Modern digital workflows have become increasingly dependent on browser extensions, supporting a variety of tasks ranging from grammar correction, password management, and advanced AI integrations into everyday tasks. Browser extensions have become widely used across both personal and corporate…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Malicious Chrome Extensions Spoof Password Managers in Novel Polymorphic Attack
Cybersecurity experts have uncovered a novel technique for a malicious web browser extension to spoof any installed add-on. “The polymorphic extensions create a pixel perfect replica of the target’s icon, HTML popup, workflows and even temporarily disables the legitimate…
Lostkeys Malware: Russian Group Coldriver Targets Western Officials in Espionage Campaign
A new wave of cyber espionage has emerged, with Russian hackers deploying a sophisticated malware strain known as “Lostkeys” to infiltrate the systems of Western officials, journalists, and NGOs. According to researchers from Google’s Threat Intelligence Group, the malware…
Bangladesh’s Deepfake Challenge: Why New Laws Aren’t Enough
Bangladesh has taken a big step to protect its people online by introducing the Cyber Security Ordinance 2025. This law updates the country’s approach to digital threats, replacing the older and often criticized 2023 act. One of its most…
New AI Video Tool Scam Delivers Noodlophile Malware to Steal Your Data
Cybercriminals are using fake AI-powered video generation tools to spread a newly discovered malware strain called ‘Noodlophile’, disguised as downloadable media content. Fraudulent websites with names like “Dream Machine” are being promoted in high-visibility Facebook groups, pretending to be…
Safeguarding Personal Privacy in the Age of AI Image Generators
A growing trend of artificial intelligence-powered image creation tools has revolutionised the way users interact with digital creativity, providing visually captivating transformations in just a matter of clicks. The ChatGPT and Grok 3 platforms, which use artificial intelligence, offer…
Understanding Cybersquatting: How Malicious Domains Threaten Brands and Individuals
Cybersquatting remains a persistent threat in the digital landscape, targeting businesses, individuals, and public figures alike. This deceptive practice involves registering domain names that closely resemble those of legitimate brands or individuals, often with malicious intent. Despite rising awareness…
Here’s Why Websites Are Offering “Ad-Lite” Premium Subscriptions
Some websites allow you to totally remove adverts after subscribing, while others now offer “ad-lite” memberships. However, when you subscribe to ad-supported streaming services, you do not get the best value. Not removing all ads Ads are a significant…
Employee Monitoring Tool Kickidler Targeted in Ransomware Attacks
Cybersecurity researchers have discovered that cybercriminals are misusing a legitimate employee monitoring tool called Kickidler to execute targeted ransomware attacks. Originally developed to help businesses track productivity and ensure compliance, Kickidler offers features like real-time screen monitoring, keystroke logging,…
Cybercriminals Employ Display Fake Login Pages in Your Browser
Cofense Intelligence cybersecurity researchers have discovered a new and increasingly successful technique that attackers are using to deliver credential phishing pages straight to users’ email inboxes. This technique, which first surfaced in mid-2022, makes use of “blob URIs” (binary…
Hackers Resurface with PowerSchool Data, Target Schools Again with New Threats
Hackers behind the 2024 cyberattack on PowerSchool have returned, this time going after individual schools. They’re now threatening to leak private data unless schools pay them ransom. PowerSchool is a major digital platform used in the education sector. It…
How to Check If a Downloaded File Is Safe to Use
It is no longer a secret that downloading software is becoming an integral part of everyday computing in today’s digitally based environment. It is used to enhance productivity, explore new tools, and stay connected to an ever-increasing online world,…
Google to Pay Texas $1.4 Billion For Collecting Personal Data
The state of Texas has declared victory after reaching a $1 billion-plus settlement from Google parent firm Alphabet over charges that it illegally tracked user activity and collected private data. Texas Attorney General Ken Paxton announced the state’s highest…
Child Abuse Detection Efforts Face Setbacks Due to End-to-End Encryption
Technology has advanced dramatically in the last few decades, and data has been exchanged across devices, networks, and borders at a rapid pace. It is imperative to safeguard sensitive information today, as it has never been more important-or more…
India Faces Cyber Onslaught After Operation Sindoor Military Strikes
In the aftermath of India’s military action under Operation Sindoor, Pakistan responded not only with conventional threats but also with a wave of coordinated cyberattacks. While India’s defense systems effectively intercepted aerial threats like drones and missiles, a simultaneous…
This Free Tool Helps You Find Out if Your Personal Information Is Exposed Online
Many people don’t realize how much of their personal data is floating around the internet. Even if you’re careful and don’t use the internet much, your information like name, address, phone number, or email could still be listed on…
Compromised npm Package ‘rand-user-agent’ Used to Spread Remote Access Trojan
A widely-used npm package, rand-user-agent, has fallen victim to a supply chain attack, where cybercriminals injected obfuscated code designed to install a Remote Access Trojan (RAT) on users’ systems. Originally developed to generate randomized user-agent strings—helpful in web scraping,…
FBI Warns Consumers to Replace Outdated Routers Hijacked by TheMoon Malware
The FBI has issued an urgent warning to American consumers and businesses: replace outdated internet routers immediately or risk becoming an unwitting accomplice in cybercrime. According to the agency, cybercriminals are actively targeting “end-of-life” routers—older models that no longer…
LockBit Ransomware Platform Breached Again, Ops Data Leaked
A breach of an administration panel used by the LockBit ransomware outfit resulted in the exposure of information that can be extremely valuable to law enforcement and the cybersecurity community. The breach was discovered on May 7, when a…
Google Now Scans Screenshots to Identify Geographic Locations
With the introduction of a new feature within Google Maps that is already getting mixed reviews from users, this update is already making headlines around the world. Currently available on iPhones, this update allows users to scan screenshots and…