Cybersecurity risks could rise when outdated home routers stop getting manufacturer support, federal agents say. Devices from the late 2000s into the early 2010s often fall out of update cycles, leaving networks open. Without patches, vulnerabilities stay unaddressed –…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
DeepMind Chief Sounds Alarm on AI’s Dual Threats
Google DeepMind CEO Sir Demis Hassabis has issued a stark warning on the escalating threats posed by artificial intelligence, urging immediate action from governments and tech firms. In an exclusive BBC interview at the AI Impact Summit in Delhi,…
Anthropic AI Model Finds 22 Security Flaws in Firefox
Anthropic said its artificial intelligence model Claude Opus 4.6 helped uncover 22 previously unknown security vulnerabilities in the Firefox web browser as part of a collaboration with the Mozilla. The company said the issues were discovered during a two…
Microsoft Report Reveals Hackers Exploit AI In Cyberattacks
According to Microsoft, hackers are increasingly using AI in their work to increase attacks, scale cyberattack activity, and limit technical barriers throughout all aspects of a cyberattack. Microsoft’s new Threat Intelligence report reveals that threat actors are using genAI tools…
ExpressVPN Expands Privacy Tools with Launch of Hybrid Browser Extension
Increasingly, immersive technologies are moving from being novel to being part of everyday digital infrastructure, which raises questions regarding privacy within virtual environments. Activities previously conducted on conventional screens now occur within headsets that process vast streams of personal…
AI-Driven Risk Management Is Becoming a Key Growth Strategy for MSPs
Expanding cybersecurity services as a Managed Service Provider (MSP) or Managed Security Service Provider (MSSP) requires more than strong technical capabilities. Providers also need a sustainable business approach that can deliver clear and measurable value to clients while supporting…
Pakistan-Linked Hackers Use AI to Flood Targets With Malware in India Campaign
A Pakistan-aligned hacking group known as Transparent Tribe is using artificial intelligence coding tools to produce large numbers of malware implants in a campaign primarily targeting India, according to new research from cybersecurity firm Bitdefender. Security researchers say the…
San Francisco Children’s Council Breach Exposes SSNs of 12,000+ People
The Children’s Council of San Francisco has notified more than 12,000 individuals that their personal information was compromised in a cyberattack discovered last year. According to breach notification letters, the incident occurred on August 3, 2025, when the organization…
Malware Attack Cripples Passaic County Phones and IT Systems
A malware attack has disrupted government services in Passaic County, New Jersey, knocking out key IT systems and phone lines that serve nearly 600,000 residents across the region. Officials say they are working with state and federal partners to…
APT36 Uses AI-Generated “Vibeware” Malware and Google Sheets to Target Indian Government Networks
Researchers at Bitdefender have uncovered a new cyber campaign linked to the Pakistan-aligned threat group APT36, also known as Transparent Tribe. Unlike earlier operations that relied on carefully developed tools, this campaign focuses on mass-produced AI-generated malware. Instead of…
China Based Hackers Attack Telco With New Malware
A China-based advanced persistent cyber criminal tracked as UAT-9244 has been attacking telecommunication service providers in South America since 2024. Threat actor attacks Linux, Windows, and network-edge devices. Cisco Talos researchers said that the hacker is related to the Tropic…
Newly Discovered WordPress Plugin Bug Enables Privilege Escalation to Admin
With WordPress, millions of websites depend on its convenience, but it also includes a complex web of extensions, which quietly handle everything from user onboarding to payment-based membership. In addition to simplifying site management and extending functionality, these plugins…
Hackers Exploit Two Vulnerabilities in Cisco SD-WAN Manager
Cisco Systems has confirmed that attackers are actively exploiting two security flaws affecting its Catalyst SD-WAN Manager platform, previously known as SD-WAN vManage. The company disclosed that both weaknesses are currently being abused in real-world attacks. The vulnerabilities are…
ATM Jackpotting Malware Triggers Record Global ATM Heists in 2025
ATM jackpotting attacks surged dramatically in 2025, with cybercriminals using specialized malware to force cash machines to spit out money on command, often without touching any customer account. This new wave of attacks exposed serious weaknesses in how banks…
FBI Informant Allegedly Ran Most Operations on Incognito Market While Fentanyl-Laced Drugs Caused Overdose Deaths
An FBI informant reportedly handled the majority of activity on Incognito Market—one of the largest drug marketplaces on the dark web—for nearly two years, even as fentanyl-laced pills linked to the platform caused fatal overdoses across the United States.…
BadPaw Malware Targets Uranian Systems
A newly found malware campaign exploiting a Ukrainian email service to build trust has been found by cybersecurity experts. About the campaign The operation starts with an email sent from an address hosted on ukr[.]net, a famous Ukrainian provider earlier…
Quantum Cybersecurity Risks Rise as Organizations Prepare for Post-Quantum Cryptography
Security experts often trust encrypted data since today’s cryptography aims to block unapproved users. Still, some warn new forms of computation might one day weaken common encryption techniques. Even now, as quantum machines advance, potential threats are starting to…
Google Responds After Reports of Android Malware Leveraging Gemini AI
There has been a steady integration of artificial intelligence into everyday digital services that has primarily been portrayed as a story of productivity and convenience. However, the same systems that were originally designed to assist users in interpreting complex tasks…
149 Hacktivist DDoS Claims Recorded Across 16 Countries Following Middle East Escalation
A sharp rise in politically motivated cyber activity has emerged in the aftermath of the coordinated U.S.–Israel military operations against Iran, referred to as Epic Fury and Roaring Lion. Security analysts say online retaliation unfolded almost immediately, with hacktivist groups…
Chinese AI App Seedance Ignites Hollywood Copyright Panic
A groundbreaking Chinese AI app called Seedance 2.0, developed by ByteDance—the company behind TikTok—has ignited both excitement and alarm in Hollywood. Capable of generating cinema-quality videos complete with audio, dialogue, and ultra-realistic visuals from simple text prompts, the tool…