Ransomware is one of the most persistent threats in the evolving landscape of cybercrime, but its escalation in 2024 has marked an extremely alarming turning point. Infiltrating hospitals, financial institutions, and even government agencies in a manner that has…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Researchers Expose AI Prompt Injection Attack Hidden in Images
Researchers have unveiled a new type of cyberattack that can steal sensitive user data by embedding hidden prompts inside images processed by AI platforms. These malicious instructions remain invisible to the human eye but become detectable once the images…
Age Checks Online: Privacy at Risk?
Across the internet, the question of proving age is no longer optional, it’s becoming a requirement. Governments are tightening rules to keep children away from harmful content, and platforms are under pressure to comply. From social media apps and…
ClickFix Attack Targeting Windows and Mac Users to Steal User Data
“Think before you click”: Microsoft warns all Windows PC users and as well as macOS users, from a series of attacks that are “targeting thousands of enterprise and end-user devices globally every day.” The scripts deploy malware on these devices,…
Cybersecurity: The Top Business Risk Many Firms Still Struggle to Tackle
Cybersecurity has emerged as the biggest threat to modern enterprises, yet most organizations remain far from prepared to handle it. Business leaders are aware of the risks — financial losses, reputational harm, and operational disruptions but awareness has not…
Congress Questions Hertz Over AI-Powered Scanners in Rental Cars After Customer Complaints
Hertz is facing scrutiny from U.S. lawmakers over its use of AI-powered vehicle scanners to detect damage on rental cars, following growing reports of customer complaints. In a letter to Hertz CEO Gil West, the House Oversight Subcommittee on…
Transparent Tribe Target Indian Government’s Custom Linux OS with Weaponized Desktop Files
Transparent Tribe, a cyber-espionage group believed to originate from Pakistan and also known as APT36, has stepped up its attacks on Indian government entities by using malicious desktop shortcuts designed to compromise both Windows and BOSS Linux systems. The…
Worker Sentenced to Four Years for Compromising Company IT Infrastructure
It is the case of a Chinese-born software developer who has been sentenced to four years in federal prison after hacking into the internal systems of his former employer, in a stark warning of the dangers of insider threats…
APT36 Exploits Linux .desktop Files for Espionage Malware in Ongoing Cyber Attacks
The Pakistani threat group APT36 has launched new cyber-espionage attacks targeting India’s government and defense sectors by abusing Linux .desktop files to deploy malware. According to recent reports from CYFIRMA and CloudSEK, the campaign—first detected on August 1, 2025—is…
India Most Targeted by Malware as AI Drives Surge in Ransomware and Phishing Attacks
India has become the world’s most-targeted nation for malware, according to the latest report by cybersecurity firm Acronis, which highlights how artificial intelligence is fueling a sharp increase in ransomware and phishing activity. The findings come from the company’s…
How Image Resizing Could Expose AI Systems to Attacks
Security experts have identified a new kind of cyber attack that hides instructions inside ordinary pictures. These commands do not appear in the full image but become visible only when the photo is automatically resized by artificial intelligence (AI) systems.…
ReVault Flaws Expose Dell ControlVault3 Hardware to Persistent Attacks
RevaUlt, a company marketing itself on advanced endpoint protection and next-generation SOC capabilities, recently suffered a severe security breach. The attackers penetrated its internal environment, exploiting vulnerabilities in the architecture used for their supposed secure SOC platform. The compromise…
Verizon Reimagines the Household Phone Number with Family Line for the Digital Era
Verizon has faced challenges in recent months. They have faced mounting criticism for a number of controversial decisions that have left many of their long-time subscribers wondering why they still belong to Verizon. When Verizon eliminated customer loyalty discounts and…
New Shamos Malware Targets Mac Users Through Fake Tech Support Sites
Cybersecurity researchers have unearthed a new Mac-targeting malware called Shamos that deceives users through fake troubleshooting guides and repair solutions. This information-stealing malware, developed by the cybercriminal organization “COOKIE SPIDER,” represents a variant of the previously known Atomic macOS…
FreeVPN.One Chrome Extension Caught Secretly Spying on Users With Unauthorized Screenshots
Security researchers are warning users against relying on free VPN services after uncovering alarming surveillance practices linked to a popular Chrome extension. The extension in question, FreeVPN.One, has been downloaded over 100,000 times from the Chrome Web Store and…
Millions of Patient Records Compromised After Ransomware Strike on DaVita
Healthcare Faces Growing Cyber Threats A ransomware attack that affected nearly 2.7 million patients has been confirmed by kidney care giant DaVita, revealing that one of the most significant cyberattacks of the year has taken place. There are over 2,600…
Nissan Confirms Data Leak After Ransomware Attack on Design Unit
Nissan’s Tokyo-based design subsidiary, Creative Box Inc. (CBI), has launched an investigation into a cyberattack after a ransomware group claimed to have stolen a large cache of internal files. The company confirmed that some design data has been compromised but…
Colt Technology Services Confirms Customer Data Theft After Warlock Ransomware Attack
UK-based telecommunications provider Colt Technology Services has confirmed that sensitive customer-related documentation was stolen in a recent ransomware incident. The company initially disclosed on August 12 that it had suffered a cyberattack, but this marks the first confirmation that data…
Fake Netflix Job Offers Target Facebook Credentials in Real-Time Scam
A sophisticated phishing campaign is targeting job seekers with fake Netflix job offers designed to steal Facebook login credentials. The scam specifically focuses on marketing and social media professionals who may have access to corporate Facebook business accounts. Modus…
Aussie Telecom Breach Raises Alarm Over Customer Data Safety
A recent cyberattack on TPG Telecom has reignited concerns about how safe personal information really is in the hands of major companies. What the provider initially downplayed as a “limited” incident has in fact left hundreds of thousands of…