Retail is currently at a crossroads where digital transformation has redefined the very fabric of commerce. The industry has become increasingly dependent on digital technology, which has redefined commerce as we know it. As retail once revolved around physical…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
AT&T Wins Legal Challenge While Verizon Faces Privacy Penalties
Major U.S. wireless carriers have faced contrasting legal outcomes in their battles against Federal Communications Commission fines for selling customer location data without consent, creating an uncertain landscape for consumer privacy protection . Background on data selling practices In…
How Six Simple Habits Can Keep Your Computer Safe From Malware
For many, the first encounter with malware comes during student years, often through experiments with “free” software or unprotected internet connections like USB tethering. The result is almost always the same: a badly infected system that needs a complete…
Vendor Data Breaches and Their Business Impact
It is evident in the world of digital trust that the financial and reputational costs of a data breach are reaching staggering new heights as the backbone of global commerce becomes increasingly digitally trusted. There is a recent study,…
Bengaluru Software Engineer Loses Rs 44 Lakh in Fake Stock Trading Scam
Cybercriminals are using increasingly sophisticated tricks to target unsuspecting citizens, and a recent case in Bengaluru highlights just how dangerous these scams can be. A 46-year-old software engineer from Horamavu lost ₹44 lakh after being lured into a fake stock…
ShadowLeak: Zero-Click ChatGPT Flaw Exposes Gmail Data to Silent Theft
A critical zero-click vulnerability known as “ShadowLeak” was recently discovered in OpenAI’s ChatGPT Deep Research agent, exposing users’ sensitive data to stealthy attacks without any interaction required. Uncovered by Radware researchers and disclosed in September 2025, the vulnerability specifically…
Researcher Finds Entra ID Weakness That Could Have Granted Global Admin Access
Two critical weaknesses recently came to light in Microsoft’s Entra ID platform could have given attackers unprecedented control over nearly every Azure cloud customer. The flaws were discovered and reported responsibly, allowing Microsoft to release fixes before attackers were able…
Smart Home Devices Raise Questions on Data Privacy
Your Alexa dims the lights while your Google Nest adjusts the temperature, but this isn’t just convenience—it’s what many call surveillance capitalism with a friendly voice. Behind every “Hey Google” and “Alexa, play…” is an invisible war between tech…
Building Trust Through Secure Financial Dealings
Unlike in the past, where money existed as physical objects rather than electronic data, today’s financial market is about to be transformed into an increasingly digital one. The ability to protect digital financial assets has become a key priority…
OpenAI Patches ChatGPT Gmail Flaw Exploited by Hackers in Deep Research Attacks
OpenAI has fixed a security vulnerability that could have allowed hackers to manipulate ChatGPT into leaking sensitive data from a victim’s Gmail inbox. The flaw, uncovered by cybersecurity company Radware and reported by Bloomberg, involved ChatGPT’s “deep research” feature.…
Teens Arrested Over Scattered Spider’s $115M Hacking Spree
Law enforcement authorities in the United States and United Kingdom have arrested two teenagers connected to the notorious Scattered Spider hacking collective, charging them with executing an extensive cybercrime operation that netted over $115 million in ransom payments. The…
Insight Partners Ransomware Attack Exposes Data of Thousands of Individuals
Insight Partners, a New York-based venture capital and private equity firm, is notifying thousands of individuals that their personal information was compromised in a ransomware attack. The firm initially disclosed the incident in February, confirming that the intrusion stemmed…
Jaguar Land Rover Extends Production Halt After Cybersecurity Breach
Tata Motors-owned luxury carmaker Jaguar Land Rover (JLR) has announced an extended production pause until Wednesday, 1 October 2025, due to the ongoing impact of a cybersecurity attack that disrupted operations earlier this month. “Today we have informed colleagues,…
New York Blood Center Data Breach Exposes Nearly 200,000 Records
The New York Blood Center Enterprises (NYBCe) has reported a major cybersecurity incident that compromised the personal information of nearly 194,000 people. The breach occurred between January 20 and January 26, 2025, when an unauthorized party gained access to…
Chatbots and Children in the Digital Age
The rapid evolution of the digital landscape, especially in the area of social networking, is likely to have an effect on the trend of children and teens seeking companionship through artificial intelligence. This raises some urgent questions about the safety…
BreachForums Founder Resentenced to Three Years After Appeal
In a significant legal outcome for the cybersecurity landscape, Conor Fitzpatrick, the founder of the notorious BreachForums underground hacking site, has been resentenced to three years in federal prison after appeals overturned his previous lenient sentence. Fitzpatrick, who operated…
Rising Online Scams: From Phishing Emails to Fake News Feeds
Cybercriminals are increasingly using sophisticated tactics to target unsuspecting users through phishing emails and fake news stories, security experts warn. Recent examples highlight how hackers exploit urgency, impersonation, and malicious attachments to trick victims into revealing sensitive information or…
DHS Data Sharing Error Left Sensitive Intelligence Open to Thousands
A technology mishap inside the U.S. Department of Homeland Security (DHS) briefly left sensitive intelligence records open to people who were never supposed to see them. The issue, which lasted for several weeks in 2023, involved the Homeland Security…
Digital Twins: Benefits and the Cybersecurity Risks They Bring
Digital twins—virtual digital counterparts of physical objects, people, or processes—are rapidly being adopted by organizations as tools for simulation, testing, and decision-making. The concept traces its roots to NASA’s physical replicas of spacecraft in the 1960s, but today’s digital…
FileFix Attack Uses Fake Meta Suspensions to Spread StealC Malware
A new cyber threat known as the FileFix attack is gaining traction, using deceptive tactics to trick users into downloading malware. According to Acronis, which first identified the campaign, hackers are sending fake Meta account suspension notices to lure…