A critical security vulnerability has been identified in LangChain’s core library that could allow attackers to extract sensitive system data from artificial intelligence applications. The flaw, tracked as CVE-2025-68664, affects how the framework processes and reconstructs internal data, creating…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Trust Wallet Browser Extension Hacked, $7 Million Stolen
Users of the Binance-owned Trust wallet lost more than $7 million after the release of an updated chrome extension. Changpenng Zhao, company co-founder said that the company will cover the stolen money of all the affected users. Crypto investigator ZachXBT…
Epstein Files Redaction Failure Exposes Risks of Improper PDF Sanitization
The United States Department of Justice recently released a new set of documents related to the Jeffrey Epstein investigation, drawing widespread attention after it emerged that some redacted information could be easily uncovered. On December 22, the department published…
Chinese Hacking Group Breaches Email Systems Used by Key U.S. House Committees: Report
A cyber espionage group believed to be based in China has reportedly gained unauthorized access to email accounts used by staff working for influential committees in the U.S. House of Representatives, according to a report by the Financial Times…
Critical MongoDB Flaw Allows Unauthenticated Memory Data Leaks
A critical security flaw in MongoDB could allow unauthenticated attackers to extract sensitive data directly from server memory, prompting urgent patching warnings from security researchers and the database vendor. The vulnerability, tracked as CVE-2025-14847, affects MongoDB’s implementation of zlib…
Phishing Network Exploits e-Challan System to Target Indian Vehicle Owners
India has developed a digital traffic enforcement ecosystem that has become more deeply integrated into everyday life, this means that cybercriminals are increasingly exploiting both the public’s faith in government systems to perpetrate large-scale financial fraud on the country’s…
NtKiller Tool Boasts AV/EDR Evasion on Dark Web
A threat actor dubbed AlphaGhoul has now begun to push NtKiller-a perilous tool-on the dark web forums, claiming it silently kills antivirus software and bypasses endpoint detection and response systems. As a malware loader, this tool targets popular security…
EEOC Confirms Internal Data Incident Linked to Contractor Misuse of System Access
The U.S. Equal Employment Opportunity Commission has disclosed that it was affected by a data security incident involving a third-party contractor, after improper access to an internal system raised concerns about the handling of sensitive public information. The agency…
France Postal and Banking Services Disrupted by Suspected DDoS Cyberattack
France’s national postal and banking services faced major disruption following a suspected distributed denial-of-service (DDoS) attack that affected key digital systems. La Poste, the country’s postal service, described the incident as a significant network issue that impacted all of…
Salesforce Pulls Back from AI LLMs Citing Reliability Issues
Salesforce, a famous enterprise software company, is withdrawing from its heavy dependence on large language models (LLMs) after facing reliability issues that the executive didn’t like. The company believes that trust in AI LLMs has declined in the past year,…
US Shuts Down Web3AdspAnels Platform Used in Large-Scale Bank Account Cyber Thefts
US authorities have taken down an online platform allegedly used by cybercriminals to gain unauthorized access to Americans’ bank accounts. Visitors attempting to access web3adspanels.org are now met with a law enforcement seizure notice. Investigators say the site played…
Amazon Thwarts 1,800+ North Korean Job Scams with AI and Tiny Clues
Amazon’s chief security officer, Stephen Schmidt, revealed how the company blocked over 1,800 suspected North Korean operatives from securing remote IT jobs since April 2024. These agents aimed to funnel salaries back to Pyongyang’s weapons programs, bypassing sanctions through…
AI Experiment Raises Questions After System Attempts to Alert Federal Authorities
An ongoing internal experiment involving an artificial intelligence system has surfaced growing concerns about how autonomous AI behaves when placed in real-world business scenarios. The test involved an AI model being assigned full responsibility for operating a small vending…
WhatsApp-Based Worm Drives Rapid Expansion of Astaroth Malware in Brazil
After being exposed to a new and more aggressive distribution campaign involving the Astaroth banking trojan, which is a long-standing malware strain known for targeting financial users in the country, the cyber threat landscape in Brazil is once again coming…
New Shai Hulud Malware Variant Turns Developers Into Supply Chain Attack Vectors, Expel Warns
A newly released report from managed detection and response firm Expel Inc. reveals an advanced variant of the Shai Hulud malware, highlighting how software supply chain attacks are moving beyond isolated malicious packages to large-scale, self-spreading campaigns that exploit…
BitLocker Ransomware Attack Cripples Romanian Water Authority’s IT Systems
Romania’s national water management authority, Administrația Națională Apele Române (Romanian Waters), was targeted in a sophisticated ransomware attack on December 20, 2025, compromising approximately 1,000 IT systems across the organization. The cyberattack affected 10 of the country’s 11 regional…
Okta Report: Pirates of Payrolls Attacks Plague Corporate Industry
IT helps desks be ready for an evolving threat that sounds like a Hollywood movie title. In December 2025, Okta Threat Intelligent published a report that explained how hackers can gain unauthorized access to payroll software. These threats are infamous…
WebRAT Malware Spreads Through Fake GitHub Exploit Repositories
The WebRAT malware is being distributed through GitHub repositories that falsely claim to host proof-of-concept exploits for recently disclosed security vulnerabilities. This marks a shift in the malware’s delivery strategy, as earlier campaigns relied on pirated software and cheats…
Crypto Thefts Hit Record $2.7 Billion in 2025
Hackers stole more than $2.7 billion in cryptocurrency in 2025, setting a new annual record for crypto-related thefts, according to data from multiple blockchain monitoring firms. The losses were driven by dozens of attacks on cryptocurrency exchanges and decentralized…
Japan Prioritizes Cyber Resilience in Latest National Security Push
During the years 2026, Japan positioned economic strategy and security readiness as deeply intertwined priorities, emphasizing national resilience as a core priority. This package of comprehensive economic measures was approved by the Japanese government in November 2025 for a cost…