Cybersquatting remains a persistent threat in the digital landscape, targeting businesses, individuals, and public figures alike. This deceptive practice involves registering domain names that closely resemble those of legitimate brands or individuals, often with malicious intent. Despite rising awareness…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Here’s Why Websites Are Offering “Ad-Lite” Premium Subscriptions
Some websites allow you to totally remove adverts after subscribing, while others now offer “ad-lite” memberships. However, when you subscribe to ad-supported streaming services, you do not get the best value. Not removing all ads Ads are a significant…
Employee Monitoring Tool Kickidler Targeted in Ransomware Attacks
Cybersecurity researchers have discovered that cybercriminals are misusing a legitimate employee monitoring tool called Kickidler to execute targeted ransomware attacks. Originally developed to help businesses track productivity and ensure compliance, Kickidler offers features like real-time screen monitoring, keystroke logging,…
Cybercriminals Employ Display Fake Login Pages in Your Browser
Cofense Intelligence cybersecurity researchers have discovered a new and increasingly successful technique that attackers are using to deliver credential phishing pages straight to users’ email inboxes. This technique, which first surfaced in mid-2022, makes use of “blob URIs” (binary…
Hackers Resurface with PowerSchool Data, Target Schools Again with New Threats
Hackers behind the 2024 cyberattack on PowerSchool have returned, this time going after individual schools. They’re now threatening to leak private data unless schools pay them ransom. PowerSchool is a major digital platform used in the education sector. It…
How to Check If a Downloaded File Is Safe to Use
It is no longer a secret that downloading software is becoming an integral part of everyday computing in today’s digitally based environment. It is used to enhance productivity, explore new tools, and stay connected to an ever-increasing online world,…
Google to Pay Texas $1.4 Billion For Collecting Personal Data
The state of Texas has declared victory after reaching a $1 billion-plus settlement from Google parent firm Alphabet over charges that it illegally tracked user activity and collected private data. Texas Attorney General Ken Paxton announced the state’s highest…
Child Abuse Detection Efforts Face Setbacks Due to End-to-End Encryption
Technology has advanced dramatically in the last few decades, and data has been exchanged across devices, networks, and borders at a rapid pace. It is imperative to safeguard sensitive information today, as it has never been more important-or more…
India Faces Cyber Onslaught After Operation Sindoor Military Strikes
In the aftermath of India’s military action under Operation Sindoor, Pakistan responded not only with conventional threats but also with a wave of coordinated cyberattacks. While India’s defense systems effectively intercepted aerial threats like drones and missiles, a simultaneous…
This Free Tool Helps You Find Out if Your Personal Information Is Exposed Online
Many people don’t realize how much of their personal data is floating around the internet. Even if you’re careful and don’t use the internet much, your information like name, address, phone number, or email could still be listed on…
Compromised npm Package ‘rand-user-agent’ Used to Spread Remote Access Trojan
A widely-used npm package, rand-user-agent, has fallen victim to a supply chain attack, where cybercriminals injected obfuscated code designed to install a Remote Access Trojan (RAT) on users’ systems. Originally developed to generate randomized user-agent strings—helpful in web scraping,…
FBI Warns Consumers to Replace Outdated Routers Hijacked by TheMoon Malware
The FBI has issued an urgent warning to American consumers and businesses: replace outdated internet routers immediately or risk becoming an unwitting accomplice in cybercrime. According to the agency, cybercriminals are actively targeting “end-of-life” routers—older models that no longer…
LockBit Ransomware Platform Breached Again, Ops Data Leaked
A breach of an administration panel used by the LockBit ransomware outfit resulted in the exposure of information that can be extremely valuable to law enforcement and the cybersecurity community. The breach was discovered on May 7, when a…
Google Now Scans Screenshots to Identify Geographic Locations
With the introduction of a new feature within Google Maps that is already getting mixed reviews from users, this update is already making headlines around the world. Currently available on iPhones, this update allows users to scan screenshots and…
Why Microsoft Says DeepSeek Is Too Dangerous to Use
Microsoft has openly said that its workers are not allowed to use the DeepSeek app. This announcement came from Brad Smith, the company’s Vice Chairman and President, during a recent hearing in the U.S. Senate. He said the decision…
Details of 1.1 Million Job Applicants Leaked by a Major Recruitment Platform
While looking for a new job can be enjoyable, it is surely not fun to lose your personal information in the process. In the meantime, the Cybernews investigation team found an unprotected GCS bucket belonging to the talent pool…
Coordinated Action Targets DDoS-for-Hire Empire with Arrests and Seizures
The Polish authorities have succeeded in dismantling a sophisticated criminal network offering distributed denial-of-service (DDoS) for-hire services to hit the cybercrime infrastructure hard. As the result of a coordinated operation, four people were arrested who were suspected of operating…
Agentic AI Is Reshaping Cybersecurity Careers, Not Replacing Them
Agentic AI took center stage at the 2025 RSA Conference, signaling a major shift in how cybersecurity professionals will work in the near future. No longer a futuristic concept, agentic AI systems—capable of planning, acting, and learning independently—are already…
Windows CLFS Zero-Day Flaw Exploited in Play Ransomware Attacks
In zero-day attacks, the Play ransomware gang exploited a critical Windows Common Log File System flaw to gain SYSTEM access and install malware on infected PCs. The vulnerability, known as CVE-2025-29824, was identified by Microsoft as being exploited in…
Meta Mirage” Phishing Campaign Poses Global Cybersecurity Threat to Businesses
A sophisticated phishing campaign named Meta Mirage is targeting companies using Meta’s Business Suite, according to a new report by cybersecurity experts at CTM360. This global threat is specifically engineered to compromise high-value accounts—including those running paid ads and…
Barclays Introduces New Step-by-Step Model to Tackle Modern Fraud
Banks and shops are facing more advanced types of fraud that mix online tricks with real-world scams. To fight back, experts from Barclays and a security company called Threat Fabric have created a detailed model to understand how these…
One Click Is All It Takes: New Mac Malware Steals Your Data
A growing number of Mac users are being tricked into downloading harmful software through fake verification messages. These scams look like normal human checks, such as Google’s “I’m not a robot” box, but are actually part of a malware…
Audio and Video Chat Recording Could Be Part of Nintendo Switch 2
Audio and Video Chat Recording Could Be Part of Nintendo Switch 2. In an official announcement from Nintendo, a new in-game communication system known as GameChat will be included in the Nintendo Switch 2 console, which is due…
iHeartMedia Cyberattack Exposes Sensitive Data Across Multiple Radio Stations
iHeartMedia, the largest audio media company in the United States, has confirmed a significant data breach following a cyberattack on several of its local radio stations. In official breach notifications sent to affected individuals and state attorney general offices…
Marks & Spencer Cyberattack Fallout May Last Months Amid Growing Threat from Scattered Spider
Marks & Spencer is facing prolonged disruption after falling victim to a large-scale cyberattack. Experts warn that restoring normal operations could take months, highlighting a growing trend of sophisticated breaches targeting major retailers. This incident follows a wave of…
Pakistan’s ‘Dance of the Hillary’ Malware Targets Indians—Here’s How to Safeguard Yourself
In the aftermath of escalating cross-border tensions following the April 22 Pahalgam terror assault, Indian cybersecurity agencies have noticed a worrying shift in strategy: a digital onslaught aimed at civilians. The malware campaign, reportedly linked to Pakistani threat actors,…
Agentic AI and Ransomware: How Autonomous Agents Are Reshaping Cybersecurity Threats
A new generation of artificial intelligence—known as agentic AI—is emerging, and it promises to fundamentally change how technology is used. Unlike generative AI, which mainly responds to prompts, agentic AI operates independently, solving complex problems and making decisions without…
Data Breach Exposes Personal Information of Hundreds of Thousands
Several cybersecurity incidents have recently come to light, revealing the growing vulnerabilities that organisations face when handling large amounts of personal data. A significant data breach has occurred at Kelly & Associates Insurance Group, which operates under the name…
Cyber War Escalates Between Indian and Pakistani Hacktivists After Pahalgam Attack
kAs tensions continue to rise in the wake of the Pahalgam terror attack and India’s subsequent launch of Operation Sindoor, a fierce cyber confrontation has simultaneously unfolded in the digital realm. Hacktivist groups aligned with both India and Pakistan…
Linux Servers Under Attack: Hidden Malware Found in Fake Go Packages
Cybersecurity experts have discovered a new attack that targets Linux systems using fake programming tools. These harmful tools were shared on GitHub, a popular website where developers post and download code. Inside these fake packages was dangerous malware designed…
Worldcoin in Crisis: Indonesia & Kenya Take Action on the Biometric Crypto Project
Worldcoin, the cryptocurrency firm backed by Sam Altman, is experiencing serious legal challenges on multiple fronts. On May 5, 2025, the Kenyan High Court ruled that Worldcoin violated Data Protection Act 2019 restrictions. According to Justice Aburili Roselyn, the…
NordVPN Introduces £5,000 ID Theft Recovery Coverage for UK Users on Ultimate Plan
NordVPN has launched a new identity theft recovery benefit for its UK subscribers, offering up to £5,000 in reimbursement to help users recover from the financial and emotional toll of identity fraud. This latest addition to its cybersecurity toolkit…
Cybercrime Syndicate Escalates Global Threat Levels
During a time when global cybersecurity is experiencing rapid evolution, malicious actors are also employing new methods to accomplish their goals. As part of International Anti-Ransomware Day, leading cybersecurity company KnowBe4 is announcing a critical warning about a looming…
AI Can Now Shop for You: Visa’s Smart Payment Platform
Visa has rolled out a new system that allows artificial intelligence (AI) to not only suggest items to buy but also complete purchases for users. The newly launched platform, called Visa Intelligent Commerce, lets AI assistants shop on your…
Cybersecurity Agencies on High Alert as Attacks Spike After Pahalgam Incident
A rising tension between India and Pakistan has resulted in an intensified digital war, whose hacktivist groups have launched coordinated cyber offensives targeting government systems and critical infrastructure as a result of increasing tensions between the two countries. The attacks,…
SentinelOne EDR Exploit Allows Babuk Ransomware Deployment Through Installer Abuse
A newly discovered exploit has revealed a critical vulnerability in SentinelOne’s endpoint detection and response (EDR) system, allowing cybercriminals to bypass its tamper protection and deploy the Babuk ransomware. The method, identified as a “Bring Your Own Installer” technique,…
Kelly Benefits Data Leak Affects 260,000 People
A Maryland-based outsourced benefits and payroll manager is notifying nine large customers and nearly 264,000 individuals that their private and sensitive data may have been compromised in a December hack. The number of impacted people has increased by eight-fold…
StealC Malware Gets a Major Upgrade, Becomes More Dangerous
A harmful computer virus called StealC has recently been updated. It is now harder to detect and better at stealing personal data from users. This malware has been around for a few years, but its latest version makes it…
Co-op Cyberattack Exposes Member Data in Major Security Breach
Millions of Co-op members are being urged to remain vigilant following a significant cyberattack that led to a temporary shutdown of the retailer’s IT infrastructure. The company confirmed that the breach resulted in unauthorized access to sensitive customer data,…
Threat Analysts Reveal How “Evil AI” is Changing Hacking Dynamics
A new wave of AI tools developed with no ethical restrictions is allowing hackers to detect and exploit software vulnerabilities faster than ever before. As these “evil AI” platforms advance quickly, cybersecurity experts fear that traditional defences will fail…
Cobb County Suffers Alleged Data Breach by Russian Hackers
The recent cyber attacks against local governments have been concerning, with Cobb County in Georgia being targeted in March 2025 by a sophisticated ransomware attack. In an attempt to gain an edge over their competitors, the cybercriminals known as…
New AI System Lets Self-Driving Cars Share Road Experiences Like a Social Network
A new type of artificial intelligence (AI) has been designed to help self-driving cars share useful road data with each other, even if they aren’t connected to the internet. This could make future roads safer and help driverless vehicles…
Multiplatform Malware Campaign Uses PDF Invoices to Deploy Java-Based RAT
A new wave of cyberattacks is sweeping across digital infrastructures globally, leveraging weaponised PDF invoices to infiltrate systems with a sophisticated Java-based Remote Access Trojan (RAT). Security researchers from Fortinet have identified a multi-stage, evasive malware campaign targeting Windows,…
Your Home Address Might be Available Online — Here’s How to Remove It
In today’s hyper-connected world, your address isn’t just a piece of contact info; it’s a data point that companies can sell and exploit. Whenever you move or update your address, that information often gets picked up and distributed by…
EU Fines TikTok $600 Million for Data Transfers to China
Regulators said that the EU has fined TikTok 530 million euros (around $600 million). Chinese tech giant ByteDance owns TikTok, which has been found guilty of illegally sending the private data of EU users to China and lack of compliance…
M&S Hackers Conned IT Help Desk Workers Into Accessing Firm Systems
Hackers who attacked Marks & Spencer and the Co-op duped IT professionals into giving them access to their companies’ networks, according to a report. The “social engineering” attack on the Co-op allowed fraudsters to reset an employee’s password before…
Co-op Hack Triggers Widespread Scam Risk for Consumers
Several cyberattacks on major British retailers including Marks & Spencer, the Co-op Group, and others have been attributed to social engineering, the practice of deceiving internal support teams by impersonating legitimate employees to deceive internal support teams. It has…
Magento Extension Supply Chain Attack Backdoors Hundreds of E-Commerce Sites
A coordinated supply chain attack has compromised between 500 and 1,000 Magento-based e-commerce websites through 21 backdoored extensions, according to new research from cybersecurity firm Sansec. The breach affected sites globally, including the one being operated by a multinational…
Japanese Logistics Firm KWE Faces Ransomware Attack, Causing Service Delays
Kintetsu World Express (KWE), a large logistics and freight company based in Japan, recently experienced a ransomware attack that caused trouble with some of its systems. As a result, certain customers are facing interruptions in service. The company has…
Google to Launch Gemini AI for Children Under 13
Google plans to roll out its Gemini artificial intelligence chatbot next week for children younger than 13 with parent-managed Google accounts, as tech companies vie to attract young users with AI products. Google will launch its Gemini AI chatbot soon…
Global Cybercrime Crackdown Dismantles Major Phishing-as-a-Service Platform ‘LabHost’
In a major international crackdown, a law enforcement operation spearheaded by the London Metropolitan Police and coordinated by Europol has successfully taken down LabHost, one of the most notorious phishing-as-a-service (PhaaS) platforms used by cybercriminals worldwide. Between April 14…
AI Bots Fuel 57% of Holiday Shopping Traffic, Study Finds
Radware’s 2025 E-commerce Bot Threat Report reveals that automated bots generated 57% of online shopping website traffic during the 2024 holiday season, rather than human buyers. According to Radware’s analytics, this is the first time non-DDoS generating bots have…
UK Retail Sector Hit by String of Cyberattacks, NCSC Warns of Wake-Up Call
The United Kingdom’s National Cyber Security Centre (NCSC) has issued a stark warning following a wave of cyberattacks targeting some of the country’s most prominent retail chains. Calling the incidents a “wake-up call,” the agency urged organisations to strengthen…
Russian Hacktivists Disrupt Dutch Institutions with DDoS Attacks
Several Dutch public and private organizations have experienced significant service outages this week following a wave of distributed denial-of-service (DDoS) attacks linked to pro-Russian hacktivists. The Netherlands’ National Cyber Security Center (NCSC), part of the Ministry of Justice, confirmed…
NullBulge Admits to Stealing Internal Slack Data from Disney
Earlier this week, Ryan Mitchell Kramer, 25, of Santa Clarita, pleaded guilty in Los Angeles County Superior Court to hacking the personal device of an employee of The Walt Disney Company in 2024. Kramer managed to obtain login information…
“They’re Just People—But Dangerous Ones”: Trellix’s John Fokker Unpacks the Blurred Battlefield of Cybercrime at RSA 2025
At the RSA Conference 2025, John Fokker, head of threat intelligence at the Trellix Advanced Research Center, issued a stark reminder to the cybersecurity community that the behind of every cyberattack is a human being and the boundaries between…
Chinese Hackers Exploit IPv6 Network Features to Hack Software Updates
China-linked group attacks ESET discovered both SpellBinder and WizardNet, tools used by Chinese hackers. A China-based APT group, “The Wizards,” has been linked to a lateral movement tool, Spellbinder, which allows adversary-in-the-middle (AitM) attacks. It does so via IPv6 stateless…
Harmful WordPress Plugin Posing as Security Tool Grants Hackers Full Access
A newly discovered cyberattack is targeting WordPress websites by using a plugin that pretends to improve security but actually opens a backdoor for criminals. This fake plugin secretly gives attackers full control of affected sites. How the Infection Begins…
Push-Bombing: The Silent Threat Undermining Multi-Factor Authentication
In the ever-evolving landscape of cybersecurity, Multi-Factor Authentication (MFA) has emerged as a robust defense mechanism, adding layers of security beyond traditional passwords. However, a deceptive tactic known as “push-bombing” is undermining this very safeguard, posing significant risks to…
FBI Shares Details of 42,000 LabHost Phishing Domains
The LabHost cybercrime platform, one of the biggest worldwide phishing-as-a-service (PhaaS) platforms, was shut down in April 2024, but the FBI has disclosed 42,000 phishing domains associated with it. In order to raise awareness and offer signs of compromise,…
Approaches Users Can Implement to Safeguard Wireless Connections
The Wi-Fi network is a wireless gateway that connects homes and businesses to the Internet via the air, and it is typically provided by a router, which transmits data signals across the network. Mobile devices, laptops, and tablets can…
Pakistan-Based Hackers Launch Cyber Attack on Indian Defence Websites, Claim Access to Sensitive Data
In a concerning escalation of cyber hostilities, a Pakistan-based threat group known as the Pakistan Cyber Force launched a coordinated cyber offensive on multiple Indian defence-related websites on Monday. The group claimed responsibility for defacing the official site of…
Public Wary of AI-Powered Data Use by National Security Agencies, Study Finds
A new report released alongside the Centre for Emerging Technology and Security (CETaS) 2025 event sheds light on growing public unease around automated data processing in national security. Titled UK Public Attitudes to National Security Data Processing: Assessing Human…
WhatsApp Reveals “Private Processing” Feature for Cloud Based AI Features
WhatsApp claims even it can not process private data WhatsApp has introduced ‘Private Processing,’ a new tech that allows users to use advanced AI features by offloading tasks to privacy-preserving cloud servers, without exposing their chat to Meta. Meta claims…
Security Researcher Uncovers Critical RCE Flaw in API Due to Incomplete Input Validation
In a recent security evaluation, a researcher discovered a severe remote code execution (RCE) vulnerability caused by improper backend input validation and misplaced reliance on frontend filters. The vulnerability centered on a username field within a target web application. On…
Ascension Faces New Security Incident Involving External Vendor
There has been an official disclosure from Ascension Healthcare, one of the largest non-profit healthcare systems in the United States, that there has been a data breach involving patient information due to a cybersecurity incident linked to a former…
Posture Management Emerges as Strategic Cybersecurity Priority Amid Cloud and Data Fragmentation
Posture management is rapidly evolving into a cornerstone of enterprise cybersecurity as organizations grapple with increasing digital complexity. With infrastructures now sprawling across cloud platforms, identity services, and data environments, the traditional model of siloed risk monitoring is no…
Cybercriminals Stole Thousands of Australians’ Banking Details
Security experts believe that more than 30,000 Australians’ banking details have been compromised online. According to Dvuln, an Australian computer security firm, the exposed data, discovered during the last four years, refers to “multiple major banks”. However, rather than…
Commvault Confirms Cyberattack, Says Customer Backup Data Remains Secure
Commvault, a well-known company that helps other businesses protect and manage their digital data, recently shared that it had experienced a cyberattack. However, the company clarified that none of the backup data it stores for customers was accessed or harmed…
AI Now Writes Up to 30% of Microsoft’s Code, Says CEO Satya Nadella
Artificial intelligence is rapidly reshaping software development at major tech companies, with Microsoft CEO Satya Nadella revealing that between 20% and 30% of code in the company’s repositories is currently generated by AI tools. Speaking during a fireside chat…
JPMorgan Security Head Warns Tech Firms to Focus on Safer Software
Patrick Opet, the Chief Information Security Officer of JPMorgan Chase, has called on software companies to slow down and focus more on building secure systems rather than rushing their products to market. In a public letter, he warned that…
Infostealer Malware Soars 500% as 1.7 Billion Passwords Leak on Dark Web
A new report has exposed a staggering 500% rise in infostealer malware attacks, with over 1.7 billion passwords leaked on the dark web in 2024 alone. Despite the growing threat, poor password hygiene continues to be a critical issue,…
Iran Claims it Thwarted Sophisticated Cyberattack on its Infrastructure
Iran thwarted a “widespread and complex” cyberattack on Sunday that targeted the nation’s infrastructure, a senior official told Tasnim News Agency, which is affiliated with the Islamic Revolutionary Guard Corps. Behzad Akbari, the head of the government’s Telecommunications Infrastructure…
Over 1,200 SAP Instances Exposed to Critical Vulnerability Exploited in the Wild
Security researchers have issued a warning about a severe vulnerability affecting SAP systems, with over 1,200 instances potentially exposed to remote exploitation. This comes after SAP disclosed a critical flaw in the NetWeaver Visual Composer’s Metadata Uploader earlier this…
Understanding the UK’s New Rule on Ransomware Payments in the Public Sector
The UK government has introduced a new policy that stops public sector organizations from making payments to cybercriminals during ransomware attacks. This decision was made to reduce the number of attacks by taking away the money motivation behind them. The…
Digital Danger Zone: America’s Rising Cybersecurity Threats
A major firm being hacked, facing a cyber threat, or having critical digital data leaked seems to make headlines every day. Cyberattacks increased dramatically worldwide in the first quarter of 2025, with an average of 1,925 attacks per organisation…
Microsoft Launches Recall AI for Windows 11 Copilot+ PCs with Enhanced Privacy Measures
After months of delays stemming from privacy and security concerns, Microsoft has officially rolled out its Recall AI feature for users of Windows 11 Copilot+ PCs. The feature, which has now exited its beta phase, is included in the…
Microsoft Alerts Users About Password-spraying Attack
Microsoft alerts users about password-spraying attacks Microsoft has warned users about a new password-spraying attack by a hacking group Storm-1977 that targets cloud users. The Microsoft Threat Intelligence team reported a new warning after discovering threat actors are abusing unsecured…
Data Security Alert as Novel Exfiltration Method Emerges
Global cybersecurity experts are raising serious concerns over the newly identified cyber threat known as Data Splicing Attacks, which poses a significant threat to thousands of businesses worldwide. It seems that even the most advanced Data Loss Prevention (DLP) tools…
Brave Browser’s New ‘Cookiecrumbler’ Tool Aims to Eliminate Annoying Cookie Consent Pop-Ups
While the General Data Protection Regulation (GDPR) was introduced with noble intentions—to protect user privacy and control over personal data—its practical side effects have caused widespread frustration. For many internet users, GDPR has become synonymous with endless cookie consent…
Apple Sends Spyware Threat Alerts to Users in 100 Countries
Apple has issued threat notifications to users across 100 countries, warning them that their devices may have been targeted by sophisticated commercial spyware. The alerts, sent earlier this week, were confirmed by at least two recipients, including Italian journalist…
Now You Can Hire AI Tools Like Freelancers — Thanks to This Indian Startup
A tech startup based in Ahmedabad is changing how businesses use artificial intelligence. The company has launched a platform that allows users to hire AI tools the same way they hire freelancers— on demand and for specific tasks. Over…
Carolina Anaesthesiology Firm’s Massive Data Breach Impacts Nearly 21,000 Patients
Jeremiah Fowler, a security researcher, uncovered a non-password-protected database thought to be owned by Carolina Anaesthesiology PA, a healthcare organisation based in North Carolina. This dataset included several states, had 21,344 records, and was about 7GB in size. The…
Jammu Municipal Corporation Targeted in Major Cyberattack, Sensitive Data Allegedly Stolen
In a significant breach of digital infrastructure, the Jammu Municipal Corporation (JMC) has fallen victim to a cyberattack believed to have resulted in the loss of vast amounts of sensitive data. According to high-level intelligence sources, the attackers managed…
Hitachi Vantara Takes Servers Offline Following Akira Ransomware Attack
Hitachi Vantara, a subsidiary of Japan’s Hitachi conglomerate, temporarily shut down several servers over the weekend after falling victim to a ransomware incident attributed to the Akira group. The company, known for offering data infrastructure, cloud operations, and cyber…
Threat Alert: Hackers Using AI and New Tech to Target Businesses
Hackers are exploiting the advantages of new tech and the availability of credentials, commercial tools, and other resources to launch advanced attacks faster, causing concerns among cybersecurity professionals. Global Threat Landscape Report 2025 The 2025 Global Threat Landscape Report by…
US Targets Chinese Hacker with $10 Million Bounty.
There has been a rare and pointed move by the Federal Bureau of Investigation (FBI), which highlights the growing threat of state-sponsored cyberespionage. This was announced through a public announcement earlier this week, stating they would offer a reward…
Fast Flux Technique Identified as Growing Risk to US Cyber Infrastructure
A sophisticated cybercriminal technique called fast flux is being increasingly employed by cybercriminals, which is causing heightened concerns among intelligence agencies and cybersecurity agencies throughout the world. It has been reported in April 2025 that the United States National…
Pakistan State-sponsored Hackers Attack Indian Websites, Attempts Blocked
Pakistan’s cyber warfare against India Recently, Pakistan state-sponsored hacker groups launched multiple failed hacking attempts to hack Indian websites amid continuous cyber offensives against India after the Pahalgam terror attack. These breach attempts were promptly identified and blocked by the…
Bitdefender Warns of Surge in Subscription Scams Disguised as Online Stores and Mystery Boxes
Cybersecurity researchers at Bitdefender have uncovered a sharp increase in deceptive online subscription scams, with fraudsters disguising themselves as legitimate e-commerce platforms and mystery box vendors. These sophisticated schemes are luring unsuspecting users into handing over sensitive credit card…
North Korean Hackers Create Fake U.S. Firms to Dupe Crypto Developers
Threat analysts at Silent Push, a U.S. cybersecurity firm, told Reuters that North Korean cyber spies established two companies in the U.S., Blocknovas LLC and Softglide LLC, using fictitious personas and addresses to infect developers in the cryptocurrency industry…
Many Internet Users Suffer Account Breaches Due to Weak Passwords, Study Finds
A recent study has shown that more than one in three people have had at least one of their online accounts broken into during the past year. The main reason? Poor or stolen passwords. The report comes from the…
Coinbase Fixes Account Log Bug That Mistakenly Triggered 2FA Breach Alerts
Coinbase has resolved a logging issue in its system that led users to wrongly believe their accounts had been compromised, after failed login attempts were mistakenly labeled as two-factor authentication (2FA) failures. As first uncovered by BleepingComputer, the bug…
New Report Reveals Hackers Now Aim for Money, Not Chaos
Recent research from Mandiant revealed that financially motivated hackers are the new trend, with more than (55%) of criminal gangs active in 2024 aiming to steal or extort money from their targets, a sharp rise compared to previous years. About…
Think That Job Offer on LinkedIn Is Real? Not Without This Badge
LinkedIn has taken a major step toward improving online safety by extending its identity verification feature beyond its own platform. This update is part of the company’s ongoing efforts to help users avoid fake profiles and internet scams, especially…
Hacker Calls Pahalgam Incident “Inside Job” on Rajasthan Education Department Website
Earlier this week, the Rajasthan education department’s official website was hacked, with a statement ridiculing the Indian government over Pakistan’s detention of Indian Air Force commander Abhinandan Varthaman in 2019. The hackers attacked the homepage with a provocative message…
Rhysida Ransomware Group Leaks 1.3M Files Stolen from Oregon DEQ After Failed Extortion Attempt
A major ransomware breach has rocked the Oregon Department of Environmental Quality (DEQ), with over 1.3 million files—amounting to 2.4 terabytes—dumped online by the cybercriminal group Rhysida. The stolen data, now circulating on the dark web, reportedly includes confidential…
Large-Scale Data Breach at Frederick Health Exposes Patient Records
Two separate ransomware incidents have recently affected healthcare providers in Maryland and California and exposed sensitive information belonging to more than 1.1 million patients as a result, according to disclosures filed with federal regulators that recently broke the story.…
Android Spyware Concealed in Mapping App Targets Russian Military
Doctor Web researchers discovered a new spyware, tracked as Android. Spy.1292.origin, targets Russian military people. The malicious code was concealed in a trojanized Alpine Quest app and distributed via Russian Android catalogues. The malware acquires contacts, geolocation, and file…
Over 21 Million Employee Screenshots Leaked from WorkComposer Surveillance App
An app designed to track employee productivity by logging keystrokes and taking screenshots has suffered a significant privacy breach as more than 21 million images of employee activity were left in an unsecured Amazon S3 bucket. An app for tracking…