New Android malware found Researchers have revealed details of two Android malware strains called SeedSnatcher and FvncBot. Upgraded version of ClayRat was also found in the wild. About the malware FvncBot works as a security app built by mBank and…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
ShadowV2 Botnet Activity Quietly Intensified During AWS Outage
The recently discovered wave of malicious activity has raised fresh concerns for cybersecurity analysts, who claim that ShadowV2 – a fast-evolving strain of malware that is quietly assembling a global network of compromised devices – is quietly causing alarm.…
Researchers Warn of New Js#Smuggler Campaign Delivering Netsupport Rat through Compromised Websites
Cybersecurity researchers have sounded the alarm about a new malware campaign called JS#SMUGGLER, which is using hacked websites to distribute the NetSupport remote access trojan (RAT). Securonix analysed the attack method, describing it as a multi-stage sequence designed to evade…
End to End-to-end Encryption? Google Update Allows Firms to Read Employee Texts
Your organization can now read your texts Microsoft stirred controversy when it revealed a Teams update that could tell your organization when you’re not at work. Google did the same. Say goodbye to end-to-end encryption. With this new RCS and…
Meta Begins Removing Under-16 Users Ahead of Australia’s New Social Media Ban
Meta has started taking down accounts belonging to Australians under 16 on Instagram, Facebook and Threads, beginning a week before Australia’s new age-restriction law comes into force. The company recently alerted users it believes are between 13 and 15…
Cyberattacks Target Seven Major Indian Airports Through GPS Spoofing
The Indian Ministry of Home Affairs has revealed that seven key airports in the country were hit by GPS spoofing cyber attacks in November 2025, Union Civil Aviation Minister Ram MohanNaidu said. The airports affected are the Indira Gandhi…
AI IDE Security Flaws Exposed: Over 30 Vulnerabilities Highlight Risks in Autonomous Coding Tools
More than 30 security weaknesses in various AI-powered IDEs have recently been uncovered, raising concerns as to how emerging automated development tools might unintentionally expose sensitive data or enable remote code execution. A collective set of vulnerabilities, referred to…
Portugal Updates Cybercrime Law To Protect Good-Faith Security Researchers
Portugal has updated its cybercrime law to offer legal protection to security researchers who probe systems in good faith and report vulnerabilities responsibly. The change creates a legal safe harbor for ethical hacking, turning what was previously classified as…
Palo Alto GlobalProtect Portals Face Spike in Suspicious Login Attempts
Among the developments that have disturbed security teams around the world, threat-intelligence analysts have detected a sudden and unusually coordinated wave of probing of Palo Alto Networks’ GlobalProtect remote access infrastructure. This activity appears to be influenced by the…
Fake RTO e-Challan WhatsApp Scam Resurfaces: Fraudsters Push Spyware Through Malicious APK Files
Cybercriminals have once again revived an old trick—but with a more convincing disguise. This time, scammers are exploiting the name of the official RTO e-challan system to deceive smartphone users. Over the past year, malicious APK files have been…
React2Shell Exploited Within Hours as Firms Rush to Patch
Two hacking groups linked to China have started exploiting a major security flaw in React Server Components (RSC) only hours after the vulnerability became public. The flaw, tracked as CVE-2025-55182 and widely called React2Shell, allows attackers to gain unauthenticated…
Cloudflare Blocks Largest DDoS Attack in History as Global Cyber Threats Surge
Cloudflare announced on Wednesday that it has detected and stopped the largest distributed denial of service (DDoS) attack ever recorded. The attack peaked at 29.7 terabits per second and lasted 69 seconds. The company said the traffic came from a…
Google’s New Update Allows Employers To Archive Texts On Work-Managed Android Phones
A recent Android update has marked a paradigm shifting change in how text messages are handled on employer-controlled devices. This means Google has introduced a feature called Android RCS Archival, which lets organisations capture and store all RCS, SMS,…
NATO Concludes Cyber Coalition Exercise in Estonia, Preparing for Future Digital Threats
NATO has wrapped up its annual Cyber Coalition exercise in Estonia after a week of intensive drills focused on protecting networks and critical infrastructure from advanced cyberattacks. More than 1,300 cyber defenders joined the 2025 exercise. Participants represented 29…
AI-Assisted Cyberattacks Signal a Shift in Modern Threat Strategies and Defense Models
A new wave of cyberattacks is using large language models as an offensive tool, according to recent reporting from Anthropic and Oligo Security. Both groups said hackers used jailbroken LLMs-some capable of writing code and conducting autonomous reasoning-to conduct…
Beer Firm Asahi Not Entertaining Threat Actors After Cyberattack
Asahi denies ransom payment Japanese beer giant Asahi said that it didn’t receive any particular ransom demand from threat actors responsible for an advanced and sophisticated cyberattack that could have exposed the data of more than two million people. About…
Android Users Face New WhatsApp Malware Threat
Cybersecurity researchers at security firm Cleafy have issued a warning regarding a high risk malware campaign aimed at Android users via WhatsApp messages that could jeopardize users’ cryptocurrency wallets and bank information. The researchers tracked the threat as Albiriox, a new…
Growing Concerns Over Wi-Fi Router Surveillance and How to Respond
A new report from security researchers warns that a humble Wi-Fi router has quietly become one of the most vulnerable gateways into home and work in an era where digital dependency is becoming more prevalent each day. Despite being…
How Security Teams Can Turn AI Into a Practical Advantage
Artificial intelligence is now built into many cybersecurity tools, yet its presence is often hidden. Systems that sort alerts, scan emails, highlight unusual activity, or prioritise vulnerabilities rely on machine learning beneath the surface. These features make work faster,…
Critical Vulnerabilities Found in React Server Components and Next.js
Open in the wild flaw The US Cybersecurity and Infrastructure Security Agency (CISA) added a critical security flaw affecting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog after exploitation in the wild. The flaw CVE-2025-55182 (CVSS score:…