We’ve probably all received confirmation codes via text message when trying to enter into an account. These codes are intended to function as two-factor verification, confirming our identities and preventing cybercriminals from accessing our accounts solely through a password.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Integrated Threat Management: A Unified Strategy for Modern Business Security
Organizations today face increasingly complex threats that span across digital, physical, and operational domains. With risks becoming more sophisticated and faster-moving, traditional siloed approaches to security are no longer effective. Companies now require a unified strategy to protect their…
Targeted Cyber Threat Disrupts Washington Post Newsroom Operations
An alarming development, which indicates that cyber threats are growing in intensity, has been confirmed by The Washington Post, which confirms an attempted breach on its personal email system targeting a specific group of journalists who work at the…
Anubis Ransomware Becomes More Destructive With New File-Wiping Feature
A cybercrime group known as Anubis has recently added a dangerous new ability to its ransomware. This latest update allows the malware not only to lock files but also to completely destroy them, making it impossible for victims to…
Fake Bitdefender Site Distributes Malware: Cybercriminals Exploit Trusted Brands to Steal Sensitive Data
Bitdefender, a well-known and reputable cybersecurity and antivirus software provider, has become the latest target of cybercriminals. In a deeply troubling incident, scammers created a fake Bitdefender website, tricking users into downloading malware under the guise of legitimate antivirus…
Cyberattack Disrupts WestJet Systems as Investigation Begins
The second-largest airline in Canada, WestJet, is currently investigating an ongoing cyberattack which has compromised its internal systems as well as raising concerns about the risk of data loss to customers. As early as late last week, the airline was…
Signs Your Phone Has a Virus and How to Remove It Safely
In today’s world, our phones are more than just communication devices — they’re essential for work, banking, shopping, and staying connected. That makes it all the more alarming when a device begins to behave strangely. One possible cause? A…
Hackers Circumvent AntiVirus Using Google OAuth in New Malware Surge
A new campaign of browser-based malware has emerged, revealing how hackers are now circumventing conventional antivirus protections by exploiting trusted domains like Google.com. This technique, according to a report by security researchers at c/side, is subtle, conditionally triggered, and…
Cloudflare Explains Major Service Outage: Not a Security Breach, No Data Lost
Cloudflare has clarified that a widespread outage affecting its global services was not the result of a cyberattack or data breach. The company confirmed that no customer data was compromised during the disruption, which significantly impacted numerous platforms, including…
The True Cost of Legacy Software: A Comprehensive Look
Business leaders tend to stay with what they know. It’s familiar, comfy, and—above all—seems trustworthy. However, this comfort zone can be costing us more than they realise when it comes to legacy software systems. Many leaders focus on the…
Microsoft Entra ID Faces Surge in Coordinated Credential-Based Attacks
An extensive account takeover (ATO) campaign targeting Microsoft Entra ID has been identified by cybersecurity experts, exploiting a powerful open-source penetration testing framework known as TeamFiltration. First detected in December 2024, the campaign has accelerated rapidly, compromising more than 80,000…
T-Mobile Denies Involvement After Hackers Claim Massive Customer Data Breach
T-Mobile is once again in the cybersecurity spotlight after a hacking group claimed to have obtained sensitive personal information belonging to 64 million customers. The hackers alleged the data was freshly taken as of June 1, 2025, and listed…
Predator Spyware Campaign Resurfaces With a New Infrastructure
The latest discovery of new Predator spyware-related equipment suggests that the surveillance technology is still finding new clients, despite US penalties imposed on its backers since July 2023. In a report published earlier this month, analysts at Insikt Group…
Fake DeepSeek AI Installers Deliver BrowserVenom Malware
Cybersecurity researchers have released a warning about a sophisticated cyberattack campaign in which users are attempted to access DeepSeek-R1, a widely recognized large language model (LLM), which has been identified as a large language model. Cybercriminals have launched a malicious…
U.S. Homeland Security Reportedly Buys Airline Passenger Data from Private Brokers
In the digital world where personal privacy is increasingly at risk, it has now come to light that the U.S. government has been quietly purchasing airline passenger information without public knowledge. A recent report by Wired revealed that the…
Fake Resumes Become Weapon of Choice for FIN6 Threat Group
The FIN6 cybercrime group, which has been associated with financial breaches in the past, is now launching a sophisticated new campaign targeting corporate recruitment channels. The group, which is known as FIN6 cybercrime, has been associated with high-profile financial…
Smartwatches: New Air-Gapped System Assault Vehicle
A novel assault identified as ‘SmartAttack’ leverages smartwatches as a covert ultrasonic signal receiver to extract data from physically isolated (air-gapped) devices. Air-gapped systems, which are often used in mission-critical environments such as government buildings, weapons platforms, and nuclear…
Trend Micro Patches Critical Remote Code Execution and Authentication Bypass Flaws in Apex Central and PolicyServer
Trend Micro has rolled out essential security updates to address a series of high-impact vulnerabilities discovered in two of its enterprise security solutions: Apex Central and the Endpoint Encryption (TMEE) PolicyServer. These newly disclosed issues, which include critical remote code…
Zoomcar Data Breach Exposes Personal Information of 8.4 Million Users
Zoomcar, a well-known car-sharing platform, recently reported that a cyberattack exposed the personal details of approximately 8.4 million users. The information that was accessed includes users’ names, phone numbers, and vehicle registration details. The company, based in Bengaluru, India,…
Cyber Suraksha’: Indian Armed forces Launch Cybersecurity Exercise
Under the direction of the Headquarters Integrated Defence Staff, the Indian Defence Cyber Agency has initiated a cyber security exercise called “Cyber Suraksha.” June 16 marked the start of the exercise, which will last through June 27. A multi-phased…