LinkedIn has taken a major step toward improving online safety by extending its identity verification feature beyond its own platform. This update is part of the company’s ongoing efforts to help users avoid fake profiles and internet scams, especially…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Hacker Calls Pahalgam Incident “Inside Job” on Rajasthan Education Department Website
Earlier this week, the Rajasthan education department’s official website was hacked, with a statement ridiculing the Indian government over Pakistan’s detention of Indian Air Force commander Abhinandan Varthaman in 2019. The hackers attacked the homepage with a provocative message…
Rhysida Ransomware Group Leaks 1.3M Files Stolen from Oregon DEQ After Failed Extortion Attempt
A major ransomware breach has rocked the Oregon Department of Environmental Quality (DEQ), with over 1.3 million files—amounting to 2.4 terabytes—dumped online by the cybercriminal group Rhysida. The stolen data, now circulating on the dark web, reportedly includes confidential…
Large-Scale Data Breach at Frederick Health Exposes Patient Records
Two separate ransomware incidents have recently affected healthcare providers in Maryland and California and exposed sensitive information belonging to more than 1.1 million patients as a result, according to disclosures filed with federal regulators that recently broke the story.…
Android Spyware Concealed in Mapping App Targets Russian Military
Doctor Web researchers discovered a new spyware, tracked as Android. Spy.1292.origin, targets Russian military people. The malicious code was concealed in a trojanized Alpine Quest app and distributed via Russian Android catalogues. The malware acquires contacts, geolocation, and file…
Over 21 Million Employee Screenshots Leaked from WorkComposer Surveillance App
An app designed to track employee productivity by logging keystrokes and taking screenshots has suffered a significant privacy breach as more than 21 million images of employee activity were left in an unsecured Amazon S3 bucket. An app for tracking…
Malware Hides in Fake PDF to DOCX Converters to Target Crypto Wallets and Steal Data
Cybercriminals have launched a deceptive malware campaign that disguises itself as online file converters, specifically targeting users searching for PDF to DOCX tools. This scheme uses convincing replicas of popular converter sites to execute hidden PowerShell scripts and deploy…
Millions Affected by Suspected Data Leak at Major Electronics Chain
Cybersecurity experts and users alike are worried about a recent report that the hacking group ShinyHunters is offering more stolen data on the darknet marketplace in a concerning development. It has been reported that the group is attempting to…
Trump Claims Administration Learnt to Avoid Signal After Group Chat Leak
President Donald Trump stated that his administration has learnt from Signalgate. “I think we learnt: Maybe don’t use Signal, okay?” Trump spoke about the messaging app in an interview with The Atlantic published Monday. “If you want to know…
Cybercriminals Behind DOGE Big Balls Ransomware Demand $1 Trillion, Troll Elon Musk
A cybercrime group notorious for its outrageous tactics has resurfaced with a ransomware attack demanding an unbelievable $1 trillion from its victims. The group, responsible for the DOGE Big Balls ransomware campaign, has updated its ransom demands with bizarre…
Firewalls and VPNs Under Siege as Businesses Report Growing Cyber Intrusions
A security researcher has discovered an ongoing cyberattack that is active, exploiting a newly discovered vulnerability in Fortinet’s FortiGate Firewalls to infiltrate corporate and enterprise networks and has been conducting this activity for some time. A security advisory published…
Don’t Delete Spam Emails Too Quickly — Here’s Why
Most of us delete spam emails as soon as they land in our inbox. They’re irritating, unwanted, and often contain suspicious content. But what many people don’t know is that keeping them, at least briefly can actually help improve…
Scientists Warn of Cybersecurity Threats in Next-Gen DNA Sequencing
Next-generation DNA sequencing (NGS) is under increasing criticism for its cyber risks. While NGS has transformed disciplines ranging from cancer diagnosis to infectious disease tracking, a recent study warns that the platforms that enable these advancements could also be…
Google Ends Privacy Sandbox, Keeps Third-Party Cookies in Chrome
Google has officially halted its years-long effort to eliminate third-party cookies from Chrome, marking the end of its once-ambitious Privacy Sandbox project. In a recent announcement, Anthony Chavez, VP of Privacy Sandbox, confirmed that the browser will continue offering…
Investigating the Role of DarkStorm Team in the Recent X Outage
It has been reported that Elon Musk’s social media platform, X, formerly known as Twitter, was severely disrupted on Monday after a widespread cyberattack that has caused multiple service disruptions. Data from outage monitoring service Downdetector indicates that at…
Millions at Risk as Malicious Actors Hijack Popular YouTube Accounts
At a startling rate, cybercriminals are taking over well-known YouTube channels, exposing viewers to malware, frauds, and data theft. With billions of views and millions of followers at risk, a single mistake can have disastrous results. According to new…
North Korean Hacker Group Targets Cryptocurrency Developers via LinkedIn
A North Korean threat group known as Slow Pisces has launched a sophisticated cyberattack campaign, focusing on developers in the cryptocurrency industry through LinkedIn. Also referred to as TraderTraitor or Jade Sleet, the group impersonates recruiters offering legitimate job…
Chinese Ghost Hackers Focus on Profits, Attack Key Sectors in the US and UK
In the world of cybercrime, criminals usually fall into two groups. Some target individuals, tricking them for money. Others go after important organizations like hospitals and companies, hoping for bigger payouts. Although attacks on healthcare are less common, they…
SK Telecom Malware Attack Exposes USIM Data in South Korea
SK Telecom, South Korea’s top mobile carrier, has disclosed a security incident involving a malware infection that exposed sensitive information tied to users’ Universal Subscriber Identity Modules (USIMs). The breach was detected on the night of April 19, 2025,…
Zoom Platform Misused by Elusive Comet Attackers in Fraud Scheme
Recent reports suggest that North Korean threat actors are now employing an alarming evolution in the tactics they employ to launch a sophisticated cybercrime operation known as Elusive Comet, a sophisticated cybercrime operation. This newly uncovered campaign demonstrates a…