Banks in Latin American countries such as Mexico and Brazil have been victims of continuous malware attacks by a strain called JanelaRAT. An upgraded variant of BX RAT, JanelaRAT, can steal cryptocurrency and financial data from financial organizations, trace mouse…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
FBI Warns Smartphone Users About Risks Linked to Foreign Apps, Especially Chinese Platforms
The Federal Bureau of Investigation has issued a fresh alert cautioning users about potential security and privacy threats posed by mobile applications developed outside the United States, particularly those linked to China. The advisory emphasizes that while the concern…
Advanced Remote Access Trojan Eliminates Need for APK or IPA to Hijack Phones
A remote access Trojan (RAT) has evolved steadily from opportunistic malware to highly controlled instruments of digital intrusion in the evolving landscape of cyber threats as they have evolved from opportunistic malware. These programs are designed to create a…
Indian Government Bans Chinese Camera Import, Supply Shortage in Indian Brands
The Indian government has banned the import and sale of internet-connected CCTV cameras from China. This move has significantly impacted Hyderabad city’s surveillance device market. Traders and installers have reported immediate upsets in consumer behaviour, pricing, and supply. Impact on…
LinkedIn Secretly Scans 6,000+ Chrome Extensions, Collects Device Data
LinkedIn is facing renewed scrutiny after a report alleged that its website secretly scans browsers for more than 6,000 Chrome extensions and collects device data tied to user profiles . The company says the detection is meant to identify…
Google DeepMind Maps How the Internet Could be Used to Manipulate AI Agents
Researchers at Google DeepMind have outlined a growing but less visible risk in artificial intelligence deployment, the possibility that the internet itself can be used to manipulate autonomous AI agents. In a recent paper titled “AI Agent Traps,” the researchers…
Qilin Ransomware Targets Die Linke in Suspected Politically Motivated Cyberattack
A major digital attack hit Die Linke when hackers using the name Qilin said they broke into internal networks and copied confidential files. Because of this breach, private details may appear online unless demands are met – raising alarms…
Public Quizlet Flashcards Raise Concerns Over Possible CBP Security Exposure
A set of publicly available flashcards discovered through simple online searches has sparked concern after appearing to reveal sensitive details related to facility security at U.S. Customs and Border Protection locations in Kingsville, Texas. The flashcards were hosted on…
New GPU Rowhammer Attacks on Nvidia Cards Enable Full System Takeover
High-performance GPUs, often priced at $8,000 or more, are commonly shared among multiple users in cloud environments—making them attractive targets for attackers. Researchers have now uncovered three new attack techniques that allow a malicious user to gain full root…
How to Spot and Avoid LinkedIn Scams: A Complete Guide to Staying Safe Online
Most people trust LinkedIn for connecting careers, finding jobs, or growing businesses – yet that very trust opens doors for fraudsters. Because profiles often reveal detailed backgrounds, attackers pull facts straight from bios to craft believable tricks. Spotting odd…
Residential Proxies Evade IP Reputation Checks in 78% of 4 Billion Sessions
Residential proxy networks are now evading IP‑reputation‑based security controls in a majority of malicious sessions, greatly undercutting a core pillar of network defense. A recent analysis by cybersecurity intelligence firm GreyNoise found that residential‑proxy‑routed traffic escaped IP‑reputation checks in…
Hims and Hers Discloses Cyberattack Impacting Customer Support Infrastructure
The integrity of digital systems has become inextricably linked to patient trust in an industry where discretion is not only expected but is fundamental. Telehealth providers, by design, are at the intersection of convenience and confidentiality, handling deeply personal…
TruffleHog Targets European Commission, Breach Leaked Data of 30 EU Entities
The European Union Cybersecurity Service (CERT-EU) has linked the European Commission cloud breach to the TeamPCP gang. The breach leaked the information of 29 Union organizations. The breach The commission disclosed the attack on March 27, when Bleeping Computer confirmed…
GlassWorm Malware Campaign Attacks Developer IDEs, Steals Data
About GlassWorm campaign Cybersecurity experts have discovered another incident of the ongoing GlassWorm campaign, which uses a new Zig dropper that’s built to secretly compromise all integrated development environments (IDEs) on a developer’s system. The tactic was found in an…
AMD Announces Plan to Acquire Intel in Unprecedented Industry Turn
Advanced Micro Devices has revealed plans to acquire long-time rival Intel Corporation, marking a dramatic reversal in one of the most enduring rivalries in the semiconductor industry. The proposed transaction, structured entirely as a stock-based deal, signals a major…
Windows 11 Faces Rising Threats from AI Malware and Critical Security Flaws
Pressure on Windows 11 security grows – driven by emerging AI-powered malware alongside unpatched flaws threatening companies and everyday users alike. The pace of change in digital threats becomes clearer through recent incidents, especially within large organizational networks. DeepLoad…
Salesforce Unveils AI-Powered Slack Overhaul with 30 Game-Changing Features
Salesforce has unveiled a transformative AI overhaul for its Slack platform, introducing 30 new features designed to elevate it from a mere messaging tool to a comprehensive AI-powered workflow engine. Announced by CEO Marc Benioff at a San Francisco…
Hidden Android Malware Capable of Controlling Devices Raises Security Concerns
Smartphones have become increasingly important as repositories of identity, finances, and daily communications. The recent identification of a new Android malware strain, recently flagged by the National Cybercrime Threat Analytics Unit and ominously dubbed “God Mode”, is indicative of…
Microsoft Releases AI Upgrades, Launches Copilot Cowork to Early Access Customers
In an effort to enhance its AI offering and increase adoption, Microsoft (MSFT.O) recently introduced new features in its Copilot research assistant that would enable users to employ various AI models concurrently within the same workflow. Instead of relying on…
Axios Supply Chain Attack Exposes npm Security Gaps with Token-Based Compromise
A breach in the Axios library – one of many relied upon in modern web development – has exposed flaws that linger beneath surface-level fixes. Through stolen access, hackers slipped harmful updates into what users assumed was safe code.…