A new disclosure that underscores the increasing sophistication of enterprise-level cyberattacks underscores the need to take proactive measures against them. GlobalLogic has begun notifying more than ten thousand of its current and former employees that their personal information was…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
65% of Top AI Companies Leak Secrets on GitHub
Leading AI companies continue to face significant cybersecurity challenges, particularly in protecting sensitive information, as highlighted in recent research from Wiz. The study focused on the Forbes top 50 AI firms, revealing that 65% of them were found to…
Quantum Error Correction Moves From Theory to Practical Breakthroughs
Quantum computing’s biggest roadblock has always been fragility: qubits lose information at the slightest disturbance, and protecting them requires linking many unstable physical qubits into a single logical qubit that can detect and repair errors. That redundancy works in principle,…
New Android Malware Steals Debit Card Data And PINs To Enable ATM Withdrawals
Security researchers have identified an Android malware operation that can collect debit card details and PINs directly from a victim’s mobile device and use that information to withdraw cash from an ATM. What makes this attack particularly dangerous is…
Sam Altman’s Iris-Scanning Startup Reaches Only 2% of Its Goal
Sam Altman’s ambitious—and often criticized—vision to scan humanity’s eyeballs for a profit is falling far behind its own expectations. The startup, now known simply as World (previously Worldcoin), has barely made a dent in its goal of creating a global…
Hyundai faces security incident with potential data exposure
In the past few months, Hyundai AutoEver America, a division of Hyundai Motor Group, has confirmed a recent data breach that exposed sensitive personal information after hackers infiltrated its internal IT environment earlier this year, revealing a recent data…
ClickFix: The Silent Cyber Threat Tricking Families Worldwide
ClickFix has emerged as one of the most pervasive and dangerous cybersecurity threats in 2025, yet remains largely unknown to the average user and even many IT professionals. This social engineering technique manipulates users into executing malicious scripts—often just…
When weak passwords open the door: major breaches that began with simple logins
Cybersecurity incidents are often associated with sophisticated exploits, but many of the most damaging breaches across public institutions, private companies and individual accounts have originated from something far more basic: predictable passwords and neglected account controls. A review of…
New runC Vulnerabilities Expose Docker and Kubernetes Environments to Potential Host Breakouts
Three newly uncovered vulnerabilities in the runC container runtime have raised significant concerns for organizations relying on Docker, Kubernetes, and other container-based systems. The flaws, identified as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were disclosed by SUSE engineer and Open Container…
Screen Sharing on WhatsApp Turns Costly with Major Financial Loss
Several disturbing patterns of digital deception have quietly developed in recent months, revealing just how readily everyday communications tools can be turned into instruments of financial ruin in an instant. According to security researchers, there has been an increase…
LG Energy Solution Hit by Akira Ransomware, Data Breach Confirmed
LG Energy Solution, a leading South Korean battery manufacturer with global operations, confirmed a significant ransomware incident affecting one of its overseas facilities in mid-November 2025. The company announced that only a “specific overseas facility” was targeted, emphasizing that…
U.S. Agencies Consider Restrictions on TP-Link Routers Over Security Risks
A coordinated review by several federal agencies in the United States has intensified scrutiny of TP-Link home routers, with officials considering whether the devices should continue to be available in the country. Recent reporting indicates that more than six…
Pro-Hamas Hackers Leak Alleged Redback IFV Plans and Israeli Defense Employee Data After Major Cyber Breach
A hacker collective aligned with Hamas has allegedly released sensitive information tied to Australia’s Redback next-generation infantry fighting vehicle program, along with hundreds of photographs of staff from Israeli defense companies. The group, known as Cyber Toufan and widely believed…
Why Oslo’s Bus Security Tests Highlight the Hidden Risks of Connected Vehicles
Modern transportation looks very different from what it used to be, and the question of who controls a vehicle on the road no longer has a simple answer. Decades ago, the person behind the wheel was unquestionably the one…
Continuous Incident Response Is Redefining Cybersecurity Strategy
With organizations now faced with relentless digital exposure, continuous security monitoring has become an operational necessity instead of a best practice, as organizations navigate an era where digital exposure is ubiquitous. In 2024, cyber-attacks will increase by nearly 30%,…
USB Drives Are Handy, But Never For Your Only Backup
Storing important files on a USB drive offers convenience due to their ease of use and affordability, but there are significant considerations regarding both data preservation and security that users must address. USB drives, while widely used for backup,…
How Modern Application Delivery Models Are Evolving: Local Apps, VDI, SaaS, and DaaS Explained
Since the early 1990s, the methods used to deliver applications and data have been in constant transition. Today, IT teams must navigate a wider range of options—and a greater level of complexity—than ever before. Because applications are deployed in…
How Oversharing, Weak Passwords, and Digital IDs Make You an Easy Target and What You Can Do
The more we share online, the easier it becomes for attackers to piece together our personal lives. Photos, location tags, daily routines, workplace details, and even casual posts can be combined to create a fairly accurate picture of who we…
Android Malware Hits 42 Million Downloads, Risking Mobile Payments
Android malware is surging globally, with attackers increasingly targeting mobile payments and IoT devices, exposing critical vulnerabilities in systems heavily relied upon for communication, work, and financial activity. Recent findings from Zscaler indicate that 239 malicious Android apps were…
$116 Million at Risk as Balancer Suffers Major Smart Contract Breach
Security experts are becoming increasingly concerned about a developing anomaly in the JavaScript ecosystem after researchers discovered a massive cluster of self-replicating npm packages that seem to have no technical function but instead indicate a well-thought-out and financially motivated…