The idea of privacy has become both a luxury and a necessity in an increasingly interconnected world. As cyber surveillance continues to rise, data breaches continue to occur, and online tracking continues to rise, more and more Internet users…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Salesforce Refuses to Pay Extortion Demand After Alleged Theft of Nearly One Billion Records
Salesforce has confirmed it will not pay a ransom to an extortion group that claims to have stolen close to one billion records belonging to several of its customers. The company stated that it will not enter negotiations or make…
Wake-Up Call for Cybersecurity: Lessons from M&S, Co-op & Harrods Attacks
The recent cyberattacks on M&S, Co-op, and Harrods were more than just security breaches — they served as urgent warnings for every IT leader charged with protecting digital systems. These weren’t random hacks; they were carefully orchestrated, multi-step campaigns that…
Qilin Ransomware Gang Claims Cyberattack on Japanese Beer Giant Asahi
The Qilin ransomware group has claimed responsibility for the recent cyberattack on Japanese brewing giant Asahi, adding the company’s name to its dark web data leak site. The cybercriminals alleged that they had stolen over 9,300 files amounting to…
Workplace AI Tools Now Top Cause of Data Leaks, Cyera Report Warns
A recent Cyera report reveals that generative AI tools like ChatGPT, Microsoft Copilot, and Claude have become the leading source of workplace data leaks, surpassing traditional channels like email and cloud storage for the first time. The alarming trend…
Incognito Mode Is Not Private, Use These Instead
Incognito (private mode) is a famous privacy feature in web browsers. Users may think that using Incognito mode ensures privacy while surfing the web, allowing them to browse without restrictions, and that everything disappears when the tab is closed. With…
Cyber Risks Emerge as a Direct Threat to Clinical Care
Even though almost every aspect of modern medicine is supported by digital infrastructure, the healthcare sector finds itself at the epicentre of an escalating cybersecurity crisis at the same time. Cyberattacks have now evolved from being just a financial…
ICE Uses Fake Tower Cells to Spy on Users
Federal contract to spy Earlier this year, the US Immigration and Customs Enforcement (ICE) paid $825,000 to a manufacturing company that makes vehicles installed with tech for law enforcement, which also included fake cellphone towers called “cell-site” simulators used to…
Danish Developer’s Website Sparks EU Debate on Online Privacy and Child Protection
In August, a 30-year-old developer from Aalborg, identified only as Joachim, built a platform called Fight Chat Control to oppose a proposed European Union regulation aimed at tackling the spread of child sexual abuse material (CSAM) online. The EU…
Indian Tax Department Fixes Major Security Flaw That Exposed Sensitive Taxpayer Data
The Indian government has patched a critical vulnerability in its income tax e-filing portal that had been exposing sensitive taxpayer data to unauthorized users. The flaw, discovered by security researchers Akshay CS and “Viral” in September, allowed logged-in users…
Discord Third-Party Breach Exposes User Data and Government IDs
Discord has confirmed a significant data breach affecting users who interacted with their customer support or trust & safety teams, stemming not from a direct attack on Discord’s own systems but through a compromised third-party vendor that handled customer…
AI Startup by Dhravya Shah Gains $3 Million Investment and O-1 Visa Recognition
As one of the youngest innovators in the global tech landscape, Mumbai-born innovator Dhravya Shah is just 20 years old and makes a big impact in the industry every day. It was Shah’s unconventional decision to move away from…
Bitcoin Developer Warns NSA May Be Pushing “Quantum-Only” Cryptography Backdoor
Prominent Bitcoin developer Peter Todd has accused the U.S. National Security Agency (NSA) of attempting to “backdoor crypto again” through the introduction of so-called quantum-secure algorithms that could exclude traditional cryptographic safeguards. “Tl;dr: the NSA is clearly looking to…
Paying Ransom Does Not Guarantee Data Restoration: Report
A new report claims that smaller firms continue to face dangers in the digital domain, as ransomware threats persistently target organizations. Hiscox’s Cyber Readiness Report surveyed 6,000 businesses, and over 59% report they have been hit by a cyber attack…
Spanish Police Dismantle AI-Powered Phishing Network and Arrest Developer “GoogleXcoder”
Spanish authorities have dismantled a highly advanced AI-driven phishing network and arrested its mastermind, a 25-year-old Brazilian developer known online as “GoogleXcoder.” The operation, led by the Civil Guard’s Cybercrime Department, marks a major breakthrough in the ongoing fight…
Red Hat Data Breach Deepens as Extortion Attempts Surface
The cybersecurity breach at enterprise software provider Red Hat has intensified after the hacking collective known as ShinyHunters joined an ongoing extortion attempt initially launched by another group called Crimson Collective. Last week, Crimson Collective claimed responsibility for infiltrating…
Sensitive Information of NSW Flood Victims Mistakenly Entered into ChatGPT
A serious data breach involving the personal details of thousands of flood victims has been confirmed by the New South Wales government in an unsettling development that highlights the fragile boundary between technology and privacy. There has been an…
Clop Ransomware Exploits Oracle Zero-Day in Major Extortion Campaign
The Clop ransomware gang has orchestrated a massive extortion campaign targeting Oracle E-Business Suite customers by exploiting a critical zero-day vulnerability tracked as CVE-2025-61882. The vulnerability, which carries a CVSS score of 9.8, affects Oracle EBS versions 12.2.3 through…
Discord confirms third-party support breach; some users’ ID photos, support messages and limited payment details were accessed
Discord, the popular communication platform used by millions worldwide, has confirmed a data breach that compromised the systems of one of its third-party customer support providers. The incident, which occurred on September 20, 2025, allowed an unauthorized individual to…
Microsoft to end support for Windows 10, 400 million PCs will be impacted
Microsoft is ending software updates for Windows 10 From October 14, Microsoft will end its support for Windows 10, experts believe it will impact around 400 million computers, exposing them to cyber threats. People and groups worldwide are requesting that…