Most people click “agree” without looking – yet those agreements keep getting harder to understand. Complexity rises, researchers note, just as user protections shrink. From Cambridge, a recent study points out expanded corporate access to personal information. Legal barriers…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
PyTorch Lightning and Intercom Client Users Exposed to Credential Stealing Campaign
Python’s software supply chain has been compromised, which targeted the popular PyPI package Lightning and exposed downstream machine learning environments to covert credential theft through a sophisticated software supply chain compromise. In conjunction with Aikido Security, OX Security, Socket,…
Are You Letting AI Do Too Much of Your Thinking?
As artificial intelligence tools take on a growing share of everyday thinking tasks, researchers are raising concerns that this shift may be quietly affecting how people process information, remember ideas, and engage with their own work. When Nataliya Kosmyna…
Stryker Attack Wipes Thousands of Devices Without Malware
Stryker’s latest cyber incident is a stark reminder that attackers do not always need malware to cause major damage. The medical technology company said the breach was confined to its internal Microsoft environment and did not affect its products,…
eth.limo DNS Hijack Thwarted By DNSSEC After Social Engineering Attack On EasyDNS
Unexpectedly, the ENS gateway known as eth.limo revealed a DNS hijack stemming from a social engineering scheme aimed at EasyDNS, its domain provider. Though settings shifted temporarily under unauthorized access, safeguards held firm throughout. Protection layers blocked harm, keeping…
Retailer Secures Website After Customer Data Leak Risk Identified
Express has quietly fixed a security flaw that permitted unauthorized access to customer order data following a significant lapse in web application security. This vulnerability exposed sensitive information ranging from customer names, emails, telephone numbers, shipping details, and partial…
Fake Court Summons And Survey Scams Surge As Regions Bank Warns Of Rising Consumer Fraud Risks
Fear remains one of the most powerful tools scammers use, and today’s fraud tactics are evolving to exploit it more effectively than ever. Fake court summons and deceptive online survey scams are now being widely used to trick individuals…
Bank of America Bets Big on Risky Anthropic AI
Bank of America is aggressively expanding its use of Anthropic’s advanced AI technology, even as U.S. regulators issue stark cybersecurity warnings. The bank’s commitment highlights a broader trend where nearly 70% of financial institutions integrate AI into operations, prioritizing…
Hackers Use Hidden QEMU Linux VMs to Evade Windows Security and Launch Stealth Attacks
Cybersecurity experts have uncovered a stealthy tactic where attackers bypass Windows defenses by running concealed Linux virtual machines using QEMU. Researchers warn that these hidden environments allow threat actors to maintain persistent access, steal sensitive data, and even deploy…
Security Researchers Uncover QEMU-Powered Evasion in Payouts King Ransomware
Several recent incidents of ransomware activity attributed to the Payouts King operation have highlighted a systematic shift toward virtualization-assisted intrusions, with attackers embedding QEMU as an execution layer within compromised systems. QEMU instances can be configured as reverse SSH…
Salesforce’s New “Headless 360” Lets AI Agents Run Its Platform
Salesforce has introduced what it describes as the most crucial architectural overhaul in its 27-year history, launching a new initiative called “Headless 360.” The update is designed to allow artificial intelligence agents to control and operate the company’s entire…
Tinder And Zoom Introduce World ID Iris Scanning To Verify Humans Amid Rising AI Fake Profiles
Now comes eye-scan tech on Tinder and Zoom, rolling out to confirm real people behind profiles amid rising fears about AI mimics and bots. This move leans on identity checks from World ID – backed by Tools for Humanity…
Nvidia’s AI Launch Sparks Quantum Stock Surge, Minting Xanadu’s CEO a Billionaire
Quantum computing stocks jumped after Nvidia unveiled its Ising open-source AI model family, a move that investors interpreted as a strong validation of the sector. The result was a sharp rally in several names, with Xanadu standing out as…
Fake CAPTCHA Lures Power IRSF Fraud and Crypto Theft Campaigns
Research by Infoblox reveals a new fraud operation that combines routine web security practices with telecom billing abuse, resulting in unauthorized mobile activity by using counterfeit CAPTCHA interfaces. In this scheme, familiar human verification prompts are repurposed as covert…
ShinyHunters Targets McGraw Hill In Salesforce Data Leak Dispute Over Breach Scope
A breach at McGraw Hill came to light when details appeared on a leak page run by ShinyHunters, a hacking collective now seeking payment. Appearing online without warning, the listing suggested sensitive data had been taken. The firm acknowledged…
PhantomCore Exploits TrueConf Flaws to Breach Russian Networks
A pro-Ukrainian hacktivist group known as PhantomCore has been exploiting vulnerabilities in TrueConf video conferencing software to infiltrate Russian networks since September 2025. According to a Positive Technologies report, the attackers chained three undisclosed flaws in TrueConf Server, allowing…
The Shift from Cyber Defense to Recovery-Driven Security
There has been a structural recalibration of cybersecurity strategies as organizations recognize that breaches impact operations, finances, and reputation in ways that extend far beyond the moment of intrusion. Incidents that once remained within the domain of IT are…
AI Was Meant to Help. So Why Is It Making Work Harder for Women in Indonesia?
Artificial intelligence is often presented as a neutral and forward-looking force that improves efficiency and removes human bias from decision-making. In practice, however, many women working in Indonesia’s gig economy experience these systems very differently. Rather than easing workloads,…
Rival Ransomware Gangs 0APT And Krybit Clash In Unusual Cyber Extortion Battle
A clash almost unseen among digital outlaws has begun – 0APT, a hacking collective, now warns it will unmask operatives from enemy faction Krybit. This shift came to light through surveillance of hidden online forums. Tension simmers beneath the…
UAE Businesses Warned of Escalating AI‑Powered Cyber Threats
UAE businesses are being urgently warned about a sharp rise in AI‑powered cyber threats that can compromise systems within hours, and sometimes even minutes, if organisations remain unprepared. Cybercriminals are increasingly using artificial intelligence to craft highly realistic phishing…