Cybersecurity researchers have discovered that cybercriminals are misusing a legitimate employee monitoring tool called Kickidler to execute targeted ransomware attacks. Originally developed to help businesses track productivity and ensure compliance, Kickidler offers features like real-time screen monitoring, keystroke logging,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cybercriminals Employ Display Fake Login Pages in Your Browser
Cofense Intelligence cybersecurity researchers have discovered a new and increasingly successful technique that attackers are using to deliver credential phishing pages straight to users’ email inboxes. This technique, which first surfaced in mid-2022, makes use of “blob URIs” (binary…
Hackers Resurface with PowerSchool Data, Target Schools Again with New Threats
Hackers behind the 2024 cyberattack on PowerSchool have returned, this time going after individual schools. They’re now threatening to leak private data unless schools pay them ransom. PowerSchool is a major digital platform used in the education sector. It…
How to Check If a Downloaded File Is Safe to Use
It is no longer a secret that downloading software is becoming an integral part of everyday computing in today’s digitally based environment. It is used to enhance productivity, explore new tools, and stay connected to an ever-increasing online world,…
Google to Pay Texas $1.4 Billion For Collecting Personal Data
The state of Texas has declared victory after reaching a $1 billion-plus settlement from Google parent firm Alphabet over charges that it illegally tracked user activity and collected private data. Texas Attorney General Ken Paxton announced the state’s highest…
Child Abuse Detection Efforts Face Setbacks Due to End-to-End Encryption
Technology has advanced dramatically in the last few decades, and data has been exchanged across devices, networks, and borders at a rapid pace. It is imperative to safeguard sensitive information today, as it has never been more important-or more…
India Faces Cyber Onslaught After Operation Sindoor Military Strikes
In the aftermath of India’s military action under Operation Sindoor, Pakistan responded not only with conventional threats but also with a wave of coordinated cyberattacks. While India’s defense systems effectively intercepted aerial threats like drones and missiles, a simultaneous…
This Free Tool Helps You Find Out if Your Personal Information Is Exposed Online
Many people don’t realize how much of their personal data is floating around the internet. Even if you’re careful and don’t use the internet much, your information like name, address, phone number, or email could still be listed on…
Compromised npm Package ‘rand-user-agent’ Used to Spread Remote Access Trojan
A widely-used npm package, rand-user-agent, has fallen victim to a supply chain attack, where cybercriminals injected obfuscated code designed to install a Remote Access Trojan (RAT) on users’ systems. Originally developed to generate randomized user-agent strings—helpful in web scraping,…
FBI Warns Consumers to Replace Outdated Routers Hijacked by TheMoon Malware
The FBI has issued an urgent warning to American consumers and businesses: replace outdated internet routers immediately or risk becoming an unwitting accomplice in cybercrime. According to the agency, cybercriminals are actively targeting “end-of-life” routers—older models that no longer…
LockBit Ransomware Platform Breached Again, Ops Data Leaked
A breach of an administration panel used by the LockBit ransomware outfit resulted in the exposure of information that can be extremely valuable to law enforcement and the cybersecurity community. The breach was discovered on May 7, when a…
Google Now Scans Screenshots to Identify Geographic Locations
With the introduction of a new feature within Google Maps that is already getting mixed reviews from users, this update is already making headlines around the world. Currently available on iPhones, this update allows users to scan screenshots and…
Why Microsoft Says DeepSeek Is Too Dangerous to Use
Microsoft has openly said that its workers are not allowed to use the DeepSeek app. This announcement came from Brad Smith, the company’s Vice Chairman and President, during a recent hearing in the U.S. Senate. He said the decision…
Details of 1.1 Million Job Applicants Leaked by a Major Recruitment Platform
While looking for a new job can be enjoyable, it is surely not fun to lose your personal information in the process. In the meantime, the Cybernews investigation team found an unprotected GCS bucket belonging to the talent pool…
Coordinated Action Targets DDoS-for-Hire Empire with Arrests and Seizures
The Polish authorities have succeeded in dismantling a sophisticated criminal network offering distributed denial-of-service (DDoS) for-hire services to hit the cybercrime infrastructure hard. As the result of a coordinated operation, four people were arrested who were suspected of operating…
Agentic AI Is Reshaping Cybersecurity Careers, Not Replacing Them
Agentic AI took center stage at the 2025 RSA Conference, signaling a major shift in how cybersecurity professionals will work in the near future. No longer a futuristic concept, agentic AI systems—capable of planning, acting, and learning independently—are already…
Windows CLFS Zero-Day Flaw Exploited in Play Ransomware Attacks
In zero-day attacks, the Play ransomware gang exploited a critical Windows Common Log File System flaw to gain SYSTEM access and install malware on infected PCs. The vulnerability, known as CVE-2025-29824, was identified by Microsoft as being exploited in…
Meta Mirage” Phishing Campaign Poses Global Cybersecurity Threat to Businesses
A sophisticated phishing campaign named Meta Mirage is targeting companies using Meta’s Business Suite, according to a new report by cybersecurity experts at CTM360. This global threat is specifically engineered to compromise high-value accounts—including those running paid ads and…
Barclays Introduces New Step-by-Step Model to Tackle Modern Fraud
Banks and shops are facing more advanced types of fraud that mix online tricks with real-world scams. To fight back, experts from Barclays and a security company called Threat Fabric have created a detailed model to understand how these…
One Click Is All It Takes: New Mac Malware Steals Your Data
A growing number of Mac users are being tricked into downloading harmful software through fake verification messages. These scams look like normal human checks, such as Google’s “I’m not a robot” box, but are actually part of a malware…