The Federal Trade Commission has announced a formal inquiry into companies that develop AI companion chatbots, focusing specifically on how these platforms potentially harm children and teenagers. While not currently tied to regulatory action, the investigation seeks to understand…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Where Does Your Personal Data Go When You Ditch a Device?
When people upgrade their phones, laptops, or tablets, the old devices often end up in trade-in programs or at electronic waste collection points. But what happens to the personal information stored on those devices after they leave your hands?…
Massive NPM Supply-Chain Attack Reaches Millions, Nets Hackers Less Than $1,000
The largest supply-chain attack in NPM ecosystem history impacted approximately 10% of cloud environments after attackers compromised maintainer Josh Junon’s account through a phishing campaign, yet generated minimal profits for the perpetrators. The attack began when Junon fell victim…
Restaurant Brands International faces cybersecurity flaws as ethical hackers expose data security risks
Restaurant Brands International (RBI), the parent company of Burger King, Tim Hortons, and Popeyes, has come under scrutiny after two ethical hackers uncovered major cybersecurity flaws across its digital systems. The researchers, known by their handles BobDaHacker and BobTheShoplifter,…
South Korea Intensifies Crackdown with Return of Casino Crime Suspects
A sweeping move which underscores both the scale of organised gambling operations in Asia as well as the increasing threat of cross-border crime is South Korean authorities dismantling an illicit casino network that funnelled the equivalent of KRW 44…
U.S. Sanctions Cybercrime Networks Behind $10 Billion in Fraud
The United States Treasury has announced sweeping sanctions against criminal groups accused of running large-scale online scams that cost Americans more than $10 billion last year. The targeted networks, mainly operating out of Myanmar and Cambodia, are accused not…
Cybercriminals Hide Malware in Trusted Tools and File Formats, HP Wolf Security Warns
Attackers are increasingly disguising malicious activity inside everyday business tools and file formats that employees and IT teams typically trust. According to the latest HP Wolf Security Threat Insights Report (Q2 2025), threat actors are refining their strategies to…
Clorox Blames $380M Breach on Service Desk Social Engineering, Sues Cognizant
In August 2023, the Scattered Spider group orchestrated a devastating social engineering attack against Clorox that resulted in approximately $380 million in damages, demonstrating how a simple phone call can lead to catastrophic business disruption . Modus operandi The…
Blackpool Credit Union Cyberattack Exposes Customer Data in Cork
A Cork-based credit union has issued a warning to its customers after a recent cyberattack exposed sensitive personal information. Blackpool Credit Union confirmed that the breach occurred late last month and subsequently notified members through a formal letter. Investigators…
Sensitive Intelligence Exposed in DHS Data Hub Security Lapse
There has been a serious concern about the integrity of federal data security in the wake of a critical vulnerability in a central data hub of the Department of Homeland Security (DHS). This vulnerability is thought to have exposed…
Salesloft Hack Shows How Developer Breaches Can Spread
Salesloft, a popular sales engagement platform, has revealed that a breach of its GitHub environment earlier this year played a key role in a recent wave of data theft attacks targeting Salesforce customers. The company explained that attackers gained…
The Cookie Problem. Should you Accept or Reject?
It is impossible for a user today to surf the internet without cookies, to reject or accept. A pop-up shows in our browser that asks to either “accept all” or “reject all.” In a few cases, a third option allows…
Muzaffarpur Man Loses ₹3.5 Lakh in Remote Access App Bank Fraud
A resident of Muzaffarpur, Bihar fell victim to a sophisticated remote access application scam that resulted in the loss of ₹3.5 lakh from his bank account. The cybercrime incident occurred when the victim was searching online for courier service…
MostereRAT Malware Leverages Evasion Tactics to Foil Defenders
Despite the fact that cybercrime has become increasingly sophisticated over the years, security researchers have uncovered a stealthy phishing campaign in which a powerful malware strain called MostereRAT was deployed. This remote access trojan allows attackers to take full…
GitHub Supply Chain Attack ‘GhostAction’ Exposes Over 3,000 Secrets Across Ecosystems
A newly uncovered supply chain attack on GitHub, named GhostAction, has compromised more than 3,300 secrets across multiple ecosystems, including PyPI, npm, DockerHub, GitHub, Cloudflare, and AWS. The campaign was first identified by GitGuardian researchers, who traced initial signs…
Nx “s1ngularity” Supply Chain Attack Exposes Thousands of Secrets
The recent Nx “s1ngularity” NPM supply chain attack has led to a massive security fallout, exposing thousands of account tokens and repository secrets, according to Wiz researchers. A post-incident analysis revealed that the breach compromised 2,180 accounts and 7,200…
Great Firewall of China Compromised in Historic 600GB Data Exposure
It has been reported that on September 11, 2025, nearly 600 gigabytes of classified materials linked to the Great Firewall of China have emerged online in a breach of China’s closely guarded internet censorship machinery, which is a breach…
Smart Meters: A Growing Target in Data Security
Smart electricity meters, once simple devices for recording household consumption, are now central to modern energy systems. They track usage patterns, support grid balancing, and enable predictive maintenance. But as their role has expanded, so has the volume of…
SVG Phishing Campaign Bypasses Antivirus, Targets Colombian Judiciary
VirusTotal has uncovered a sophisticated phishing campaign that leverages SVG (Scalable Vector Graphics) files to bypass traditional antivirus detection while impersonating Colombia’s judicial system. The campaign was discovered after VirusTotal added SVG support to its AI Code Insight platform,…
Czechia Warns of Chinese Data Transfers and Espionage Risks to Critical Infrastructure
Czechia’s National Cyber and Information Security Agency (NÚKIB) has issued a stark warning about rising cyber espionage campaigns linked to China and Russia, urging both government institutions and private companies to strengthen their security measures. The agency classified the…