In a move that reflects Europe’s deepening concerns over data sovereignty and foreign technological dependence, France has decided to move its national Health Data Hub away from Microsoft’s cloud infrastructure and into the hands of domestic provider Scaleway. The decision…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Firestarter Malware Persists on Cisco Firewalls Even After Security Updates
Cybersecurity authorities in the United States and the United Kingdom have issued a joint alert about a previously undocumented malware strain called Firestarter that is capable of maintaining access on Cisco firewall systems even after updates and security patches…
ADT Data Breach Confirmed After ShinyHunters Threatens Leak of Stolen Customer Information
Now comes word that ADT, a provider of home security systems, suffered a data breach following threats by the hacking collective ShinyHunters to expose purloined records if payment isn’t made. This event joins others recently where attackers gain access…
Sri Lanka Finance Ministry Loses $2.5 Million in Cyberattack on Payment System
Sri Lanka is trying to recover $2.5 million after a cyberattack on the Finance Ministry’s payment system redirected funds away from their intended recipient, exposing fresh weaknesses in the country’s public financial controls. Officials say the breach involved email…
Sophisticated Scams Surge in 2025, Costing Americans $2.1 Billion
Online fraud is evolving rapidly, with scammers employing increasingly sophisticated techniques that have already cost Americans an estimated $2.1 billion in 2025—a number expected to climb further. While social media continues to be the leading platform where scams originate,…
When Screens Turn Against You: The Dark Mechanics of Webcam Sextortion
In the dim privacy of a personal screen, where anonymity is often assumed and discretion rarely questioned, a silent threat has begun to take shape. What was once dismissed as a crude bluff has, in certain cases, evolved into…
Tropic Trooper Expands Operations with Home Router Attacks and New Targets in Asia
A China-linked advanced persistent threat group known as Tropic Trooper is modifying how it operates, introducing unusual attack methods and expanding both its target base and technical toolkit. Recent observations show the group experimenting with new intrusion paths, including an…
Over 80 Organisations Impacted by Phishing Leveraging SimpleHelp and ScreenConnect
Researchers have identified a systematic intrusion operation that is utilizing remote management utilities, and recent findings reinforce this shift in phishing campaigns, which have evolved from opportunistic scams to structured intrusion operations. Researchers have identified an ongoing campaign that…
Indirect Prompt Injection: The Hidden AI Threat
Indirect prompt injection is becoming one of the most worrying AI security risks because attackers can hide malicious instructions inside content that an AI system reads and trusts. In plain terms, the AI is not being attacked through the chat…
Exposed by Design: What 1 Million Open AI Services Reveal About the Future of Cyber Risk
The rapid ascent of artificial intelligence, once heralded as the great accelerator of productivity, now casts a long and unsettling shadow, one that reveals not merely innovation, but a profound erosion of foundational security discipline. A recent large scale…
Global Surge in Military Grade Spyware Puts Personal Smartphones at Risk
Global cybersecurity discourse is emerging with a growing surveillance threat under the surface as the UK’s top cyber authority issues a stark assessment of the unchecked proliferation of commercial spyware capabilities. Initially restricted to tightly regulated law enforcement use,…
AI Models Surpass Doctors in Emergency Diagnosis, Harvard Study Finds
A contemporary study conducted by researchers at Harvard University has revealed that advanced artificial intelligence systems are now capable of exceeding human doctors in both diagnosing medical conditions and determining treatment strategies, including in fast-paced and high-stakes emergency room…
Claude Desktop Silently Alters Browser Settings, Even on Uninstalled Browsers
Claude Desktop, Anthropic’s standalone AI app for macOS, has come under fire for quietly altering browser‑level settings on users’ machines—even when they have never installed or used certain browsers. Security and privacy researchers have found that the application drops…
npm Supply Chain Attack Spreads Worm Malware Stealing Developer Secrets Across Compromised Packages
Worry grows within the cybersecurity community following discovery of a fresh supply chain threat aimed at the npm platform, where self-replicating malicious code infiltrates public software libraries to harvest confidential information from coders. Though broad consumer impact seems minimal,…
Hackers Target Cloud Apps Using Phone Scams and Login Tricks
Cybersecurity researchers have identified two threat groups that are executing fast-moving attacks almost entirely within software-as-a-service environments, allowing them to operate with very little visible trace of intrusion. The groups, tracked as Cordial Spider and Snarky Spider, are also known…
CISA Highlights CVE-2026-31431 as an Active Linux Root Exploitation Risk
Several vulnerabilities in the Linux kernel have been recently disclosed that have attracted heightened scrutiny from the cybersecurity community, following evidence that they can be exploited to obtain full root-level control across a wide range of systems consistently. This…
Kyber Ransomware Tests Post‑Quantum Encryption on Windows Networks
A new ransomware group named Kyber has pushed the envelope by experimenting with post‑quantum encryption in attacks on Windows‑based networks, according to recent cybersecurity analysis. The group has been observed targeting both Windows file servers and VMware ESXi platforms,…
Iran Claims US Used Backdoors To Disable Networking Equipment During Conflict Amid Unverified Cyber Sabotage Reports
Midway through the incident, Iranian officials pointed fingers at American cyber operations. Devices made by firms like Cisco and Juniper began failing without warning. Power cycles hit Fortinet and MikroTik hardware even as Tehran limited external connections. Outages appeared…
Ransomware Campaign Leverages QEMU to Slip Past Enterprise Defences
In an effort to circumvent traditional security controls, hackers are increasingly relying on virtualisation as a covert execution layer, embedding malicious operations within QEMU environments. As observed in observed incidents, adversaries deployed concealed virtual machines in which tooling and…
Lazarus Hackers Steal $290M from KelpDAO in Cross-Chain Exploit
KelpDAO has become the latest DeFi project to face a major security crisis after a $290 million heist that investigators say is likely tied to North Korea’s Lazarus Group. The attack targeted rsETH, a restaked ether asset used across…