Earlier this year, news reports revealed that a Florida-based data brokerage company had engaged in the sale of location data belonging to US military and intelligence personnel stationed overseas in the course of its operations. While at the time,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
AI Self-Replication: Scientists Warn of Critical “Red Line”
Scientists have raised concerns after artificial intelligence (AI) crossed a major threshold — self-replication. A new study from researchers at Fudan University in China reveals that two popular large language models (LLMs) successfully created functional copies of themselves, raising…
Two Russian Hackers Arrested for Large-Scale Ransomware Attacks
Authorities in the United States have charged two Russian nationals with carrying out widespread cyberattacks using Phobos ransomware. The suspects, Roman Berezhnoy (33) and Egor Nikolaevich Glebov (39), were arrested in Thailand for allegedly orchestrating more than a thousand…
XE Group Rebrands Its Cybercrime Strategy by Targeting Supply Chains
Over the past decade, there has been a rise in the number of cyber threats targeting the country, including the XE Group, a hacker collective with Vietnamese connections. According to recent investigations, the group was responsible for exploiting two…
RBI Launches “bank.in” Domain to Combat Digital Banking Scam
The Reserve Bank of India (RBI) has made the “bank.in” domain exclusive to all authorised banking institutions in India in an effort to strengthen digital banking security and shield customers from online banking fraud. This effort aims to minimise…
Cybercriminals Intensify Attacks on Password Managers
Cybercriminals are increasingly setting their sights on password managers as a way to infiltrate critical digital accounts. According to Picus Security’s Red Report 2025, which analyzed over a million malware samples from the past year, a quarter (25%) of…
Rising Robocall Cyber Threat and Essential Protection Strategies
A persistent cybersecurity concern has long been robocall scams. However, recent developments indicate that this type of attack is becoming increasingly sophisticated and dangerous as a result of these developments. In a recent incident, Telnyx, a provider of Voice…
Apple Patches Zero-Day Flaw allowing Third-Party Access to Locked Devices
Tech giant Apple fixed a vulnerability that “may have been leveraged in a highly sophisticated campaign against specific targeted individuals” in its iOS and iPadOS mobile operating system updates earlier this week. According to the company’s release notes for…
SMS Toll Scam Tricks Victims Into Activating Phishing Links
SMS phishing scams targeting tollway users have been spreading across the U.S., with fraudsters impersonating tolling agencies to steal personal information. These scams typically involve sending text messages claiming the recipient has an unpaid toll balance. Victims are then…
Apple and Google Remove 20 Apps Infected with Data-Stealing Malware
Apple and Google have removed 20 apps from their respective app stores after cybersecurity researchers discovered that they had been infected with data-stealing malware for nearly a year. According to Kaspersky, the malware, named SparkCat, has been active since March…
Understanding the Importance of 5G Edge Security
As technology advances, the volume of data being generated daily has reached unprecedented levels. In 2024 alone, people are expected to create over 147 zettabytes of data. This rapid growth presents major challenges for businesses in terms of processing,…
Global Crackdown on Phobos Ransomware, Two Arrested
A major international police operation has resulted in the arrest of two individuals suspected of carrying out ransomware attacks worldwide. The operation also led to the takedown of dark web platforms associated with a notorious cybercrime group. Suspects Arrested…
FBI Alerts Users of Surge in Gmail AI Phishing Attacks
Phishing scams have been around for many years, but they are now more sophisticated than ever due to the introduction of artificial intelligence (AI). As reported in the Hoxhunt Phishing Trends Report, AI-based phishing attacks have increased dramatically since…
Virtual Credit Cards: How They Work, Benefits, and Security Features
Virtual credit cards are digital versions of traditional credit cards, designed to enhance security in online transactions. Instead of using a physical card number, they generate a unique number for each purchase, reducing the risk of data breaches and…
2FA Under Attack as Astaroth Phishing Kit Spreads
Astaroth is the latest phishing tool discovered by cybercriminals. It has advanced capabilities that allow it to circumvent security measures such as two-factor authentication (2FA) when used against it. In January 2025, Astaroth made its public debut across multiple…
Urgent Patch Needed for SonicWall Firewall Exploit Enabling VPN Hijacking
Bishop Fox cybersecurity researchers have discovered a critical security flaw in approximately 4,500 SonicWall firewalls that are exposed to the Internet as a result of a critical security breach. The flaw, CVE-2024-53704, is a high-severity authentication bypass vulnerability within…
Credential-Stealing Malware Surges, Now a Top MITRE ATT&CK Threat
Cybersecurity researchers have uncovered a sharp rise in credential-stealing malware, with 25% of over a million malware samples analyzed in 2024 targeting user credentials. This marks a threefold increase from 2023, propelling credential theft from password stores into the…
Hackers Exploit Exposed Security Keys to Inject Code into Websites
Cybercriminals are exploiting leaked cryptographic keys to manipulate authentication systems, decode protected data, and install harmful software on vulnerable web servers. These attacks can give hackers unauthorized control over websites and would allow them to maintain access for long…
2.8 million IP Addresses Being Leveraged in Brute Force Assault On VPNs
Almost 2.8 million IP addresses are being used in a massive brute force password attack that aims to guess the login credentials for a variety of networking devices, including those generated by Palo Alto Networks, Ivanti, and SonicWall. A…
LegionLoader Malware Resurfaces with Evasive Infection Tactics
Researchers at TEHTRIS Threat Intelligence have uncovered a new wave of LegionLoader, a malware downloader also known as Satacom, CurlyGate, and RobotDropper. This sophisticated threat has been rapidly gaining momentum, with over 2,000 samples identified in recent weeks. According…