Authentication Expands
Now appearing beside artist profiles, Spotify’s new “Verified by Spotify” badge uses a green checkmark to highlight real human creators. Only accounts meeting the platform’s internal authenticity checks receive the label. Rather than algorithm-built personas, these profiles represent actual…
Why Europe Is Rethinking Its Dependence on US Cloud Providers
Concerns around digital sovereignty are rapidly becoming one of the most important debates shaping the future of cloud computing, artificial intelligence, and government technology infrastructure across Europe and the UK. The discussion recently gained attention after Chi Onwurah, chair of…
Remote Exploitation Risk Emerges From Ollama Out-of-Bounds Read Flaw
Increasing reliance on large language model infrastructure deployed locally has prompted a renewed focus on self-hosted artificial intelligence platforms’ security posture after researchers revealed a critical vulnerability in Ollama that could lead to remote attackers gaining access to sensitive…
Purple Team Myth Exposed: Why It’s Just Red vs Blue in 2026
Many organizations tout their “purple teams” as the pinnacle of cybersecurity collaboration, blending offensive red team tactics with defensive blue team strategies. However, a critical issue persists: these teams often remain siloed, functioning more like red and blue in…
North Korean Hackers Hack US Crytpo Executives in Just Five Minutes
About Arctic Wolf Cybersecurity experts at Arctic Wolf have disclosed information about an advanced campaign attacking North American Web3 and cryptocurrency organizations. State-sponsored group BlueNoroff launched the attack campaign, it is a financially motivated gang associated with the infamous…
Apricorn Launches 32TB Encrypted Drive to Strengthen Offline Data Security Against Cyber Threats
Security feels stronger when data is scrambled, yet that strength vanishes if login steps or secret codes fall into the wrong hands. Instead of relying on system files tucked inside computers – where sneaky programs like spyware or digital…