India’s new three-hour takedown rule for online content has triggered unease among influencers, agencies, and brands, who fear it could disrupt campaigns and shrink creative freedom. The rule, introduced through amendments to the IT Intermediary Rules on February 11,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Infostealer Malware Targets OpenClaw AI Agent Files to Steal API Keys and Authentication Tokens
Now appearing in threat reports, OpenClaw — a local AI assistant that runs directly on personal devices — has rapidly gained popularity. Because it operates on users’ machines, attackers are shifting focus to its configuration files. Recent malware infections…
US Employs Anthropic’s Claude AI in High-Profile Venezuela Raid
Using a commercially developed artificial intelligence system in a classified US military operation represents a significant technological shift in the design of modern defence strategy. It appears that what was once confined to research laboratories and enterprise software environments…
Phishing Campaign Abuses .arpa Domain and IPv6 Tunnels to Evade Enterprise Security Defenses
Cybersecurity experts at Infoblox Threat Intel have identified a sophisticated phishing operation that manipulates core internet infrastructure to slip past enterprise security mechanisms. The campaign introduces an unusual evasion strategy: attackers are exploiting the .arpa top-level domain (TLD) while…
Publicly Exposed Google Cloud API Keys Gain Unintended Access to Gemini Services
A recent security analysis has revealed that thousands of Google Cloud API keys available on the public internet could be misused to interact with Google’s Gemini artificial intelligence platform, creating both data exposure and financial risks. Google Cloud API…
Trezor and Ledger Impersonated in Physical QR Code Phishing Scam Targeting Crypto Wallet Users
Nowadays criminals push fake crypto warnings through paper mail, copying real product packaging from firms like Trezor and Ledger. These printed notes arrive at homes without digital traces, making them feel more trustworthy than email scams. Instead of online…
Botnet Moves to Blockchain, Evades Traditional Takedowns
A newly identified botnet loader is challenging long standing methods used to dismantle cybercrime infrastructure. Security researchers have uncovered a tool known as Aeternum C2 that stores its command instructions on the Polygon blockchain rather than on traditional servers…
ClawJack Allows Malicous Sites to Control Local OpenClaw AI Agents
Peter Steinberger created OpenClaw, an AI tool that can be a personal assistant for developers. It immediately became famous and got 100,000 GitHub stars in a week. Even OpenAI founder Sam Altman was impressed, bringing Steinberger on board and calling…
Microsoft AI Chief: 18 Months to Automate White-Collar Jobs
Mustafa Suleyman, CEO of Microsoft AI, has issued a stark warning about the future of white-collar work. In a recent Financial Times interview, he predicted that AI will achieve human-level performance on most professional tasks within 18 months, automating…
Face ID Security Risks and Privacy Concerns in 2026
Facial recognition has been a topic of fascination for much of the last century, with films projected onto cinema screens, dystopian novels and think-tank papers debating whether the technology will ever become reality. The technology was either portrayed as…
Fake Go Crypto Package Caught Stealing Passwords and Spreading Linux Backdoor
Cybersecurity investigators have revealed a rogue Go module engineered to capture passwords, establish long-term SSH access, and deploy a Linux backdoor known as Rekoobe. The package, published as github[.]com/xinfeisoft/crypto, imitates the legitimate Go cryptography repository widely imported by developers.…
Senior Engineers at Spotify Rely on AI Tools Over Direct Code Writing
A long-foreseen confrontation between intelligent machines and human programmers no longer seems theoretical. Initially considered a distant possibility automation nibbling at the edges of software development it now appears that some of the world’s most influential technology firms are…
Hollywood Studios Target AI Video Tool
Hollywood studios are intensifying efforts to curb an “ultra-realistic” AI video generator that produces lifelike clips from simple text prompts. The tool, capable of creating scenes like a fist fight between Tom Cruise and Brad Pitt, has sparked alarm…
Crazy Ransomware Gang Abuses Net Monitor and SimpleHelp for Stealthy Network Persistence
Not long ago, security analysts from Huntress spotted someone tied to the Crazy ransomware group using standard employee surveillance and remote assistance programs. This person used common system tools – not custom malware – to stay hidden within company…
U.S. Justice Department Seizes $61 Million in Tether Linked to ‘Pig Butchering’ Crypto Scams
The U.S. Department of Justice (DoJ) has revealed that it seized approximately $61 million in Tether connected to fraudulent cryptocurrency operations commonly referred to as “pig butchering” scams. According to the department, investigators traced the confiscated digital assets to wallet…
AI Coding Platform Orchids Exposed to Zero-Click Hack in BBC Security Test
A BBC journalist has demonstrated an unresolved cybersecurity weakness in an artificial intelligence coding platform that is rapidly gaining users. The tool, called Orchids, belongs to a new category often referred to as “vibe-coding.” These services allow individuals without…
Group-IB Warns Supply Chain Attacks Are Becoming a Self-Reinforcing Cybercrime Ecosystem
Cybercrime outfits now reshape supply chain intrusions into sprawling, linked assaults – spinning out data leaks, stolen login details, and ransomware in relentless loops, says fresh research by Group-IB. With each trend report, the security group highlights how standalone…
Russia Blocks WhatsApp, Pushes State Surveillance App
Russia has effectively erased WhatsApp from its internet, impacting up to 100 million users in a bold move by regulator Roskomnadzor. On Wednesday, the app was removed from the national directory, severing access without prior slowdown warnings, as reported…
Darktrace Flags Surge in Phishing as Identity-Based Attacks Redefine 2025 Threat Landscape
More than 32 million high-confidence phishing emails were identified in 2025, signaling a sharp rise in identity-focused cyberattacks, according to new findings from Darktrace. The cybersecurity firm analyzed incidents across its global customer network, revealing a year marked by…
Google Observes Threat Actors Deploying AI During Live Network Breaches
As synthetic intelligence has become a staple in modern organizations, the field has transformed how they analyze data, make automated decisions, and defend their digital perimeters, moving from experimental labs to the operational bloodstream. However, with the incorporation of…