Tag: CySecurity News – Latest Information Security and Hacking Incidents

Fake Wedding Invitation Malware Targets Android Users

  Malicious actors are propagating a recently discovered Android malware called Tria by sending phoney wedding invitations to consumers in Brunei and Malaysia.  According to a report published by the Russian cybersecurity firm Kaspersky, the attackers have been using private…

Grubhub Data Breach Exposes Customer and Driver Information

  Food delivery service Grubhub has suffered a security breach that exposed sensitive information belonging to customers, drivers, and merchants. The breach, caused by unauthorized access through a third-party service provider, compromised personal details, hashed passwords, and partial credit card…

Kimsuky Hackers Deploy forceCopy Malware in Spear-Phishing Attacks

  North Korea-linked hacking group Kimsuky has been identified conducting targeted spear-phishing campaigns to distribute an information stealer known as forceCopy, according to the latest findings from the AhnLab Security Intelligence Center (ASEC). The cyberattacks begin with phishing emails that…

Hackers Use Forked Stealer to Breach Russian Businesses

  As of January 2025, there were multiple attacks on Russian organizations across several industries, including finance, retail, information technology, government, transportation, and logistics, all of which have been targeted by BI.ZONE. The threat actors have used NOVA stealer, a…

Dangers of AI Phishing Scam and How to Spot Them

Supercharged AI phishing campaigns are extremely challenging to notice. Attackers use AI phishing scams with better grammar, structure, and spelling, to appear legit and trick the user. In this blog, we learn how to spot AI scams and avoid becoming…

RSA Encryption Breached by Quantum Computing Advancement

  A large proportion of the modern digital world involves everyday transactions taking place on the internet, from simple purchases to the exchange of highly sensitive corporate data that is highly confidential. In this era of rapid technological advancement, quantum…

Quishing On The Rise: Strategies to Avert QR Code Phishing

  QR codes are already ubiquitous: from restaurant menus to public transportation schedules, everyone wants you to scan theirs. This normalisation of scanning random QR codes is being exploited, resulting in a new cybersecurity threat known as Quishing.  What is…

EU Bans AI Systems Deemed ‘Unacceptable Risk’

  As outlined in the European Union’s (EU) Artificial Intelligence Act (AI Act), which was first presented in 2023, the AI Act establishes a common regulatory and legal framework for the development and application of artificial intelligence. In April 2021,…

DeepSeek’s Data Use Raises Regulatory Concerns

  There have been numerous scandals surrounding this artificial intelligence company which had astonished the world by seemingly rivaling the successful chatbot ChatGPT at a fraction of the cost. However, now, regulators and privacy advocates have raised questions about the…

Cybercriminals Entice Insiders with Ransomware Recruitment Ads

  Cybercriminals are adopting a new strategy in their ransomware demands—embedding advertisements to recruit insiders willing to leak company data. Threat intelligence researchers at GroupSense recently shared their findings with Dark Reading, highlighting this emerging tactic. According to their analysis,…

Two-Month Cyber Breach at Mizuno USA Under Investigation

  Unauthorized access to Mizuno USA’s network has resulted in a compromise of sensitive customer information, which has caused Mizuno USA to notify its customers about the breach. In a letter to affected individuals, the sports gear manufacturer shared information…

DeepSeek’s Rise: A Game-Changer in the AI Industry

< p style=”text-align: justify;”>January 27 marked a pivotal day for the artificial intelligence (AI) industry, with two major developments reshaping its future. First, Nvidia, the global leader in AI chips, suffered a historic loss of $589 billion in market value…

How Google Enhances AI Security with Red Teaming

  Google continues to strengthen its cybersecurity framework, particularly in safeguarding AI systems from threats such as prompt injection attacks on Gemini. By leveraging automated red team hacking bots, the company is proactively identifying and mitigating vulnerabilities. Google employs an…

Smiths Group Reports Cybersecurity Incident: Systems Breached

  < p style=”text-align: justify;”>Smiths Group, a London-listed engineering firm operating in energy, security, aerospace, and defence, has reported a cybersecurity incident involving unauthorised access to its systems. The company has taken immediate steps to mitigate potential disruptions and contain…

Cryptojacking: The Silent Cybersecurity Threat Surging in 2023

< p style=”text-align: justify;”>Cryptojacking, the unauthorized exploitation of an organization’s computing resources to mine cryptocurrency, has emerged as a significant yet often overlooked cybersecurity threat. Unlike ransomware, which overtly disrupts operations, cryptojacking operates covertly, leading to substantial financial and operational…

New Phishing Scam Targets Amazon Prime Subscribers

  < p style=”text-align: justify;”> A new cyber attack is putting Amazon Prime subscribers at risk. Hackers are sending malicious emails warning users that their Prime membership is about to expire. These emails contain attachments with dangerous links that redirect…

Cyberattackers Exploit GhostGPT for Low-Cost Malware Development

  The landscape of cybersecurity has been greatly transformed by artificial intelligence, which has provided both transformative opportunities as well as emerging challenges. Moreover, AI-powered security tools have made it possible for organizations to detect and respond to threats much…

Cybercriminals Exploit PDFs in Novel Mishing Campaign

  In a recently uncovered phishing campaign, threat actors are employing malicious PDF files to target mobile device users in potentially more than fifty nations. Dubbed as the “PDF Mishing Attack,” the effort exposes new vulnerabilities in mobile platforms by…

Generative AI in Cybersecurity: A Double-Edged Sword

Generative AI (GenAI) is transforming the cybersecurity landscape, with 52% of CISOs prioritizing innovation using emerging technologies. However, a significant disconnect exists, as only 33% of board members view these technologies as a top priority. This gap underscores the challenge…

The Evolving Role of Multi-Factor Authentication in Cybersecurity

  < p style=”text-align: justify;”>In recent years, the cybersecurity landscape has faced an unprecedented wave of threats. State-sponsored cybercriminals and less experienced attackers armed with sophisticated tools from the dark web are relentlessly targeting weak links in global cybersecurity systems.…

Hackers Exploit WordPress Sites to Attack Mac and Windows Users

According to security experts, threat actors are abusing out-of-date versions of WordPress and plug-ins to modify thousands of sites to trap visitors into downloading and installing malware. In a conversation with cybersecurity news portal TechCrunch, Simon Wijckmans, founder and CEO…

Subaru Starlink Security Flaw Exposes Risks of Connected Cars

  As vehicles become increasingly connected to the internet, cybersecurity threats pose growing risks to drivers. A recent security flaw in Subaru’s Starlink system highlights the potential dangers, allowing hackers to remotely control vehicles and access sensitive data. This incident…

The Evolution of Data Protection: Moving Beyond Passwords

  < p style=”text-align: justify;”>As new threats emerge and defensive strategies evolve, the landscape of data protection is undergoing significant changes. With February 1 marking Change Your Password Day, it’s a timely reminder of the importance of strong password habits…

Three Ways To Prevent Insider Threat Driven Data Leaks

  The United States is poised to undergo a period of highly disruptive transformation. The incoming administration has promised to make significant changes, including forming a new body, the Department of Governmental Efficiency (DOGE), with the aim of substantially reducing…

Hackers Use IT Support Disguise to Infiltrate Systems

  Cybercriminals in Russia are using a scam to trick their victims into allowing them to install ransomware on their computers by pretending to be technical support via Microsoft Teams. Once they have convinced victims they have an IT problem,…

Cybercriminals Use Google Ads and URL Cloaking to Spread Malware

  Cybercriminals are increasingly using Google ads and sophisticated cloaking techniques to push malware onto unsuspecting users. The latest example involves a fake Homebrew website that tricked users into downloading an infostealer designed to steal sensitive data, including login credentials…

Malware Infections Surge from Fake VPN Downloads

  An attacker is reportedly injecting malware into infected devices using popular VPN applications to gain remote control of the devices they are attacking. Google’s Managed Defense team reported this disturbing finding, which sheds light on how malicious actors use…

IPany VPN Compromised in Supply Chain Attack Deploying Custom Malware

  South Korean VPN provider IPany fell victim to a supply chain attack orchestrated by the China-aligned hacking group “PlushDaemon.” The attackers compromised IPany’s VPN installer, embedding a custom malware named ‘SlowStepper’ into the installer file, affecting customers upon installation.…

Critical Flaws in VPN Protocols Leave Millions Vulnerable

  < p style=”text-align: justify;”> Virtual Private Networks (VPNs) are widely trusted for protecting online privacy, bypassing regional restrictions, and securing sensitive data. However, new research has uncovered serious flaws in some VPN protocols, exposing millions of systems to potential…

Best Tor Browser Substitute for Risk-Free Web Surfing

  Anonymous Browsing: Tools and Extensions for Enhanced Privacy < p style=”text-align: justify;”> Anonymous browsing is designed to conceal your IP address and location, making it appear as though you are in a different region. This feature is particularly useful…

A Closer Look at Torrenting and Its Applications

  Downloading through a peer-to-peer (P2P) network referred to as torrenting involves either using torrent files or magnet links to download files. Torrent files are index files that provide the necessary information to locate certain files, segments of files, or…

T-Mobile Enhances Cybersecurity with Yubikey Security Keys

  T-Mobile has taken a significant step in enhancing its cybersecurity by adopting Yubikey security keys for its employees. The company purchased over 200,000 security keys from Yubico, deploying them across all staff, vendors, and authorized retail partners. The rollout,…

VPN Services May Not Be as Secure as They Seem, Recent Research Finds

  VPNs are widely known for their benefits, including preventing location-based overcharging, safeguarding online privacy, and enabling access to geographically restricted content like foreign Netflix libraries. Historically, VPNs have been considered safe, but a new investigation by Top10VPN challenges this…

Why AI-Driven Cybercrime Is the Biggest Threat of 2025

  AI in Cybercrimes: Rising Threats and Challenges Kuala Lumpur: The increasing use of artificial intelligence (AI) in cybercrimes is becoming a grave issue, says Datuk Seri Ramli Mohamed Yoosuf, Director of Malaysia’s Commercial Crime Investigation Department (CCID). Speaking at…

Why MFA Failures Signal Greater Cybersecurity Challenges

  In the current cybersecurity era, multi-factor authentication (MFA) is widely recommended and often mandated across several sectors, making it one of the most popular security measures that are available. As stated by the Cybersecurity and Infrastructure Security Agency (CISA),…

A Looming Threat to Crypto Keys: The Risk of a Quantum Hack

  The Quantum Computing Threat to Cryptocurrency Security < p style=”text-align: justify;”> The immense computational power that quantum computing offers raises significant concerns, particularly around its potential to compromise private keys that secure digital interactions. Among the most pressing fears…

FortiGate Vulnerability Exposes 15,000 Devices to Risks

  Fortinet Firewall Data Breach: 15,000 Devices Compromised by Belsen Group < p style=”text-align: justify;”> On January 14, 2025, it was reported that the configuration data of over 15,000 Fortinet FortiGate firewalls was leaked on the dark web. The hacker…

EU Mandates Tougher Cybersecurity for Banking Sector

  European Banks Strengthen Cybersecurity Amid Strict Regulations European banks are being compelled to enhance their cybersecurity systems to comply with stringent regulations aimed at safeguarding critical infrastructure against cyber threats. The rise of digital tools in the financial sector…

Willow Data Exposure Puts Over 240,000 Customer Records at Risk

  Data Breach at Willow Exposes Over 240,000 Customer Records < p style=”text-align: justify;”> A significant data exposure incident involving the Chicago-based financial technology firm Willow has left the personal details of more than 240,000 customers vulnerable. Willow, which offers…

AVSLabs at Cybersec Asia 2025: Securing the Digital World

AVSLabs is excited to take part in Cybersec Asia 2025, a major cybersecurity event happening on January 22-23, 2025, at the Queen Sirikit National Convention Center (QSNCC) in Bangkok, Thailand. This event brings together top industry leaders and professionals to…

Telegram’s TON Blockchain Embarks on US Growth Mission

  A foundation, closely associated with Telegram, called the Open Network (TON), is pursuing ambitious expansion in the United States. A strategic move like this comes amid the expectation that Donald Trump’s upcoming administration will be able to offer a…