In recent decades, artificial intelligence has radically changed the way software is created, tested, and deployed, bringing about a significant shift in software development history. Originally, it was only a simple autocomplete function, but it has evolved into a…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cybercriminals Harness AI and Automation, Leaving Southeast Asia Exposed
A new study warns that cybercriminals are leveraging artificial intelligence (AI) and automation to strike faster and with greater precision, exposing critical weaknesses in Southeast Asia—a region marked by rapid digital growth and interconnected supply chains. The findings urge…
Data Portability and Sovereign Clouds: Building Resilience in a Globalized Landscape
The emergence of sovereign clouds has become increasingly inevitable as organizations face mounting regulatory demands and geopolitical pressures that influence where their data must be stored. Localized cloud environments are gaining importance, ensuring that enterprises keep sensitive information within…
Cyberattack on New York Business Council Exposes Thousands to Risk
The Business Council of New York State (BCNYS), an influential body representing businesses and professional groups, has confirmed that a recent cyberattack compromised the personal information of more than 47,000 people. In a report submitted to the Office of the…
Orange Belgium Hit by Cyberattack Affecting 850,000 Customers
Orange Belgium, a major telecommunications provider and subsidiary of French telecom giant Orange Group, confirmed in August 2025 a significant cyberattack on its IT systems that resulted in unauthorized access to the personal data of approximately 850,000 customers. The…
Hackers Disclose Why They Targeted North Korean Government Hackers
In a stunning development in the history of cybersecurity, independent hackers managed to successfully break into the system of a North Korean government hacker, enabling them to expose the inner workings of one of the country’s most secretive cyber…
The Rise of the “Shadow AI Economy”: Employees Outpace Companies in AI Adoption
Artificial intelligence has become one of the most talked-about technologies in recent years, with billions of dollars poured into projects aimed at transforming workplaces. Yet, a new study by MIT suggests that while official AI programs inside companies are…
VP.NET Launches SGX-Based VPN to Transform Online Privacy
The virtual private network market is filled with countless providers, each promising secure browsing and anonymity. In such a crowded space, VP.NET has emerged with the bold claim of changing how VPNs function altogether. The company says it is…
Microsoft Boosts Digital Trust through Post Quantum Cryptography
A comprehensive roadmap has been unveiled by Microsoft to enable it to future-proof its security infrastructure, marking a decisive step toward securing the company’s products and services with quantum-safe protection by 2033 — two years ahead of the target…
Major Password Managers Leak User Credentials in Unpatched Clickjacking Attacks
Six popular password managers serving tens of millions of users remain vulnerable to unpatched clickjacking flaws that could allow cybercriminals to steal login credentials, two-factor authentication codes, and credit card information. Modus operandi Security researcher Marek Tóth, who presented…
Hackers Trick Users with Fake Captchas to Steal Data
Cybersecurity researchers have uncovered a new technique where attackers use fake Captcha tests to trick people into installing malware called Lumma Stealer. This malicious program is designed to quietly search infected computers for valuable information, such as login credentials,…
Workday Suffers Data Breach in Broader Salesforce Campaign
Workday, a major player in the human resources sector, has disclosed a recent data breach caused by a social engineering attack targeting a third-party customer relationship management (CRM) system—specifically, a Salesforce instance. Although Workday, headquartered in Pleasanton, California, provides…
Texas Attorney General Probes Meta AI Studio and Character.AI Over Child Data and Health Claims
Texas Attorney General Ken Paxton has opened an investigation into Meta AI Studio and Character.AI over concerns that their AI chatbots may present themselves as health or therapeutic tools while potentially misusing data collected from underage users. Paxton argued…
PayPal Password Leak Puts Millions of Users on High Alert
It has been reported that millions of PayPal accounts have been traded on underground forums, which has raised a new wave of alarm in the ever-evolving landscape of cybercrime. Using the moniker “Chucky_BF”, a hacker announcing the availability of…
Fake Telegram Premium Website Spreads Lumma Stealer Malware
Cybersecurity researchers have uncovered a malicious campaign that uses a fraudulent Telegram Premium website to distribute a dangerous variant of the Lumma Stealer malware. According to a report by Cyfirma, the fake domain telegrampremium[.]app closely imitates the official Telegram…
Federal Judge Allows Amazon Alexa Users’ Privacy Lawsuit to Proceed Nationwide
A federal judge in Seattle has ruled that Amazon must face a nationwide lawsuit involving tens of millions of Alexa users. The case alleges that the company improperly recorded and stored private conversations without user consent. U.S. District Judge…
FBI Warns of Rising Online Threats Targeting Youth and Digital Assets
The Federal Bureau of Investigation (FBI) has raised concern over what it describes as a fast-expanding online threat, warning that criminal groups are becoming more organized and dangerous in cyberspace. The activity includes ransomware, phishing scams, cryptocurrency theft, and even…
New Gmail Phishing Attack Exploits Login Flow to Steal Credentials
Despite today’s technologically advanced society, where convenience and connectivity are the norms, cyber threats continue to evolve at an alarming rate, making it extremely dangerous to live in. It has recently been reported that phishing attacks and online scams…
Pakistani Cybercriminals Turn Piracy Against Pirates in $4M Malware Scheme
A massive cybercrime operation based in Pakistan has been exposed after running a sophisticated infostealer malware campaign for five years, generating over $4 million by targeting software pirates. Operation details The criminal network, primarily operating from Bahawalpur and Faisalabad,…
New Phishing Scam Uses Japanese Character to Perfectly Mimic Legitimate URLs
Cybersecurity researchers have recently flagged a highly sophisticated phishing campaign that leverages a unique tactic: the use of the Japanese hiragana character “ん” to mimic the appearance of a forward slash (“/”) in website URLs. This technique is especially…