The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised fresh concerns about several outdated TP-Link router models that are being actively exploited by cybercriminals. Despite the flaw being identified years ago, it has re-emerged in recent attack campaigns,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Scania Targeted in Extortion Attempt Following Data Breach
An alarm is triggered in both the automotive and financial industries when Scania Financial Services, based in Sweden, confirms that a cybersecurity incident has compromised sensitive company data, which has raised concerns in the industry. The breach was reportedly…
New Malicious Python Package Found Stealing Cloud Credentials
A dangerous piece of malware has been discovered hidden inside a Python software package, raising serious concerns about the security of open-source tools often used by developers. Security experts at JFrog recently found a harmful package uploaded to the…
Here’s Why Using SMS Two-Factor Authentication Codes Is Risky
We’ve probably all received confirmation codes via text message when trying to enter into an account. These codes are intended to function as two-factor verification, confirming our identities and preventing cybercriminals from accessing our accounts solely through a password.…
Integrated Threat Management: A Unified Strategy for Modern Business Security
Organizations today face increasingly complex threats that span across digital, physical, and operational domains. With risks becoming more sophisticated and faster-moving, traditional siloed approaches to security are no longer effective. Companies now require a unified strategy to protect their…
Targeted Cyber Threat Disrupts Washington Post Newsroom Operations
An alarming development, which indicates that cyber threats are growing in intensity, has been confirmed by The Washington Post, which confirms an attempted breach on its personal email system targeting a specific group of journalists who work at the…
Anubis Ransomware Becomes More Destructive With New File-Wiping Feature
A cybercrime group known as Anubis has recently added a dangerous new ability to its ransomware. This latest update allows the malware not only to lock files but also to completely destroy them, making it impossible for victims to…
Fake Bitdefender Site Distributes Malware: Cybercriminals Exploit Trusted Brands to Steal Sensitive Data
Bitdefender, a well-known and reputable cybersecurity and antivirus software provider, has become the latest target of cybercriminals. In a deeply troubling incident, scammers created a fake Bitdefender website, tricking users into downloading malware under the guise of legitimate antivirus…
Cyberattack Disrupts WestJet Systems as Investigation Begins
The second-largest airline in Canada, WestJet, is currently investigating an ongoing cyberattack which has compromised its internal systems as well as raising concerns about the risk of data loss to customers. As early as late last week, the airline was…
Signs Your Phone Has a Virus and How to Remove It Safely
In today’s world, our phones are more than just communication devices — they’re essential for work, banking, shopping, and staying connected. That makes it all the more alarming when a device begins to behave strangely. One possible cause? A…
Hackers Circumvent AntiVirus Using Google OAuth in New Malware Surge
A new campaign of browser-based malware has emerged, revealing how hackers are now circumventing conventional antivirus protections by exploiting trusted domains like Google.com. This technique, according to a report by security researchers at c/side, is subtle, conditionally triggered, and…
Cloudflare Explains Major Service Outage: Not a Security Breach, No Data Lost
Cloudflare has clarified that a widespread outage affecting its global services was not the result of a cyberattack or data breach. The company confirmed that no customer data was compromised during the disruption, which significantly impacted numerous platforms, including…
The True Cost of Legacy Software: A Comprehensive Look
Business leaders tend to stay with what they know. It’s familiar, comfy, and—above all—seems trustworthy. However, this comfort zone can be costing us more than they realise when it comes to legacy software systems. Many leaders focus on the…
Microsoft Entra ID Faces Surge in Coordinated Credential-Based Attacks
An extensive account takeover (ATO) campaign targeting Microsoft Entra ID has been identified by cybersecurity experts, exploiting a powerful open-source penetration testing framework known as TeamFiltration. First detected in December 2024, the campaign has accelerated rapidly, compromising more than 80,000…
T-Mobile Denies Involvement After Hackers Claim Massive Customer Data Breach
T-Mobile is once again in the cybersecurity spotlight after a hacking group claimed to have obtained sensitive personal information belonging to 64 million customers. The hackers alleged the data was freshly taken as of June 1, 2025, and listed…
Predator Spyware Campaign Resurfaces With a New Infrastructure
The latest discovery of new Predator spyware-related equipment suggests that the surveillance technology is still finding new clients, despite US penalties imposed on its backers since July 2023. In a report published earlier this month, analysts at Insikt Group…
Fake DeepSeek AI Installers Deliver BrowserVenom Malware
Cybersecurity researchers have released a warning about a sophisticated cyberattack campaign in which users are attempted to access DeepSeek-R1, a widely recognized large language model (LLM), which has been identified as a large language model. Cybercriminals have launched a malicious…
U.S. Homeland Security Reportedly Buys Airline Passenger Data from Private Brokers
In the digital world where personal privacy is increasingly at risk, it has now come to light that the U.S. government has been quietly purchasing airline passenger information without public knowledge. A recent report by Wired revealed that the…
Fake Resumes Become Weapon of Choice for FIN6 Threat Group
The FIN6 cybercrime group, which has been associated with financial breaches in the past, is now launching a sophisticated new campaign targeting corporate recruitment channels. The group, which is known as FIN6 cybercrime, has been associated with high-profile financial…
Smartwatches: New Air-Gapped System Assault Vehicle
A novel assault identified as ‘SmartAttack’ leverages smartwatches as a covert ultrasonic signal receiver to extract data from physically isolated (air-gapped) devices. Air-gapped systems, which are often used in mission-critical environments such as government buildings, weapons platforms, and nuclear…