Security researchers have identified a weakness in the web-based dashboard used by operators of the StealC information-stealing malware, allowing them to turn the malware infrastructure against its own users. The flaw made it possible to observe attacker activity and gather…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
European Authorities Identify Black Basta Suspects as Ransomware Group Collapses
Two Ukrainians are now under suspicion of aiding Black Basta, a ransomware network tied to Russia, after joint work by police units in Ukraine and Germany – this step adds pressure on the hacking group’s operations. The man believed…
UAE Banks Ditch SMS OTPs for Biometric App Authentication
UAE banks have discontinued SMS-based one-time passwords (OTPs) for online transactions from January 6, 2026, moving customers to app-based and biometric authentication as part of a wider security overhaul led by the Central Bank of the UAE. This marks…
Transparent Tribe Targets Indian Public Sector and Academic Networks
Several recent cyber espionage campaigns have drawn attention to Transparent Tribe, a long-standing advanced persistent threat group associated with a new wave of intrusions targeting Indian government bodies, academic institutions, and strategically sensitive organizations, which have re-opened the issue of…
AI Can Answer You, But Should You Trust It to Guide You?
Artificial intelligence tools are expanding faster than any digital product seen before, reaching hundreds of millions of users in a short period. Leading technology companies are investing heavily in making these systems sound approachable and emotionally responsive. The goal is…
Black Basta Under Pressure After Ukraine Germany Enforcement Operation
Investigators say the Black Basta ransomware campaign left a trail of disruption that extended across Europe and beyond, impacting everything from hospital wards to industrial production lines that were abruptly halted, resulting in a temporary ban of internet and…
Malicious Chrome Extensions Target Enterprise HR and ERP Platforms to Steal Credentials
One after another, suspicious Chrome add-ons began appearing under false pretenses – each masquerading as helpful utilities. These were pulled from public view only after Socket, a cybersecurity group, traced them back to a single pattern of abuse. Instead…
Cybersecurity Falls Behind as Threat Scale Outpaces Capabilities
Cyber defence is entering its 2026 year with the balance of advantage increasingly being determined by speed rather than sophistication. With the window between intrusion and impact now measured in minutes rather than days instead of days, the advantage is…
GootLoader Malware Uses Malformed ZIP Archives to Evade Detection
A fresh tactic has emerged among cybercriminals using GootLoader, a JavaScript-driven malware installer. Instead of standard compression, they now distribute broken ZIP files designed to slip past digital defenses. These flawed archives exploit differences across decompression programs – some…
GhostPoster Malware Campaign Exposes Browser Extension Risks
A stealthy malware operation has been discovered by cybersecurity researchers, which remained undetected for a period of up to five years and accumulated more than 840,000 downloads on various platforms. The research began with a study by Koi Security…
CIRO Discloses Phishing Breach Impacting Personal Data of 750,000 Individuals
The Canadian Investment Regulatory Organization (CIRO) serves as the country’s national self-regulatory authority for investment dealers and marketplaces, with responsibilities that include investor protection, regulatory enforcement, and ensuring the integrity and efficiency of Canada’s capital markets. CIRO has disclosed…
Security Researchers Warn of ‘Reprompt’ Flaw That Turns AI Assistants Into Silent Data Leaks
Cybersecurity researchers have revealed a newly identified attack technique that shows how artificial intelligence chatbots can be manipulated to leak sensitive information with minimal user involvement. The method, known as Reprompt, demonstrates how attackers could extract data from AI…
AWS CodeBuild Misconfiguration Could Have Enabled Full GitHub Repository Takeover
One mistake in how Amazon Web Services set up its CodeBuild tool might have let hackers grab control of official AWS GitHub accounts. That access could spill into more parts of AWS, opening doors for wide-reaching attacks on software…
Lumen Disrupts Aisuru–Kimwolf Botnet Powering Massive DDoS Attacks
Lumen Technologies’ Black Lotus Labs has successfully disrupted more than 550 command-and-control (C2) servers connected to the Aisuru and Kimwolf botnets, a large-scale malicious infrastructure widely used for distributed denial-of-service (DDoS) attacks and residential proxy abuse. Aisuru operates as…
Google Rolls Out Gmail Address Change Feature
Google has rolled out a major update that will allow users to change their main @gmail.com address. This much-needed feature is being rolled out starting January 2026. Before this update, Gmail users were stuck with their original username for…
Surge in Cybercrime Undermines Online Safety Efforts
With data breaches, ransomware incidents, and state-sponsored digital espionage increasingly dominating global headlines, cybersecurity has become a strategic priority for governments and corporations alike, moving from a back-office concern to a front-line concern. A widening gap between risk and…
Researchers Disrupt Major Botnet Network After It Infects Millions of Android Devices
Security researchers have dismantled a substantial portion of the infrastructure powering the Kimwolf and Aisuru botnets, cutting off communication to more than 550 command-and-control servers used to manage infected devices. The action was carried out by Black Lotus Labs,…
AI Agent Integration Can Become a Problem in Workplace Operations
AI agents were considered harmless sometime ago. They did what they were supposed to do: write snippets of code, answer questions, and help users in doing things faster. Then business started expecting more. Slowly, companies started using organizational agents over…
Russia-Linked Lynx Gang Claims Ransomware Attack on CSA Tax & Advisory
A breach surfaces in Haverhill – CSA Tax & Advisory, a name among local finance offices, stands at the center. Information about clients, personal and business alike, may have slipped out. A digital crew tied to Russia, calling themselves…
Google Appears to Be Preparing Gemini Integration for Chrome on Android
Google appears to be testing a new feature that could significantly change how users browse the web on mobile devices. The company is reportedly experimenting with integrating its AI model, Gemini, directly into Chrome for Android, enabling advanced agentic…