Spyware apps masquerading as legitimate software are a growing threat on app stores, particularly Google Play. These malicious apps can steal personal data, commit financial fraud, and install malware on unsuspecting users’ devices. A Zscaler report found 200 spyware…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Turning The Screws: Pressure Techniques Used by Ransomware Outfits
Over the past ten years, ransomware attacks have increased in frequency and sophistication. While exploits like social engineering and unpatched software may help with an initial breach, it’s the coercive tactics that force victims to make rash and emotionally…
Ransomware Attack on Retirement Services Firm Exposes Thousands of US School Data
A ransomware assault targeting retirement service firm Carruth Compliance Consulting has resulted in a data breach affecting dozens of school districts and thousands of individuals in the US. Carruth Compliance Consulting (CCC) administers retirement savings accounts for public schools…
NTT Data Breach Puts Thousands of Businesses at Risk
An NTT Communications (NTT Com) employee in Tokyo has confirmed that in February, unauthorized access to sensitive data belonging to approximately 18,000 corporate customers was caused by a cyberattack. There is no definitive estimate of how extensive the breach…
DeepSeek AI: Benefits, Risks, and Security Concerns for Businesses
DeepSeek, an AI chatbot developed by China-based High-Flyer, has gained rapid popularity due to its affordability and advanced natural language processing capabilities. Marketed as a cost-effective alternative to OpenAI’s ChatGPT, DeepSeek has been widely adopted by businesses looking for…
Cisco Warns of Critical Security Flaw in IOS XR Software – Immediate Update Recommended
Cisco has issued a security warning about a newly identified vulnerability in its IOS XR Software. This security flaw, labeled CVE-2025-20138, has been rated 8.8 on the CVSS scale, meaning it poses a major risk to affected devices. What Is…
Online Fraud Emerges as a Major Global Challenge
A vast and highly organized industry is known as online scams, which are characterized by intricate supply chains that include services, equipment, and labor. In recent years, cybercrime has gone beyond isolated criminal activities, but has developed into a…
Cybercrime in 2025: AI-Powered Attacks, Identity Exploits, and the Rise of Nation-State Threats
Cybercrime has evolved beyond traditional hacking, transforming into a highly organized and sophisticated industry. In 2025, cyber adversaries — ranging from financially motivated criminals to nation-state actors—are leveraging AI, identity-based attacks, and cloud exploitation to breach even the most…
Undocumented ESP32 Commands Pose Security Risks, Researchers Warn
The widely used ESP32 microchip, manufactured by Chinese company Espressif and embedded in over a billion devices as of 2023, has been found to contain undocumented commands that could be exploited for cyberattacks. These hidden commands enable threat actors…
Cyberattacks on Key Vendors Trigger Widespread Disruptions Across Industries
Cybercriminals are increasingly targeting a single point of failure within companies to create large-scale disruption, according to a recent report by Resilience. The analysis highlights how such attacks can have a ripple effect across entire industries. In 2024, the global…
Terror Ourfits Are Using Crypto Funds For Donations in India: TRM Labs
Transaction Monitoring (TRM) Labs, a blockchain intelligence firm based in San Francisco and recognised by the World Economic Forum, recently published a report revealing the links between the Islamic State Khorasan Province (ISKP) and ISIS-affiliated fund-collecting networks in India.…
Phantom Goblin: An Emerging Menace in Credential Theft and Remote System Access
A complex malware campaign dubbed “Phantom Goblin” has been discovered, which employs social engineering techniques to install information-stealing malware. The malware is distributed by RAR attachments in spam messages, which includes a poisoned shortcut file posing as a PDF. …
Tencent’s AI Chatbot Yuanbao Becomes China’s Most Downloaded iOS App
Tencent’s AI chatbot, Yuanbao, has surpassed DeepSeek to become the most downloaded free app on China’s iOS App Store. The chatbot, launched in May 2024, gained significant traction following Tencent’s integration of DeepSeek’s R1 reasoning model in February. This…
Webcam Exploited by Ransomware Group to Circumvent EDR Protections
Researchers at S-RM have discovered an unusual attack method used by the Akira ransomware gang. The Akira ransomware gang utilized an unsecured webcam to conduct encryption attacks against victims’ networks via the use of an unsecured webcam. The attackers…
FBI Warns of Fake Ransom Demands Sent by Mail to US Executives
A new scam is targeting top business leaders in the United States, where criminals are sending letters demanding large ransom payments. Unlike typical ransomware attacks that involve hacking into computer systems, this scheme relies on physical mail. The letters…
Polish Space Agency Faces Cyberattack, Takes IT Systems Offline
The Polish Space Agency (POLSA) recently experienced a cybersecurity breach, prompting the organization to disconnect its IT infrastructure from the internet. POLSA confirmed the incident through a post on X, stating that relevant authorities had been notified. “There has…
North Korean Hackers Exploit ZIP Files in Sophisticated Cyber Attacks
State-sponsored hacking group APT37 (ScarCruft) is deploying advanced cyber-espionage tactics to infiltrate systems using malicious ZIP files containing LNK shortcuts. These files are typically disguised as documents related to North Korean affairs or trade agreements and are spread through…
Tata Technologies Cyberattack: Hunters International Ransomware Gang Claims Responsibility for 1.4TB Data Theft
Hunters International, a ransomware group known for high-profile cyberattacks, has claimed responsibility for a January 2025 cyberattack on Tata Technologies. The group alleges it stole 1.4TB of sensitive data from the company and has issued a threat to release…
Persistent Increase in Ransomware Attacks Raises Global Security Concerns
It was concluded that in the first five weeks of 2025, there was a significant increase in ransomware attacks targeted at the United States, marking a nearly 150% increase compared to the first five weeks of 2024. Based on…
Quantum Computers Threaten to Breach Online Security in Minutes
A perfect quantum computer could decrypt RSA-2048, our current strongest encryption, in 10 seconds. Quantum computing employs the principle of quantum physics to process information using quantum bits (qubits) rather than standard computer bits. Qubits can represent both states…