Prominent Bitcoin developer Peter Todd has accused the U.S. National Security Agency (NSA) of attempting to “backdoor crypto again” through the introduction of so-called quantum-secure algorithms that could exclude traditional cryptographic safeguards. “Tl;dr: the NSA is clearly looking to…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Paying Ransom Does Not Guarantee Data Restoration: Report
A new report claims that smaller firms continue to face dangers in the digital domain, as ransomware threats persistently target organizations. Hiscox’s Cyber Readiness Report surveyed 6,000 businesses, and over 59% report they have been hit by a cyber attack…
Spanish Police Dismantle AI-Powered Phishing Network and Arrest Developer “GoogleXcoder”
Spanish authorities have dismantled a highly advanced AI-driven phishing network and arrested its mastermind, a 25-year-old Brazilian developer known online as “GoogleXcoder.” The operation, led by the Civil Guard’s Cybercrime Department, marks a major breakthrough in the ongoing fight…
Red Hat Data Breach Deepens as Extortion Attempts Surface
The cybersecurity breach at enterprise software provider Red Hat has intensified after the hacking collective known as ShinyHunters joined an ongoing extortion attempt initially launched by another group called Crimson Collective. Last week, Crimson Collective claimed responsibility for infiltrating…
Sensitive Information of NSW Flood Victims Mistakenly Entered into ChatGPT
A serious data breach involving the personal details of thousands of flood victims has been confirmed by the New South Wales government in an unsettling development that highlights the fragile boundary between technology and privacy. There has been an…
Clop Ransomware Exploits Oracle Zero-Day in Major Extortion Campaign
The Clop ransomware gang has orchestrated a massive extortion campaign targeting Oracle E-Business Suite customers by exploiting a critical zero-day vulnerability tracked as CVE-2025-61882. The vulnerability, which carries a CVSS score of 9.8, affects Oracle EBS versions 12.2.3 through…
Discord confirms third-party support breach; some users’ ID photos, support messages and limited payment details were accessed
Discord, the popular communication platform used by millions worldwide, has confirmed a data breach that compromised the systems of one of its third-party customer support providers. The incident, which occurred on September 20, 2025, allowed an unauthorized individual to…
Microsoft to end support for Windows 10, 400 million PCs will be impacted
Microsoft is ending software updates for Windows 10 From October 14, Microsoft will end its support for Windows 10, experts believe it will impact around 400 million computers, exposing them to cyber threats. People and groups worldwide are requesting that…
Zimbra Zero-Day Exploit Used in ICS File Attacks to Steal Sensitive Data
Security researchers have discovered that hackers exploited a zero-day vulnerability in Zimbra Collaboration Suite (ZCS) earlier this year using malicious calendar attachments to steal sensitive data. The attackers embedded harmful JavaScript code inside .ICS files—typically used to schedule and…
Ransomware Gang Claims Boeing, Samsung Supplier Breach in 11GB Data Theft
A ransomware group named J GROUP claims to have breached Dimensional Control Systems (DCS), stealing 11GB of sensitive data, including proprietary software architecture, client metadata, and internal security procedures. DCS, a Michigan-based provider of dimensional engineering software, serves major…
Thousands of Government IDs at Risk Following Breach Involving Discord’s Verification Partner
Currently, one of the threats associated with digital identity verification can often be found in the form of cyberattacks targeting third-party service providers linked to Discord, with the result that sensitive personal data belonging to nearly 70,000 users may have…
Zero-click Exploit AI Flaws to Hack Systems
What if machines, not humans, become the centre of cyber-warfare? Imagine if your device could be hijacked without you opening any link, downloading a file, or knowing the hack happened? This is a real threat called zero-click attacks, a covert…
Rise of Evil LLMs: How AI-Driven Cybercrime Is Lowering Barriers for Global Hackers
As artificial intelligence continues to redefine modern life, cybercriminals are rapidly exploiting its weaknesses to create a new era of AI-powered cybercrime. The rise of “evil LLMs,” prompt injection attacks, and AI-generated malware has made hacking easier, cheaper, and…
Payroll Hackers Target U.S. Universities, Microsoft Warns
Microsoft researchers have surfaced a new phishing campaign where cybercriminals are stealing university employees’ salaries by redirecting their payroll deposits to accounts under their control. The group behind the attacks has been named “Storm-2657” by Microsoft. The hackers have…
How Reporting Spam Calls and Texts Helps Stop Scammers for Everyone
Almost everyone has experienced an unexpected call or text from an unknown number. While some turn out to be harmless misdials, many are actually spam or phishing attempts aimed at stealing personal or financial information. In some cases,…
Google Launches Gemini AI Across Home and Nest Devices
Google has unveiled its new Gemini-powered smart home lineup and AI strategy, positioning its AI assistant Gemini at the core of refreshed Google Home and Nest devices. This reimagined approach follows Amazon’s recent Echo launch, highlighting an intensifying competition…
Unauthorized Use of AI Tools by Employees Exposes Sensitive Corporate Data
Artificial intelligence has rapidly revolutionised the modern workplace, creating both unprecedented opportunities and presenting complex challenges at the same time. Despite the fact that AI was initially conceived to improve productivity, it has quickly evolved into a transformational force…
Oura Users Express Concern Over Pentagon Partnership Amid Privacy Debates
Oura, the Finnish company known for its smart health-tracking rings, has recently drawn public attention after announcing a new manufacturing facility in Texas aimed at meeting the needs of the U.S. Department of Defense (DoD). The partnership, which has…
Agentic AI Demands Stronger Digital Trust Systems
As agentic AI becomes more common across industries, companies face a new cybersecurity challenge: how to verify and secure systems that operate independently, make decisions on their own, and appear or disappear without human involvement. Consider a financial firm…
Red Hat Hit by Data Breach, Hackers Exploit GitLab Instance
An extortion gang by the name of Crimson Collective claimed to have stolen approximately 570GB of compressed data from internal development repositories belonging to Red Hat. Red Hat confirmed the breach impacted one of its GitLab instances. The stolen data…