Canada’s House of Commons has launched an investigation after a cyberattack potentially exposed sensitive staff data, raising questions about whether recently discovered Microsoft vulnerabilities played a role. According to national media reports, an internal email to parliamentary employees revealed…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Connex Credit Union Confirms Data Breach Impacting 172,000 Customers
Connex Credit Union, headquartered in North Haven, Connecticut, recently revealed that a data breach may have affected around 172,000 of its members. The compromised data includes names, account numbers, debit card information, Social Security numbers, and government identification used…
VPN Downloads Surge Across the UK as Online Safety Act Triggers Strict Age Verification
Virtual Private Network (VPN) usage has skyrocketed across the UK since the Online Safety Act officially came into force on July 25, 2025. The new legislation mandates that websites, streaming services, and mobile apps hosting adult content implement robust…
Cybercriminals Steal Thousands of Guest ID Documents from Italian Hotels
Thousands of travellers have been left vulnerable to cyberattacks caused by hotel systems that have been breached by a sweeping cyberattack. Identities that have been stolen from hotel systems are now circulating on underground forums. According to the government’s…
Think Twice Before Uploading Personal Photos to AI Chatbots
Artificial intelligence chatbots are increasingly being used for fun, from generating quirky captions to transforming personal photos into cartoon characters. While the appeal of uploading images to see creative outputs is undeniable, the risks tied to sharing private photos…
UnitedHealth Cyberattack Becomes Largest Health Data Breach in History
The recent cyberattack on UnitedHealth has now been confirmed as the biggest health care data breach ever recorded, affecting more than 192 million people, over one-third of the U.S. population. When news of the incident first broke in 2023,…
NIST Issues Lightweight Cryptography Standard to Secure Small Devices
A new lightweight cryptography standard has been finalized by the National Institute of Standards and Technology (NIST), aiming to enhance the security of billions of connected devices worldwide. It is intended to provide protection for small, resource-constrained technologies that…
Crypto24 ransomware uses custom “EDR-blinding” tool to hit high-value targets
A threat group tracked as Crypto24 is attacking large organizations across the U.S., Europe, and Asia, aiming at finance, manufacturing, entertainment, and technology firms. First discussed publicly on security forums in September 2024, the group has since shown mature tradecraft,…
FreeVPN.One Extension Turns from Privacy Tool to Surveillance Threat
Security researchers at Koi Security have discovered troubling behavior from FreeVPN.One, a popular Chrome VPN extension with over 100,000 installations that has begun secretly capturing and transmitting users’ screenshots to remote servers. Threat discovery The extension, which had maintained…
Ransom Payouts Hit Record Levels Amid Social Engineering and Data Exfiltration Attacks
Ransomware payouts surged to unprecedented levels in the second quarter of 2025, driven largely by the rise of highly targeted social engineering schemes. According to new data from Coveware by Veeam, the average ransom payment skyrocketed to $1.13 million,…
Scammers Can Pinpoint Your Exact Location With a Single Click Warns Hacker
With the advent of the digital age, crime has steadily migrated from dark alleys to cyberspace, creating an entirely new type of criminal enterprise that thrives on technology. The adage that “crime doesn’t pay” once seemed so absurd to…
Orange Belgium Data Breach Exposes 850K Users to SIM-Swapping Risks
Orange Belgium has suffered a major data breach in which an attacker accessed the personal information of approximately 850,000 customers, with SIM card numbers and Personal Unblocking Key (PUK) codes among the most sensitive details exposed. The breach, disclosed…
Here’s How ‘AI Poisoning’ Tools Are Sabotaging Data-Hungry Bots
The internet has evolved from a platform mainly used by people for social sharing to one dominated by automated bots, especially those powered by AI. Bots now generate most web traffic, with over half of this stemming from malicious…
Telegram Blocks Black Mirror Hacker Group and Data Leak Channels
Telegram has stepped up its efforts to curb the spread of sensitive information by blocking several channels accused of leaking private data, with the high-profile Black Mirror hacker group being among the most prominent targets. The platform accused Black…
Hackers Steal Medical Data of Nearly Half a Million Women in the Netherlands
Almost 500,000 women in the Netherlands have had their medical information stolen after hackers breached a clinical laboratory responsible for analyzing cervical cancer screening tests. The stolen records, dating from 2022 until now, include names, addresses, dates of birth, social…
Europol Cracks Down on Major Cocaine Trafficking and Money Laundering Network Linked to Sky ECC
Europol has carried out a large-scale operation against a notorious organized crime syndicate involved in cocaine trafficking and money laundering. The coordinated raids led to the arrest of 10 individuals, the seizure of an entire tourist hotel, several real…
Brokers Fuel Underground Market for Bank Accounts in India
An undercover investigation of India’s financial ecosystem has revealed that a troubling black market is quietly emerging – a market where bank accounts are traded just as casually as consumer goods. Undercover investigations have revealed that there is a…
Elastic Denies Serious Security Flaw in Its Defend Software
Elastic, the company known for its enterprise search and security products, has pushed back against recent claims of a serious vulnerability in its Defend endpoint detection and response (EDR) tool. The controversy began after a small cybersecurity group, AshES…
Native Phishing Emerges as a New Microsoft 365 Threat Vector
A recent cybersecurity threat report highlights a tactic known as “native phishing,” where attackers exploit the trusted, built-in features of Microsoft 365 to launch attacks from within an organization. This method moves beyond traditional phishing emails with malicious attachments,…
AI Agents and the Rise of the One-Person Unicorn
Building a unicorn has been synonymous for decades with the use of a large team of highly skilled professionals, years of trial and error, and significant investments in venture capital. That is the path to building a unicorn, which…