India’s Ministry of Electronics and Information Technology has proposed new regulations that would make it compulsory for all social media platforms to clearly label artificial intelligence (AI)-generated or “synthetic” content. Under the draft amendment to the Information Technology (Intermediary Guidelines…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Stop Using Public Wi-Fi: Critical Security Risks Explained
Public Wi-Fi networks, commonly found in coffee shops and public spaces, are increasingly used by remote workers and mobile device users seeking internet access outside the home or office. While convenient, these networks pose significant security risks that are…
Ribbon Targeted in Cyber Espionage Campaign by Nation-State Actors
Among the many revelations which illustrate how sophisticated state-backed cyber intrusions are, Ribbon Communications has confirmed that its internal network was compromised by government-backed hackers who kept unauthorised access for almost a year before they were detected, a revelation…
Apple Removes Controversial Dating Apps After Data Leak and Privacy Violations
Apple has removed two dating apps, Tea and TeaOnHer, from the App Store months after a major data breach exposed users’ private information. The removal comes amid continued criticism over the apps’ privacy failures and lack of effective content…
The Threats of Agentic AI Data Trails
What if you install a brand new smart-home assistant that looks surreal, and if it can precool your living room at ease. However, besides the benefits, the system is secretly generating a huge digital trace of personal information? That’s the…
ChatGPT Atlas Surfaces Privacy Debate: How OpenAI’s New Browser Handles Your Data
OpenAI has officially entered the web-browsing market with ChatGPT Atlas, a new browser built on Chromium: the same open-source base that powers Google Chrome. At first glance, Atlas looks and feels almost identical to Chrome or Safari. The key…
Western Sydney University Hit by Major Cyberattack
Western Sydney University has suffered a significant cyberattack, marking the latest in a series of incidents targeting the institution since 2023. Sensitive data belonging to students, staff, and alumni—including tax file numbers, bank account details, passport and driver license…
AWS Apologizes for Massive Outage That Disrupted Major Platforms Worldwide
Amazon Web Services (AWS) has issued an apology to customers following a widespread outage on October 20 that brought down more than a thousand websites and services globally. The disruption affected major platforms including Snapchat, Reddit, Lloyds Bank, Venmo,…
Growing VPN Exploits Trigger Fresh Ransomware Crisis in APAC
Despite the growing cyber risk landscape in Asia-Pacific, ransomware operations continue to tighten their grip on India and the broader region, as threat actors more often seek to exploit network vulnerabilities and target critical sectors in order to get…
New Vidar Variant Uses API Hooking to Steal Data Before Encryption
A recent investigation by Aryaka Threat Research Labs has revealed a new version of the Vidar infostealer that demonstrates how cybercriminals are refining existing malware to make it more discreet and effective. Vidar, which has circulated for years through…
Iran Attacks Israeli Cybersecurity Infrastructure
The National Cyber Directorate found a series of cyberattacks that targeted Israeli organisations that offer IT services to companies in the country, and might be linked to Iran. Earlier this month, the failed cyberattack against Shamir Medical Center on Yom…
TikTok ‘Free Photoshop’ Scam Steals User Data via Malicious Commands
A sophisticated scam targeting TikTok users is exploiting the platform’s reach to steal personal data by promising free access to expensive software like Adobe Photoshop. Cybercriminals are using a social engineering technique called ClickFix to trick victims into executing…
Online Identity Is Evolving: From Data Storage to Proof-Based Verification with zkTLS
The next phase of online identity is shifting from data storage to proof-based verification. Today, the internet already contains much of what verification and compliance teams require — from academic credentials and payment confirmations to loyalty program details. The…
How to Make Zoom Meetings More Secure and Protect Your Privacy
Zoom calls remain an essential part of remote work and digital communication, but despite their convenience, they are not entirely private. Cybercriminals can exploit vulnerabilities to steal sensitive information, intercept conversations, or access meeting data. However, several practical measures…
Proxy Servers: How They Work and What They Actually Do
When browsing online, your device usually connects directly to a website’s server. However, in certain cases, especially for privacy, security, or access control — a proxy server acts as a go-between. It stands between your device and the internet, forwarding…
The Growing Role of Cybersecurity in Protecting Nations
It is becoming increasingly complex and volatile for nations to cope with the threat landscape facing them in an age when the boundaries between the digital and physical worlds are rapidly dissolving. Cyberattacks have evolved from isolated incidents of…
North Korean Hackers Steal Billions Through Crypto Heists and Fake Remote Jobs to Fund Nuclear Program, Report Reveals
North Korean hackers have siphoned off billions of dollars by breaching cryptocurrency exchanges and using false identities to secure remote tech jobs abroad, according to a new international assessment of the country’s cyber operations. The 138-page report, released by…
Analysts Place JLR Hack at Top of UKs Most Costly Cyber Incidents
It has been said by experts that Jaguar Land Rover (JLR) has found itself at the epicentre of the biggest cyber crisis in UK history, an event that has been described as a watershed moment for British industrial resilience.…
FinWise Data Breach Exposes Insider Threats, Highlights Need for Strong Encryption and Key Management
The 2024 FinWise data breach underscores the rising risk of insider threats within financial institutions. Unlike cyberattacks initiated by external hackers, this breach resulted from unauthorized access by a former employee who retained system credentials after leaving the company.…
Cybercrime Gang Busted for Massive Fake Welfare Portal Scam in India
A massive inter-state cybercrime syndicate targeting government welfare schemes in India was busted by police under an operation code-named “Shutterdown,” revealing one of the largest frauds of recent years involving over 36 arrests and millions siphoned off from government…