Google has unveiled its new Gemini-powered smart home lineup and AI strategy, positioning its AI assistant Gemini at the core of refreshed Google Home and Nest devices. This reimagined approach follows Amazon’s recent Echo launch, highlighting an intensifying competition…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Unauthorized Use of AI Tools by Employees Exposes Sensitive Corporate Data
Artificial intelligence has rapidly revolutionised the modern workplace, creating both unprecedented opportunities and presenting complex challenges at the same time. Despite the fact that AI was initially conceived to improve productivity, it has quickly evolved into a transformational force…
Oura Users Express Concern Over Pentagon Partnership Amid Privacy Debates
Oura, the Finnish company known for its smart health-tracking rings, has recently drawn public attention after announcing a new manufacturing facility in Texas aimed at meeting the needs of the U.S. Department of Defense (DoD). The partnership, which has…
Agentic AI Demands Stronger Digital Trust Systems
As agentic AI becomes more common across industries, companies face a new cybersecurity challenge: how to verify and secure systems that operate independently, make decisions on their own, and appear or disappear without human involvement. Consider a financial firm…
Red Hat Hit by Data Breach, Hackers Exploit GitLab Instance
An extortion gang by the name of Crimson Collective claimed to have stolen approximately 570GB of compressed data from internal development repositories belonging to Red Hat. Red Hat confirmed the breach impacted one of its GitLab instances. The stolen data…
Telstra Denies Scattered Spider Data Breach Claims Amid Ransom Threats
Telstra, one of Australia’s leading telecommunications companies, has denied claims made by the hacker group Scattered Spider that it suffered a massive data breach compromising nearly 19 million personal records. The company issued a statement clarifying that its internal…
Illumio Report Warns: Lateral Movement, Not Breach Entry, Causes the Real Cybersecurity Damage
In most cyberattacks, the real challenge doesn’t begin at the point of entry—it starts afterward. Once cybercriminals infiltrate a system, they move laterally across networks, testing access points, escalating privileges, and expanding control until a small breach becomes a…
OpenAI’s Sora App Raises Facial Data Privacy Concerns
OpenAI’s video-generating app, Sora, has raised significant questions regarding the safety and privacy of user’s biometric data, particularly with its “Cameo” feature that creates realistic AI videos, or “deepfakes,” using a person’s face and voice. To power this functionality,…
AI Tools Make Phishing Attacks Harder to Detect, Survey Warns
Despite the ever-evolving landscape of cyber threats, the phishing method remains the leading avenue for data breaches in the years to come. However, in 2025, the phishing method has undergone a dangerous transformation. What used to be a crude…
China Sentences 11 Individuals to Death Over Massive Cross-Border Scam Network
A Chinese court has handed down death sentences to 11 individuals involved in a vast, family-run criminal network that operated online scam and gambling schemes across the China-Myanmar border. The Wenzhou Intermediate People’s Court in Zhejiang Province announced the…
Microsoft Stops Phishing Scam Which Used Gen-AI Codes to Fool Victims
AI: Boon or Curse? AI code is in use across sectors for variety of tasks, particularly cybersecurity, and both threat actors and security teams have turned to LLMs for supporting their work. Security experts use AI to track and address…
Andesite AI Puts Human Analysts at the Center of Cybersecurity Innovation
Andesite AI Inc., a two-year-old cybersecurity startup, is reimagining how human expertise and artificial intelligence can work together to strengthen digital defense. Founded by former CIA officers Brian Carbaugh and William MacMillan, the company aims to counter a fragmented…
Why Deleting Cookies Doesn’t Protect Your Privacy
Most internet users know that cookies are used to monitor their browsing activity, but few realize that deleting them does not necessarily protect their privacy. A newer and more advanced method known as browser fingerprinting is now being used to…
Ransomware Attack on Motility Software Solutions Exposes Data of 766,000 Customers
Motility Software Solutions, a leading U.S.-based provider of dealer management software (DMS), has confirmed a ransomware attack that compromised the personal data of approximately 766,000 customers. The company, previously known as Systems 2000 (Sys2K), serves over 7,000 dealerships across…
Security Experts Warn of Audio Leakage Through Gaming Mice
A startling discovery has been made in a study by researchers at UCI, which pertains to a rare side-channel risk associated with high-performance optical mice. The study found that the sensors and polling rates that enable precision can also…
Meta to Use AI Chat Data for Targeted Ads Starting December 16
Meta, the parent company of social media giants Facebook and Instagram, will soon begin leveraging user conversations with its AI chatbot to drive more precise targeted advertising on its platforms. Starting December 16, Meta will integrate data from interactions…
Why Businesses Must Act Now to Prepare for a Quantum-Safe Future
As technology advances, quantum computing is no longer a distant concept — it is steadily becoming a real-world capability. While this next-generation innovation promises breakthroughs in fields like medicine and materials science, it also poses a serious threat to…
AI Adoption Surges Faster Than Cybersecurity Awareness, Study Reveals
A recent study has revealed that the rapid adoption of AI tools like ChatGPT and Gemini is far outpacing efforts to educate users about the cybersecurity risks associated with them. The research, conducted by the National Cybersecurity Alliance (NCA)…
AI Adoption Outpaces Cybersecurity Awareness as Users Share Sensitive Data with Chatbots
The global surge in the use of AI tools such as ChatGPT and Gemini is rapidly outpacing efforts to educate users about the cybersecurity risks these technologies pose, according to a new study. The research, conducted by the National…
Cisco Firewall Vulnerabilities Leave 50,000 Devices Exposed Worldwide
Nearly 50,000 Cisco firewall devices worldwide are currently exposed to significant security risks following the disclosure of three critical vulnerabilities in Cisco’s Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) products. Statistics from the Shadowserver Foundation have highlighted…