Researchers at S-RM have discovered an unusual attack method used by the Akira ransomware gang. The Akira ransomware gang utilized an unsecured webcam to conduct encryption attacks against victims’ networks via the use of an unsecured webcam. The attackers…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
FBI Warns of Fake Ransom Demands Sent by Mail to US Executives
A new scam is targeting top business leaders in the United States, where criminals are sending letters demanding large ransom payments. Unlike typical ransomware attacks that involve hacking into computer systems, this scheme relies on physical mail. The letters…
Polish Space Agency Faces Cyberattack, Takes IT Systems Offline
The Polish Space Agency (POLSA) recently experienced a cybersecurity breach, prompting the organization to disconnect its IT infrastructure from the internet. POLSA confirmed the incident through a post on X, stating that relevant authorities had been notified. “There has…
North Korean Hackers Exploit ZIP Files in Sophisticated Cyber Attacks
State-sponsored hacking group APT37 (ScarCruft) is deploying advanced cyber-espionage tactics to infiltrate systems using malicious ZIP files containing LNK shortcuts. These files are typically disguised as documents related to North Korean affairs or trade agreements and are spread through…
Tata Technologies Cyberattack: Hunters International Ransomware Gang Claims Responsibility for 1.4TB Data Theft
Hunters International, a ransomware group known for high-profile cyberattacks, has claimed responsibility for a January 2025 cyberattack on Tata Technologies. The group alleges it stole 1.4TB of sensitive data from the company and has issued a threat to release…
Persistent Increase in Ransomware Attacks Raises Global Security Concerns
It was concluded that in the first five weeks of 2025, there was a significant increase in ransomware attacks targeted at the United States, marking a nearly 150% increase compared to the first five weeks of 2024. Based on…
Quantum Computers Threaten to Breach Online Security in Minutes
A perfect quantum computer could decrypt RSA-2048, our current strongest encryption, in 10 seconds. Quantum computing employs the principle of quantum physics to process information using quantum bits (qubits) rather than standard computer bits. Qubits can represent both states…
Fake Websites and Malware Threats: How to Stay Safe Online
Recent research from the cybersecurity company NordVPN has revealed a significant rise in online threats, with over 669 million malware attacks recorded in the UK in 2024 alone. This alarming number highlights the increasing risk of falling victim to…
Cybercriminals Abuse Microsoft Teams & Quick Assist for Remote Access
Trend Micro security experts discovered a sophisticated cyberattack that included social engineering tactics and commonly employed remote access tools. The attack, which uses stealthy infostealer malware, gives thieves permanent access over vulnerable PCs and allows them to steal sensitive…
Cyberattacks on Single Points of Failure Are Driving Major Industry Disruptions
Cybercriminals are increasingly targeting single points of failure within companies, causing widespread disruptions across industries. According to cybersecurity firm Resilience, attackers have shifted their focus toward exploiting key vulnerabilities in highly interconnected organizations, triggering a “cascading effect of disruption and…
AI as a Key Solution for Mitigating API Cybersecurity Threats
Artificial Intelligence (AI) is continuously evolving, and it is fundamentally changing the cybersecurity landscape, enabling organizations to mitigate vulnerabilities more effectively as a result. As artificial intelligence has improved the speed and scale with which threats can be detected…
Cyfox Launches OmniSec vCISO: Harnessing GenAI for Comprehensive Compliance and Cybersecurity Management
Cysecurity News recently interviewed CYFOX to gain an in-depth understanding of their new platform, OmniSec vCISO. The platform, designed to simplify compliance and bolster security operations, leverages advanced generative AI (genAI) and aims to transform what was traditionally the manual…
SilentCryptominer Threatens YouTubers to Post Malware in Videos
Experts have discovered an advanced malware campaign that exploits the rising popularity of Windows Packet Divert drivers to escape internet checks. Malware targets YouTubers Hackers are spreading SilentCryptominer malware hidden as genuine software. It has impacted over 2000 victims in…
Private API Keys and Passwords Discovered in a Popular AI Training dataset
The Common Crawl dataset, which is used to train several artificial intelligence models, has over 12,000 legitimate secrets, including API keys and passwords. The Common Crawl non-profit organisation maintains a vast open-source archive of petabytes of web data collected…
Hackers Exploit Flaw in Microsoft-Signed Driver to Launch Ransomware Attacks
Cybercriminals are exploiting a vulnerability in a Microsoft-signed driver developed by Paragon Software, known as BioNTdrv.sys, to carry out ransomware attacks. This driver, part of Paragon Partition Manager, is typically used to manage hard drive space, but hackers have…
Google to Introduce QR Codes for Gmail 2FA Amid Rising Security Concerns
Google is set to introduce QR codes as a replacement for SMS-based two-factor authentication (2FA) codes for Gmail users in the coming months. While this security update aims to improve authentication methods, it also raises concerns, as QR code-related…
New Polymorphic Attack Enables Malicious Chrome Extensions to Impersonate Password Managers and Banking Apps
Researchers at SquareX Labs have uncovered a sophisticated “polymorphic” attack targeting Google Chrome extensions, allowing malicious extensions to seamlessly morph into trusted ones, such as password managers, cryptocurrency wallets, and banking apps. The attack exploits Chrome’s ‘chrome.management’ API to gain…
Skype’s Role in Popularizing End-to-End Encryption Leaves a Lasting Mark
In recent years, Skype has established itself as the most popular online communication platform, and it is nearing its close, marking the end of an era for one of the most popular VoIP services in the world. The first…
State-Backed Hackers Escalate Attacks on Government Email Servers
Cyberattacks targeting government email servers have intensified in recent years, a trend that experts warn is expected to continue. This concern follows a recent breach involving a cyber-espionage group linked to China, which infiltrated the email servers of Belgium’s…
AI Model Misbehaves After Being Trained on Faulty Data
A recent study has revealed how dangerous artificial intelligence (AI) can become when trained on flawed or insecure data. Researchers experimented by feeding OpenAI’s advanced language model with poorly written code to observe its response. The results were alarming…