It has become imperative for learning to utilise digital tools in today’s fast-paced world to maintain the ability to navigate a variety of information sources. Not only are individuals gaining information by using digital tools, but they are also…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
FBI Warns of Hackers Exploiting Salesforce to Steal Corporate Data
The Federal Bureau of Investigation (FBI) has issued a pressing security alert regarding two cybercriminal groups that are breaking into corporate Salesforce systems to steal information and demand ransoms. The groups, tracked as UNC6040 and UNC6395, have been carrying…
North Korean Threat Actors Leverage ChatGPT in Deepfake Identity Scheme
North Korean hackers Kimsuky are using ChatGPT to create convincing deepfake South Korean military identification cards in a troubling instance of how artificial intelligence can be weaponised in state-backed cyber warfare, indicating that artificial intelligence is becoming increasingly useful in…
Two-factor authentication complicates security with privacy risks, unreliability, and permanent lockouts
Two-factor authentication has become the default standard for online security, showing up everywhere from banking portals to productivity tools. Its purpose is clear: even if someone steals your credentials, they still need a second verification step, usually through an…
SIM Cloning and Aadhaar Data Theft Expose Massive Cyber Heist in Amroha
A sophisticated cyber heist in Amroha, Uttar Pradesh, has exposed critical vulnerabilities in India’s Aadhaar biometric identification system, where cybercriminals successfully cloned SIM cards and stole biometric data from over 1,500 citizens across 12 states. This elaborate fraud network,…
Marketing in India Is Getting an AI Upgrade – Here’s How
A transformation is underway in Indian marketing, though it is not being announced with glossy campaigns or loud product launches. Instead, it is taking shape quietly inside dashboards, chatbots, and automation platforms. The driver of this shift is “agentic AI”…
Clarity, Control, And Recovery Define Effective Response To Cyberattacks For IT Teams And MSPs
When a cyberattack strikes, the impact is immediate. Systems slow down, files are locked, phones flood with alerts, and the pressure mounts by the second. The speed and precision of the response often determine whether the situation ends in…
Google plans shift to risk-based security updates for Android phones
The Google Android ecosystem is set to undergo a significant transformation in its security posture, with Google preparing to overhaul the method it utilizes to address software vulnerabilities. Google is aiming to strengthen this. According to reports by Android…
Trump’s ICE Expands Surveillance Tech for Deportation Crackdown
Immigration and Customs Enforcement (ICE) has assembled an extensive digital arsenal to support President Trump’s mass deportation campaign, which has resulted in approximately 350,000 deportations in the first eight months of his administration . The agency utilizes sophisticated surveillance…
WhiteCobra Floods VSCode Market with 24 Crypto-Stealing Extensions
A threat actor named WhiteCobra has infiltrated the Visual Studio Code marketplace and Open VSX registry with 24 malicious extensions targeting developers using VSCode, Cursor, and Windsurf editors . Campaign overview The ongoing campaign represents a sophisticated operation that…
500GB Leak Marks Largest Exposure of Great Firewall’s Internal Operations
There has been a significant breach of one of the world’s most sophisticated censorship systems, the Great Firewall, which is considered one of the most tightly controlled systems. This breach has led to the largest data leak to date…
Villager: AI Software That Makes Hacking Easier
A new penetration testing framework named Villager is drawing international attention for its unusual mix of traditional hacking tools and artificial intelligence. Released in July 2025 through the Python Package Index, the tool has already surpassed 10,000 downloads in…
DevOps data breaches expose Microsoft, Schneider Electric, Mercedes-Benz, and New York Times
Source code forms the backbone of every digital enterprise, and platforms such as GitHub and Atlassian are trusted to safeguard this critical data. Yet, organizations must remember that under the Shared Responsibility Model, users retain accountability for the security…
Chat Control Faces Resistance from VPN Industry Over Privacy Concerns
The European Union is poised at a decisive crossroads when it comes to shaping the future of digital privacy and is rapidly approaching a landmark ruling which will profoundly alter the way citizens communicate online. A final vote on…
RBI Proposes Smartphone Lock Mechanism for EMI Defaults
RBI is considering allowing lenders to remotely lock smartphones purchased on credit when borrowers default on EMIs, aiming to curb bad debt while igniting concerns over consumer rights and digital access harms . What’s proposed Reuters reporting indicates RBI…
Identity governance must extend to physical access in critical infrastructure security
In cybersecurity, much attention is often placed on firewalls, multi-factor authentication, and digital access controls, but in sensitive sectors such as utilities, energy, airports, pharmaceutical plants, and manufacturing, the challenge extends well beyond digital defenses. Physical access plays a…
New VMScape Attack Raises Concerns Over Virtual Machine Security
Researchers have revealed a new attack technique called VMScape that can break the security barriers between virtual machines and the systems that host them. This discovery is substantial because virtualization forms the backbone of today’s cloud computing environment, where multiple…
Court Upholds $46.9 Million Penalty Against Verizon for Sharing Location Data
A U.S. federal appeals court has ruled that Verizon must pay a $46.9 million penalty for unlawfully selling customers’ real-time location information. The decision closes the door on Verizon’s argument that its practices were legal, reinforcing the Federal Communications…
EU Data Act Compliance Deadline Nears With Three Critical Takeaways
A decisive step forward in shaping the future of Europe’s digital economy has been taken by the regulation of harmonised rules for fair access to and use of data, commonly known as the EU Data Act, which has moved…
CLOUD Act Extends US Jurisdiction Over Global Cloud Data Across Microsoft, Google, and Amazon
That Frankfurt data center storing your business files or the Singapore server holding your personal photos may not be as secure from U.S. oversight as you think. If the provider is Microsoft, Amazon, Google, or another U.S.-based tech giant,…