“Think before you click”: Microsoft warns all Windows PC users and as well as macOS users, from a series of attacks that are “targeting thousands of enterprise and end-user devices globally every day.” The scripts deploy malware on these devices,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cybersecurity: The Top Business Risk Many Firms Still Struggle to Tackle
Cybersecurity has emerged as the biggest threat to modern enterprises, yet most organizations remain far from prepared to handle it. Business leaders are aware of the risks — financial losses, reputational harm, and operational disruptions but awareness has not…
Congress Questions Hertz Over AI-Powered Scanners in Rental Cars After Customer Complaints
Hertz is facing scrutiny from U.S. lawmakers over its use of AI-powered vehicle scanners to detect damage on rental cars, following growing reports of customer complaints. In a letter to Hertz CEO Gil West, the House Oversight Subcommittee on…
Transparent Tribe Target Indian Government’s Custom Linux OS with Weaponized Desktop Files
Transparent Tribe, a cyber-espionage group believed to originate from Pakistan and also known as APT36, has stepped up its attacks on Indian government entities by using malicious desktop shortcuts designed to compromise both Windows and BOSS Linux systems. The…
Worker Sentenced to Four Years for Compromising Company IT Infrastructure
It is the case of a Chinese-born software developer who has been sentenced to four years in federal prison after hacking into the internal systems of his former employer, in a stark warning of the dangers of insider threats…
APT36 Exploits Linux .desktop Files for Espionage Malware in Ongoing Cyber Attacks
The Pakistani threat group APT36 has launched new cyber-espionage attacks targeting India’s government and defense sectors by abusing Linux .desktop files to deploy malware. According to recent reports from CYFIRMA and CloudSEK, the campaign—first detected on August 1, 2025—is…
India Most Targeted by Malware as AI Drives Surge in Ransomware and Phishing Attacks
India has become the world’s most-targeted nation for malware, according to the latest report by cybersecurity firm Acronis, which highlights how artificial intelligence is fueling a sharp increase in ransomware and phishing activity. The findings come from the company’s…
How Image Resizing Could Expose AI Systems to Attacks
Security experts have identified a new kind of cyber attack that hides instructions inside ordinary pictures. These commands do not appear in the full image but become visible only when the photo is automatically resized by artificial intelligence (AI) systems.…
ReVault Flaws Expose Dell ControlVault3 Hardware to Persistent Attacks
RevaUlt, a company marketing itself on advanced endpoint protection and next-generation SOC capabilities, recently suffered a severe security breach. The attackers penetrated its internal environment, exploiting vulnerabilities in the architecture used for their supposed secure SOC platform. The compromise…
Verizon Reimagines the Household Phone Number with Family Line for the Digital Era
Verizon has faced challenges in recent months. They have faced mounting criticism for a number of controversial decisions that have left many of their long-time subscribers wondering why they still belong to Verizon. When Verizon eliminated customer loyalty discounts and…
New Shamos Malware Targets Mac Users Through Fake Tech Support Sites
Cybersecurity researchers have unearthed a new Mac-targeting malware called Shamos that deceives users through fake troubleshooting guides and repair solutions. This information-stealing malware, developed by the cybercriminal organization “COOKIE SPIDER,” represents a variant of the previously known Atomic macOS…
FreeVPN.One Chrome Extension Caught Secretly Spying on Users With Unauthorized Screenshots
Security researchers are warning users against relying on free VPN services after uncovering alarming surveillance practices linked to a popular Chrome extension. The extension in question, FreeVPN.One, has been downloaded over 100,000 times from the Chrome Web Store and…
Millions of Patient Records Compromised After Ransomware Strike on DaVita
Healthcare Faces Growing Cyber Threats A ransomware attack that affected nearly 2.7 million patients has been confirmed by kidney care giant DaVita, revealing that one of the most significant cyberattacks of the year has taken place. There are over 2,600…
Nissan Confirms Data Leak After Ransomware Attack on Design Unit
Nissan’s Tokyo-based design subsidiary, Creative Box Inc. (CBI), has launched an investigation into a cyberattack after a ransomware group claimed to have stolen a large cache of internal files. The company confirmed that some design data has been compromised but…
Colt Technology Services Confirms Customer Data Theft After Warlock Ransomware Attack
UK-based telecommunications provider Colt Technology Services has confirmed that sensitive customer-related documentation was stolen in a recent ransomware incident. The company initially disclosed on August 12 that it had suffered a cyberattack, but this marks the first confirmation that data…
Fake Netflix Job Offers Target Facebook Credentials in Real-Time Scam
A sophisticated phishing campaign is targeting job seekers with fake Netflix job offers designed to steal Facebook login credentials. The scam specifically focuses on marketing and social media professionals who may have access to corporate Facebook business accounts. Modus…
Aussie Telecom Breach Raises Alarm Over Customer Data Safety
A recent cyberattack on TPG Telecom has reignited concerns about how safe personal information really is in the hands of major companies. What the provider initially downplayed as a “limited” incident has in fact left hundreds of thousands of…
A Comprehensive Look at Twenty AI Assisted Coding Risks and Remedies
In recent decades, artificial intelligence has radically changed the way software is created, tested, and deployed, bringing about a significant shift in software development history. Originally, it was only a simple autocomplete function, but it has evolved into a…
Cybercriminals Harness AI and Automation, Leaving Southeast Asia Exposed
A new study warns that cybercriminals are leveraging artificial intelligence (AI) and automation to strike faster and with greater precision, exposing critical weaknesses in Southeast Asia—a region marked by rapid digital growth and interconnected supply chains. The findings urge…
Data Portability and Sovereign Clouds: Building Resilience in a Globalized Landscape
The emergence of sovereign clouds has become increasingly inevitable as organizations face mounting regulatory demands and geopolitical pressures that influence where their data must be stored. Localized cloud environments are gaining importance, ensuring that enterprises keep sensitive information within…