The University of Western Australia (UWA) has confirmed a concerning cybersecurity incident that left thousands of staff, students, and visitors temporarily locked out of their accounts after hackers gained access to password data. The breach was detected late Saturday,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Gemini Flaw Exposed Via Malicious Google Calendar Invites, Researchers Find
Google recently fixed a critical vulnerability in its Gemini AI assistant, which is tightly integrated with Android, Google Workspace, Gmail, Calendar, and Google Home. The flaw allowed attackers to exploit Gemini via creatively crafted Google Calendar invites, using indirect…
Israel and Iran Cyber War Escalates After June Conflict Despite Ceasefire
The long-running cyber conflict between Israel and Iran has intensified following the June war, according to a recent report by the Financial Times. Israeli officials disclosed that they began receiving suspicious text messages containing malicious links soon after the…
Why Hackers Focus on Certain Smart Home Devices and How to Safeguard Them
In an era where convenience is the hallmark of modern living, smart devices have become a large part of households around the world, offering a range of advantages from voice-activated assistants to connected cameras and appliances. These technologies promise…
Peter Burke Unveils Generative AI-Powered Autonomous Drone Software, Redefining Robotics
In a major leap for artificial intelligence and robotics, computer scientist Peter Burke has introduced a project that uses generative AI to build autonomous drone software. Far from being a routine technical experiment, this initiative marks a pivotal shift…
Hackers Are Spreading Malware Through SVG Images on Facebook
The growing trend of age checks on websites has pushed many people to look for alternative platforms that seem less restricted. But this shift has created an opportunity for cybercriminals, who are now hiding harmful software inside image files that…
How Scammers Use Deepfakes in Financial Fraud and Ways to Stay Protected
Deepfake technology, developed through artificial intelligence, has advanced to the point where it can convincingly replicate human voices, facial expressions, and subtle movements. While once regarded as a novelty for entertainment or social media, it has now become a…
Taiwanese Web Hosting Infrastructure Hit by UAT-7237
A recent report from Cisco Talos exposes a cyber intrusion by a suspected Chinese-government-backed hacking collective, tracked as UAT-7237, into a Taiwanese web hosting provider. The attackers aimed to steal credentials and implant backdoors, enabling persistent and covert access…
Microsoft Flaw Blamed as Hackers Breach Canada’s House of Commons
In a recent security incident involving Canada’s parliamentary network, hackers exploited a recently released Microsoft vulnerability to breach the House of Commons network, shaking up the country’s parliament. According to an internal e-mail obtained by CBC News, the intrusion…
‘Samourai’ Cryptomixer Founders Admit to Money Laundering Charges
Two executives behind a cryptocurrency service called Samourai Wallet have admitted in court that they helped criminals hide more than $200 million. Keonne Rodriguez, the company’s CEO, and William Lonergan Hill, its chief technology officer, pleaded guilty to conspiracy…
Black Hat 25 Reveals What Keeps Cyber Experts Awake
In an era where cyber threats are becoming increasingly complex, Black Hat USA 2025 sounded alarms ringing with a sense of urgency that were unmistakable in the way they were sounded. As Nicole Perlroth, formerly a New York Times…
Hackers Bypassed Microsoft Defender to Deploy Ransomware on PCs
GuidePoint Security’s latest report reveals a sophisticated Akira ransomware campaign exploiting SonicWall VPNs through the strategic use of malicious Windows drivers. The campaign, which began in late July 2025, represents a significant escalation in the group’s tactics for evading…
Leaked Data Exposes Daily Lives of North Korean IT Workers in Remote Work Scams
A recent data leak has shed rare light on the hidden world of North Korean IT workers who carry out remote work scams worldwide. The revelations not only expose the highly organized operations of these state-sponsored workers but also…
Indian Government Flag Security Concerns with WhatsApp Web on Work PCs
The Indian government has issued a significant cybersecurity advisory urging citizens to avoid using WhatsApp Web on office computers and laptops, highlighting serious privacy and security risks that could expose personal information to employers and cybercriminals. The Ministry of…
Airline suffers data breach, customer information stolen
Air France and KLM announced that threat actors had compromised a customer service platform and stolen customer data. Along with Transavia, KLM and Air France are units of Air France-KLM Group, a Dutch-French multinational airline holding organization. Established in 2004,…
US Lawmakers Raise Concerns Over AI Airline Ticket Pricing Practices
Airline controversies often make headlines, and recent weeks have seen no shortage of them. Southwest Airlines faced passenger backlash after a leaked survey hinted at possible changes to its Rapid Rewards program. Delta Air Lines also reduced its Canadian…
Croatia’s Largest Research Institute Hit by Ransomware in Global ToolShell Exploits
The Ruđer Bošković Institute (RBI) in Zagreb — Croatia’s biggest science and technology research center has confirmed it was one of thousands of organizations worldwide targeted in a massive cyberattack exploiting Microsoft SharePoint’s “ToolShell” security flaws. The incident occurred on…
Pro-Russian Hackers Breach Norwegian Dam Systems
The Norwegian authorities have confirmed, in a development that illustrates the escalation of cyber threats on Europe’s critical infrastructure, that pro-Russian hackers sabotaged a dam in April, affecting water flow for a short period of time. A remote control…
UK Police’s Passport Photo Searches Spark Privacy Row Amid Facial Recognition Surge
. Police in the UK have carried out hundreds of facial recognition searches using the national passport photo database — a move campaigners call a “historic breach of the right to privacy,” The Telegraph has reported. Civil liberties groups…
How ChatGPT prompt can allow cybercriminals to steal your Google Drive data
Chatbots and other AI tools have made life easier for threat actors. A recent incident highlighted how ChatGPT can be exploited to obtain API keys and other sensitive data from cloud platforms. Prompt injection attacks leads to cloud access Experts…