Google is taking another major step toward a safer web experience. Starting October 2025, Google Chrome will begin displaying clearer and more prominent warnings when users access public websites that do not use HTTPS encryption. The move is part…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Hackers Exploit AI Stack in Windows to Deploy Malware
The artificial intelligence (AI) stack built into Windows can act as a channel for malware transmission, a recent study has demonstrated. Using AI in malware Security researcher hxr1 discovered a far more conventional method of weaponizing rampant AI in a…
WhatsApp’s “We See You” Post Sparks Privacy Panic Among Users
WhatsApp found itself in an unexpected storm this week after a lighthearted social media post went terribly wrong. The Meta-owned messaging platform, known for emphasizing privacy and end-to-end encryption, sparked alarm when it posted a playful message on X…
Ernst & Young Exposes 4TB Database Backup Online, Leaking Company Secrets
Ernst & Young (EY), one of the world’s largest accounting firms, reportedly left a massive 4TB SQL database backup exposed online, containing highly sensitive company secrets and credentials accessible to anyone who knew where to find it. The backup,…
Cybersecurity Alert as PolarEdge Botnet Hijacks 25,000 IoT Systems Globally
Researchers at Censys have found that PolarEdge is rapidly expanding throughout the world, in an alarming sign that connected technology is becoming increasingly weaponised. PolarEdge is an advanced botnet orchestrating large-scale attacks against Internet of Things (IoT) and edge…
Herodotus Trojan Mimics Human Typing to Steal Banking Credentials
A newly discovered Android malware, Herodotus, is alarming cybersecurity experts due to its unique ability to imitate human typing. This advanced technique allows the malware to avoid fraud detection systems and secretly steal sensitive financial information from unsuspecting users.…
Chinese Hackers Attack Prominent U.S Organizations
Chinese cyber-espionage groups attacked U.S organizations with links to international agencies. This has now become a problem for the U.S, as state-actors from China keep attacking. Attackers were trying to build a steady presence inside the target network. Series of…
Afghans Report Killings After British Ministry of Defence Data Leak
Dozens of Afghans whose personal information was exposed in a British Ministry of Defence (MoD) data breach have reported that their relatives or colleagues were killed because of the leak, according to new research submitted to a UK parliamentary…
Privacy Laws Struggle to Keep Up with Meta’s ‘Luxury Surveillance’ Glasses
Meta’s newest smart glasses have reignited concerns about privacy, as many believe the company is inching toward a world where constant surveillance becomes ordinary. Introduced at Meta’s recent Connect event, the glasses reflect the kind of future that science fiction…
Sweden Confirms Power Grid Breach Amid Growing Ransomware Concerns
Swedish power grid operator, Suderland, has confirmed it is investigating a security incident related to a potential ransomware attack aimed at decrypting sensitive data as part of its ongoing cybersecurity investigation, a revelation that has stirred alarm across Europe’s…
Tech Giants Pour Billions Into AI Race for Market Dominance
Tech giants are intensifying their investments in artificial intelligence, fueling an industry boom that has driven stock markets to unprecedented heights. Fresh earnings reports from Meta, Alphabet, and Microsoft underscore the immense sums being poured into AI infrastructure—from data…
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
Cybersecurity researchers have recently discovered a new malware platform known as Atroposia, which is being promoted on dark web forums as a subscription-based hacking toolkit. The platform offers cybercriminals a remote access trojan (RAT) that can secretly control computers,…
Multi-Crore Fake GST Registration Racket Busted Across 23 States
A sophisticated fake GST registration racket operating across 23 Indian states has resulted in a multi-crore tax evasion scam, exploiting weaknesses in the Goods and Services Tax (GST) system to generate fraudulent input tax credit (ITC) and evade government…
Delhi Airport Hit by Rare GPS Spoofing Attacks Causing Flight Delays and Diversions
Delhi’s Indira Gandhi International Airport witnessed an unusual series of GPS spoofing incidents this week, where fake satellite signals were transmitted to mislead aircraft about their real positions. These rare cyber disruptions, more common in conflict zones or near…
Video Game Studios Exploit Legal Rights of Children
A study revealed that video game studios are openly ignoring legal systems and abusing the data information and privacy of the children who play these videogames. Videogame developers discarding legal rights of children Researchers found that highly opaque frameworks of…
AIjacking Threat Exposed: How Hackers Hijacked Microsoft’s Copilot Agent Without a Single Click
Imagine this — a customer service AI agent receives an email and, within seconds, secretly extracts your entire customer database and sends it to a hacker. No clicks, no downloads, no alerts. Security researchers recently showcased this chilling scenario…
Cybercriminals Target Fans Ahead of 2026 FIFA World Cup, Norton Warns
Cybercriminals Target Fans Ahead of 2026 FIFA World Cup, Norton Warns With the 2026 FIFA World Cup still months away, cybersecurity experts are already warning fans to stay alert as fraudsters begin exploiting the global excitement surrounding the tournament.…
Unsecured Corporate Data Found Freely Accessible Through Simple Searches
An era when artificial intelligence (AI) is rapidly becoming the backbone of modern business innovation is presenting a striking gap between awareness and action in a way that has been largely overlooked. In a recent study conducted by Sapio…
Conduent Healthcare Data Breach Exposes 10.5 Million Patient Records in Massive 2025 Cyber Incident
In what may become the largest healthcare breach of 2025, Conduent Business Solutions LLC disclosed a cyberattack that compromised the data of over 10.5 million patients. The breach, first discovered in January, affected major clients including Blue Cross Blue…
iOS 26 Update Erases Key Forensic Log, Hindering Spyware Detection on iPhones
Researchers have raised concerns that Apple’s latest software release, iOS 26, quietly removes a crucial forensic tool used to detect infections from sophisticated spyware such as Pegasus and Predator. The change affects a system file known as shutdown.log, a…