Czechia’s National Cyber and Information Security Agency (NÚKIB) has issued a stark warning about rising cyber espionage campaigns linked to China and Russia, urging both government institutions and private companies to strengthen their security measures. The agency classified the…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Panama and Vietnam Governments Suffer Cyber Attacks, Data Leaked
Hackers stole government data from organizations in Panama and Vietnam in multiple cyber attacks that surfaced recently. About the incident According to Vietnam’s state news outlet, the Cyber Emergency Response Team (VNCERT) confirmed reports of a breach targeting the National…
Ransomware Groups Still Exploiting SonicWall Firewall Vulnerability Despite Patch
More than a year after SonicWall released a patch for CVE-2024-40766, a critical vulnerability affecting its next-generation firewalls, attackers linked to the Akira ransomware-as-a-service operation continue to exploit the flaw to breach organizations. Similar to incidents in September 2024…
Why Cybersecurity is Critical for Protecting Spatial Data
In a world where almost every service depends on digital connections, one type of information underpins much of our daily lives: spatial data. This data links activities to a place and time, revealing not just “where” something happens, but also…
Fake eSIM Activation Fraud in India Raises Cybersecurity Concerns
The Indian Cybercrime Coordination Centre (I4C), operating under the Ministry of Home Affairs, has issued a warning about a new and highly sophisticated digital scam that leverages fake eSIM activation to commit financial fraud. Unlike traditional methods of cybercrime…
VoidProxy Phishing Platform Emerges as Threat Capable of Bypassing MFA
Researchers in the field of cybersecurity are warning that a sophisticated phishing-as-a-service (PhaaS) platform known as VoidProxy is being used by criminal groups for the purpose of evading widespread security controls and is demonstrating just how far this technology…
Beyond Firewalls: How U.S. Schools Are Building a Culture of Cyber Safety
U.S. district schools are facing a surge in sophisticated cyberattacks, but districts are pushing back by combining strong fundamentals, people-centered training, state partnerships, and community resilience planning to build cyber safety into everyday culture . Rising threat landscape An…
Hackers Exploit Zero-Day Bug to Install Backdoors and Steal Data
Sitecore bug abused Threat actors exploited a zero-day bug in legacy Sitecore deployments to install WeepSteel spying malware. The bug, tracked as CVE-2025-53690, is a ViewState deserialization flaw caused by the addition of a sample ASP.NET machine key in pre-2017…
Ransomware Group Uses AI Training Threats in Artists & Clients Cyberattack
Cybercriminals behind ransomware attacks are adopting new intimidation methods to push victims into paying up. In a recent case, the LunaLock ransomware gang has escalated tactics by threatening to sell stolen artwork for AI training datasets. The popular platform…
Massive database of 250 million data leaked online for public access
Around a quarter of a billion identity records were left publicly accessible, exposing people located in seven countries- Saudi Arabia, the United Arab Emirates, Canada, Mexico, South Africa, Egypt, and Turkey. According to experts from Cybernews, three misconfigured servers, registered…
Deepfake Video of Sadhguru Used to Defraud Bengaluru Woman of Rs 3.75 Crore
As a striking example of how emerging technologies are used as weapons for deception, a Bengaluru-based woman of 57 was deceived out of Rs 3.75 crore by an AI-generated deepfake video supposedly showing the spiritual leader Sadhguru. The video…
Bridgestone Investigates Cyber Incident Affecting North American Operations
Bridgestone Americas has confirmed it is investigating a cyber incident that disrupted operations at several of its tire manufacturing plants in North America. The company emphasized that its response team contained the issue quickly, limiting the scope of the…
Browser-Based Attacks in 2025: Key Threats Security Teams Must Address
In 2025, the browser has become one of the primary battlefields for cybercriminals. Once considered a simple access point to the internet, it now serves as the main gateway for employees into critical business applications and sensitive data. This…
Ghaziabad eSIM Fraud: Woman Loses ₹18.5 Lakh in Sophisticated SIM Swap Scam
A 54-year-old resident of Shipra Suncity, Indirapuram, Ghaziabad, fell victim to a sophisticated eSIM fraud that resulted in the loss of ₹18.48 lakh from her bank accounts. Arti Kaul was targeted by cybercriminals who posed as Airtel customer service…
Study Reveals 40% of Websites Secretly Track User Keystrokes Before Form Submission
Researchers from UC Davis, Maastricht University, and other institutions have uncovered widespread silent keystroke interception across websites, revealing that many sites collect user typing data before forms are ever submitted. The study examined how third-party scripts capture and share…
Disney to Pay $10 Million Fine in FTC Settlement Over Child Data Collection on YouTube
Disney has agreed to pay millions of dollars in penalties to resolve allegations brought by the Federal Trade Commission (FTC) that it unlawfully collected personal data from young viewers on YouTube without securing parental consent. Federal law under the…
Russia’s Widespread GPS Jamming Raises Concerns for Air and Sea Safety
A recent incident involving the European Commission President’s aircraft has drawn attention to a growing risk in international travel: deliberate interference with satellite navigation systems. The plane, flying into Plovdiv, Bulgaria, temporarily lost its GPS signal due to electronic…
Understanding Passkeys and Their Everyday Use
There has been a longstanding reliance on traditional passwords for digital security; however, these days, more advanced methods of authentication are challenging traditional passwords. As there are billions of compromised login credentials circulating on the dark web, Digital Shadows…
Exabeam Extends Proven Insider Threat Detection to AI Agents with Google Cloud
BROOMFIELD, Colo. & FOSTER CITY, Calif. – September 9, 2025 – At Google Cloud’s pioneering Security Innovation Forum, Exabeam, a global leader in intelligence and automation that powers security operations, today announced the integration of Google Agentspace and Google…
Hackers Target Brazilian Payments Provider in Attempted $130 Million Theft
A concerning cyber incident has shaken Brazil’s financial technology sector after criminals attempted to steal nearly $130 million through the country’s real-time payments network, Pix. The breach was detected on August 29, 2025, when Sinqia S.A., a São Paulo-based…