Scammers intensify their efforts during the holiday season, exploiting the rush, stress, and increased spending that characterize this time of year. The Federal Bureau of Investigation warns that fraud schemes spike significantly as criminals deploy sophisticated tactics—including AI-generated offers…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
FCC Rules Out Foreign Drone Components to Protect National Networks
A decisive step in federal oversight on unmanned aerial technology has been taken by the United States Federal Communications Commission, in a move that is aimed at escalating federal control over unmanned aerial technology. Specifically, the FCC has prohibited…
Airbus Signals Shift Toward European Sovereign Cloud to Reduce Reliance on US Tech Giants
Airbus, the aerospace manufacturer in Europe is getting ready to depend less on big American technology companies like Google and Microsoft. The company wants to rethink how and where it does its important digital work. Airbus is going to…
Korean Air Confirms Employee Data Leak Linked to Third-Party Breach
Korean Air has confirmed that personal information belonging to thousands of its employees was exposed following a cyber incident at Korean Air Catering and Duty-Free, commonly referred to as KC&D. The company disclosed the issue after receiving notification from…
A Year of Unprecedented Cybersecurity Incidents Redefined Global Risk in 2025
The year 2025 marked a turning point in the global cybersecurity landscape, with the scale, frequency, and impact of attacks surpassing anything seen before. Across governments, enterprises, and critical infrastructure, breaches were no longer isolated technical failures but events…
Ex-Cybersecurity Pros Plead Guilty in $9.5M Ransomware Spree
Former incident responders Ryan Clifford Goldberg and Kevin Tyler Martin have pleaded guilty to participating in a series of ransomware attacks while working at cybersecurity firms tasked with helping organizations recover from such incidents. The case highlights a rare…
Evasive Panda Uses DNS Poisoning to Deploy MgBot Backdoor in Long-Running Espionage Campaign
Security researchers at Kaspersky have uncovered a sophisticated cyber-espionage operation attributed to the China-linked advanced persistent threat (APT) group known as Evasive Panda, also tracked as Daggerfly, Bronze Highland, and StormBamboo. The campaign leveraged DNS poisoning techniques to distribute…
Grubhub Branding Misused to Promote Exponential Crypto Returns
The holiday season is a time when consumer engagement is at its peak and digital transactions are in the ascendant. However, a wave of misleading communication has been plaguing Grubhub’s user community in recent weeks. There has been an…
Facebook Tests Paid Access for Sharing Multiple Links
Facebook is testing a new policy that places restrictions on how many external links certain users can include in their posts. The change, which is currently being trialled on a limited basis, introduces a monthly cap on link sharing…
India Warns on ‘Silent Calls’ as Telecom Firms Roll Out Verified Caller Names to Curb Fraud
India’s telecom authorities have issued a fresh advisory highlighting how ordinary phone calls are increasingly being used as entry points for scams, even as a long-discussed caller identity system begins to take shape as a countermeasure. For many users,…
Karnataka’s Cybercrime Losses Soar as Scam Recoveries Plunge
Recoveries in Karnataka’s cybercrime prosecutions are falling even as authorities ramp up specialized policing capability, reflecting how criminals are changing tactics faster than enforcement can counteract. Data from the State Legislature show that citizens lost ₹5,473.97 crore in 57,733…
Swiss Startup Soverli Introduces a Sovereign OS Layer to Secure Smartphones Beyond Android and iOS
A Swiss cybersecurity startup, Soverli, has introduced a new approach to mobile security that challenges how smartphones are traditionally protected. Instead of relying solely on Android or iOS, the company has developed a fully auditable sovereign operating system layer…
Digital Intrusion at the Heart of UK Diplomacy Verified by Officials
In the wake of the revelation of a serious cybersecurity breach at the Foreign, Commonwealth, and Development Office of the United Kingdom, the integrity of national institutions once again came into the focus of public attention. In October, its systems…
Amazon Says It Has Disrupted GRU-Linked Cyber Operations Targeting Cloud Customers
Amazon has announced that its threat intelligence division has intervened in ongoing cyber operations attributed to hackers associated with Russia’s foreign military intelligence service, the GRU. The activity targeted organizations using Amazon’s cloud infrastructure, with attackers attempting to gain…
Hypervisor Ransomware Attacks Surge as Threat Actors Shift Focus to Virtual Infrastructure
Hypervisors have emerged as a highly important, yet insecure, component in modern infrastructural networks, and attackers have understood this to expand the reach of their ransomware attacks. It has been observed by the security community that the modes of…
UK Report Finds Rising Reliance on AI for Emotional Wellbeing
Artificial intelligence (AI) is being used to make more accurate predictions about the future and its effects on these predictions are being documented in new research from the United Kingdom’s AI Security Institute. These findings reveal an extraordinary evolution…
Microsoft Users Warned as Hackers Use Typosquatting to Steal Login Credentials
Microsoft account holders are being urged to stay vigilant as cybercriminals increasingly target them through a deceptive tactic known as typosquatting. Attackers are registering look-alike websites and email addresses that closely resemble legitimate Microsoft domains, with the goal of…
Cellik Android Spyware Exploits Play Store Trust to Steal Data
Recently found in the Android platform, remote access trojan named Cellik has been recognized as a serious mobile threat, using the Google Play integration feature to mask itself within legitimate applications to evade detection by security solutions. Cellik is…
FCC Tightens Rules on Foreign-Made Drones to Address U.S. Security Risks
The U.S. Federal Communications Commission has introduced new restrictions targeting drones and essential drone-related equipment manufactured outside the United States, citing concerns that such technology could pose serious national security and public safety risks. Under this decision, the FCC has…
700Credit Data Breach Exposes Personal Information of Over 5.6 Million Consumers
A massive breach at the credit reporting firm 700Credit has led to the leakage of private details of over 5.6 million people, throwing a new set of concerns on the risk of third-party security in the financial services value…