A sudden, massive bet surfaced just ahead of a major political development involving Venezuela’s leader. Days prior to Donald Trump revealing that Nicolás Maduro had been seized by U.S. authorities, an individual on Polymarket placed a highly profitable position.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Lego’s Move Into Smart Toys Faces Scrutiny From Play Professionals
In the wake of its unveiling of the company’s smart brick technology, LEGO is seeking to reassure critics who argue that the initiative could undermine the company’s commitment to hands-on, imaginative play as well as its longstanding history of…
Chrome WebView Flaw Lets Hackers Bypass Security, Update Urgently Advised
Google has rolled out an urgent security fix for the Chrome browser to address a high severity flaw in the browser’s WebView tag. According to the tech firm, the flaw allows hackers to evade major browser security features to…
Android Malware Uses Artificial Intelligence to Secretly Generate Ad Clicks
Security researchers have identified a new category of Android malware that uses artificial intelligence to carry out advertising fraud without the user’s knowledge. The malicious software belongs to a recently observed group of click-fraud trojans that rely on machine…
WhatsApp Bug Leads to Exposure of User Metadata
The Meta organization has begun to address a number of vulnerabilities in WhatsApp that expose sensitive user information. These vulnerabilities indicate that, even when platforms are encrypted, they can inadvertently reveal critical device details. The vulnerabilities are caused by…
Fortinet Firewalls Targeted as Attackers Bypass Patch for Critical FortiGate Flaw
Critical vulnerabilities in FortiGate systems continue to be exploited, even after fixes were deployed, users now confirm. Though updates arrived aiming to correct the problem labeled CVE-2025-59718, they appear incomplete. Authentication safeguards can still be sidestepped by threat actors…
Kimwolf Botnet Hijacks 1.8M Android Devices for DDoS Chaos
The Kimwolf botnet is one of the largest recently found Android-based threats, contaminating over 1.8 million devices mostly Android TV boxes and IoT devices globally. Named after its reliance on the wolfSSL library, this malware appeared in late October 2025 when…
Cybercriminals Target Cloud File-Sharing Services to Access Corporate Data
Cybersecurity analysts are raising concerns about a growing trend in which corporate cloud-based file-sharing platforms are being leveraged to extract sensitive organizational data. A cybercrime actor known online as “Zestix” has recently been observed advertising stolen corporate information that…
ESA Confirms Cyber Breach After Hacker Claims 200GB Data Theft
The European Space Agency (ESA) has confirmed a major cybersecurity incident in the external servers used for scientific cooperation. The hackers who carried out the operation claim responsibility for the breach in a post in the hacking community site…
Ledger Customer Data Exposed After Global-e Payment Processor Cloud Incident
A fresh leak of customer details emerged, linked not to Ledger’s systems but to Global-e – an outside firm handling payments for Ledger.com. News broke when affected users received an alert email from Global-e. That message later appeared online,…
Targeted Cyberattack Foiled by Resecurity Honeypot
There has been a targeted intrusion attempt against the internal environment of Resecurity in November 2025, which has been revealed in detail by the cyber security company. In order to expose the adversaries behind this attack, the company deliberately…
What Happens When Spyware Hits a Phone and How to Stay Safe
Although advanced spyware attacks do not affect most smartphone users, cybersecurity researchers stress that awareness is essential as these tools continue to spread globally. Even individuals who are not public figures are advised to remain cautious. In December, hundreds…
Grok AI Faces Global Backlash Over Nonconsensual Image Manipulation on X
A dispute over X’s internal AI assistant, Grok, is gaining attention – questions now swirl around permission, safety measures online, yet also how synthetic media tools can be twisted. This tension surfaced when Julie Yukari, a musician aged thirty-one…
Privacy Takes Center Stage in WhatsApp’s Latest Feature Update
There are billions of WhatsApp users worldwide, making it a crucial communication platform for both personal and professional exchanges alike. But its wide spread has also made it an increasingly attractive target for cybercriminals because of its widespread reach…
AI Expert Warns World Is Running Out of Time to Tackle High-Risk AI Revolution
AI safety specialist David Dalrymple has warned in no unclear terms that humanity may be running out of time to get ready for the dangers of fast-moving artificial intelligence. When talking to The Guardian, the director of programme at the UK…
North Korean Hackers Abuse VS Code Projects in Contagious Interview Campaign to Deploy Backdoors
North Korea–linked threat actors behind the long-running Contagious Interview campaign have been seen leveraging weaponized Microsoft Visual Studio Code (VS Code) projects to trick victims into installing a backdoor on their systems. According to Jamf Threat Labs, this activity…
Geopolitical Conflict Is Increasing the Risk of Cyber Disruption
Cybersecurity is increasingly shaped by global politics. Armed conflicts, economic sanctions, trade restrictions, and competition over advanced technologies are pushing countries to use digital operations as tools of state power. Cyber activity allows governments to disrupt rivals quietly, without deploying…
Ingram Micro Reveals Impact of Ransomware Attack on Employee Records
Ingram Micro quietly divulged all the personal details of their employees and job applicants last summer after a ransomware attack at the height of the summer turned into a far-reaching data exposure, exposing sensitive information about their employees and…
Google Gemini Calendar Flaw Allows Meeting Invites to Leak Private Data
Though built to make life easier, artificial intelligence helpers sometimes carry hidden risks. A recent study reveals that everyday features – such as scheduling meetings – can become pathways for privacy breaches. Instead of protecting data, certain functions may…
Resecurity Breach Claims Exposed as Honeypot Deception
The hackers, who claimed to represent the “Scattered Lapsus$ Hunters” (SLH) group, believed they successfully compromised Resecurity, a cybersecurity firm based in the United States, by exfiltrating their data. Resecurity disputed this by saying they were only able to…