A ransomware attack is an organization’s worst nightmare. Not only does it harm the confidentiality of the organizations and their customers, but it also drains money and causes damage to the reputation. Defenders have been trying to address this serious…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Whistleblower: Social Security Data of 300 Million Americans at Risk After Agency Mishandling
A whistleblower has alleged that Social Security information belonging to over 300 million Americans was compromised when Department of Government Efficiency (DOGE) personnel uploaded sensitive data to a cloud storage system lacking adequate security oversight. The potentially exposed information…
Over 624,000 Impacted in Major Healthcare Data Breach: SSNs, Financial Data, and Identity Theft Risks
A massive healthcare data breach has exposed the sensitive information of more than 624,000 individuals, putting Social Security numbers, financial details, and account credentials at risk. The breach targeted Healthcare Services Group Inc. (HSGI), a Pennsylvania-based company that manages…
Workiva Confirms Data Breach in Wake of Salesforce Security Incident
A recent cyberattack on Salesforce customers has prompted Workiva to disclose a breach linked to a recent wave of attacks, serving as a reminder of the increasing cybersecurity risks faced by global organisations. Workiva provides financial reporting, compliance, and…
Experts Advise Homeowners on Effective Wi-Fi Protection
Today, in a world where people are increasingly connected, the home wireless network has become an integral part of daily life. It powers everything from remote working to digital banking to entertainment to smart appliances, personal communication, and smart…
Salesloft Integration Breach Exposes Salesforce Customer Data
A recent cyber incident has brought to light how one weak link in software integrations can expose sensitive business information. Salesloft, a sales automation platform, confirmed that attackers exploited its Drift chat integration with Salesforce to steal tokens that…
CISOs fear material losses amid rising cyberattacks
Chief information security officers (CISOs) are worried about the dangers of a cyberattack, and there is an anxiety due to the material losses of data that organizations have suffered in the past year. According to a report by Proofpoint, the…
Google Messages Adds QR Code Verification to Prevent Impersonation Scams
Google is preparing to roll out a new security feature in its Messages app that adds another layer of protection against impersonation scams. The update, now available in beta, introduces a QR code system to verify whether the person…
Spotify Launches In-App Messaging for Private Music, Podcast, and Audiobook Sharing
Spotify has introduced an in-app messaging feature called “Messages,” allowing users to share music, podcasts, and audiobooks directly within the app. This new feature aims to make music sharing easier and more social by keeping conversations about content within…
Malicous npm package exploit crypto wallets
Experts have found a malicious npm package that consists of stealthy features to deploy malicious code into pc apps targeting crypto wallets such as Exodus and Atomic. About the package Termed as “nodejs-smtp,” the package imitates the genuine email library…
Cybersecurity Breach Leads to Major Disruption at Jaguar Land Rover
In a major cybersecurity incident which has caused major disruption to the operations of Jaguar Land Rover, it highlights the growing vulnerability of automakers across the world to cyberattacks, underlining the increasing need to maintain communication channels between automakers…
Google to Confirm Identity of Every Android App Developer
Google announced a new step to make Android apps safer: starting next year, developers who distribute apps to certified Android phones and tablets, even outside Google Play, will need to verify their legal identity. The change ties every app…
Data I/O Ransomware Attack Exposes Vulnerability in Global Electronics Supply Chain
Data I/O, a leading manufacturer specializing in device programming and security provisioning solutions, experienced a major ransomware attack in August 2025 that crippled core operations and raised industry-wide concerns about supply chain vulnerabilities in the technology sector. The attack,…
Malicious Go Package Disguised as SSH Tool Steals Credentials via Telegram
Researchers have uncovered a malicious Go package disguised as an SSH brute-force tool that secretly collects and transmits stolen credentials to an attacker-controlled Telegram bot. The package, named golang-random-ip-ssh-bruteforce, first appeared on June 24, 2022, and was linked to…
Zscaler Confirms Exposure in Salesloft-Linked Data Breach
Zscaler has confirmed that it is among the latest organizations to be impacted by a major supply chain attack exploiting the Salesloft Drift application, which integrates with Salesforce. According to the company, attackers managed to steal OAuth tokens tied…
Beware of SIM swapping attacks, your phone is at risk
In today’s digital world, most of our digital life is connected to our phone numbers, so keeping them safe becomes a necessity. Sad news: hackers don’t need your phone to access your number. What is SIM swapping? Also known as…
Business and IT Leaders Diverge on Cloud and Security Priorities
Enterprises are preparing to expand their cloud investments, even as many remain dissatisfied with the financial returns of recent technology deployments, according to a new report from Unisys. The study, which surveyed 1,000 C-suite and IT executives across eight…
India’s Biggest Cyber Fraud: Businessman Duped of ₹25 Crore Through Fake Trading App
A Kochi-based pharmaceutical company owner has suffered a loss of ₹25 crore in what is being described as the largest single-person cyber fraud case in India. The incident involved a sophisticated online trading scam, executed through a fake trading…
New Forensic System Tracks Ghost Guns Made With 3D Printing Using SIDE
The rapid rise of 3D printing has transformed manufacturing, offering efficient ways to produce tools, spare parts, and even art. But the same technology has also enabled the creation of “ghost guns” — firearms built outside regulated systems and…
Password Managers Face Clickjacking Flaw, Millions of Users at Risk
For years, password managers have been promoted as one of the safest ways to store and manage login details. They keep everything in one place, help generate strong credentials, and protect against weak or reused passwords. But new research has…