India has become the world’s most-targeted nation for malware, according to the latest report by cybersecurity firm Acronis, which highlights how artificial intelligence is fueling a sharp increase in ransomware and phishing activity. The findings come from the company’s biannual threat landscape analysis, compiled by the Acronis Threat Research Unit (TRU) and its global network of sensors tracking over one million Windows endpoints between January and June 2025. | CySecurity News - Latest Information Security and Hacking Incidents
The Pakistani threat group APT36 has launched new cyber-espionage attacks targeting India’s government and defense sectors by abusing Linux .desktop files to deploy malware.| CySecurity News - Latest Information Security and Hacking Incidents
RevaUlt, a company marketing itself on advanced endpoint protection and next-generation SOC capabilities, recently suffered a severe security breach. The attackers penetrated its internal environment, exploiting vulnerabilities in the architecture used for their supposed secure SOC platform. | CySecurity News - Latest Information Security and Hacking Incidents
Security experts have identified a new kind of cyber attack that hides instructions inside ordinary pictures. These commands do not appear in the full image but become visible only when the photo is automatically resized by artificial intelligence (AI) systems.| CySecurity News - Latest Information Security and Hacking Incidents
Verizon has faced challenges in recent months. They have faced mounting criticism for a number of controversial decisions that have left many of their long-time subscribers wondering why they still belong to Verizon. | CySecurity News - Latest Information Security and Hacking Incidents
Security researchers are warning users against relying on free VPN services after uncovering alarming surveillance practices linked to a popular Chrome extension. The extension in question, FreeVPN.One, has been downloaded over 100,000 times from the Chrome Web Store and even carried a “featured” badge, which typically indicates compliance with recommended standards. Despite this appearance of legitimacy, the tool was found to be secretly spying on its users. | CySecurity News - Latest Information Security and Hacking Incidents
Cybersecurity researchers have unearthed a new Mac-targeting malware called Shamos that deceives users through fake troubleshooting guides and repair solutions. This information-stealing malware, developed by the cybercriminal organization "COOKIE SPIDER," represents a variant of the previously known Atomic macOS Stealer (AMOS).| CySecurity News - Latest Information Security and Hacking Incidents
Nissan’s Tokyo-based design subsidiary, Creative Box Inc. (CBI), has launched an investigation into a cyberattack after a ransomware group claimed to have stolen a large cache of internal files. The company confirmed that some design data has been compromised but said the breach affects only Nissan itself, as CBI’s work is exclusively for the automaker.| CySecurity News - Latest Information Security and Hacking Incidents
Healthcare Faces Growing Cyber Threats| CySecurity News - Latest Information Security and Hacking Incidents
Smartphones are quietly monitoring your sleep patterns, movements, and even typing behavior to detect signs of depression with an accuracy rate of 73–88%, according to peer-reviewed studies in Frontiers in Psychiatry and JMIR Research. | CySecurity News - Latest Information Security and Hacking Incidents
UK-based telecommunications provider Colt Technology Services has confirmed that sensitive customer-related documentation was stolen in a recent ransomware incident. The company initially disclosed on August 12 that it had suffered a cyberattack, but this marks the first confirmation that data exfiltration took place.| CySecurity News - Latest Information Security and Hacking Incidents
A recent cyberattack on TPG Telecom has reignited concerns about how safe personal information really is in the hands of major companies. What the provider initially downplayed as a “limited” incident has in fact left hundreds of thousands of customers vulnerable to online scams.| CySecurity News - Latest Information Security and Hacking Incidents
A sophisticated phishing campaign is targeting job seekers with fake Netflix job offers designed to steal Facebook login credentials. The scam specifically focuses on marketing and social media professionals who may have access to corporate Facebook business accounts. | CySecurity News - Latest Information Security and Hacking Incidents
In recent decades, artificial intelligence has radically changed the way software is created, tested, and deployed, bringing about a significant shift in software development history. Originally, it was only a simple autocomplete function, but it has evolved into a sophisticated AI system capable of producing entire modules of code based on natural language inputs. | CySecurity News - Latest Information Security and Hacking Incidents
A new study warns that cybercriminals are leveraging artificial intelligence (AI) and automation to strike faster and with greater precision, exposing critical weaknesses in Southeast Asia—a region marked by rapid digital growth and interconnected supply chains. The findings urge businesses to treat cybersecurity as the foundation of digital trust and organizational resilience.| CySecurity News - Latest Information Security and Hacking Incidents
The emergence of sovereign clouds has become increasingly inevitable as organizations face mounting regulatory demands and geopolitical pressures that influence where their data must be stored. Localized cloud environments are gaining importance, ensuring that enterprises keep sensitive information within specific jurisdictions to comply with legal frameworks and reduce risks. However, the success of sovereign clouds hinges on data portability, the ability to transfer information smoothly acr...| CySecurity News - Latest Information Security and Hacking Incidents
The Business Council of New York State (BCNYS), an influential body representing businesses and professional groups, has confirmed that a recent cyberattack compromised the personal information of more than 47,000 people.| CySecurity News - Latest Information Security and Hacking Incidents
In a stunning development in the history of cybersecurity, independent hackers managed to successfully break into the system of a North Korean government hacker, enabling them to expose the inner workings of one of the country's most secretive cyber units. | CySecurity News - Latest Information Security and Hacking Incidents
Orange Belgium, a major telecommunications provider and subsidiary of French telecom giant Orange Group, confirmed in August 2025 a significant cyberattack on its IT systems that resulted in unauthorized access to the personal data of approximately 850,000 customers.| CySecurity News - Latest Information Security and Hacking Incidents
A popular Chrome VPN extension with more than 100,000 installs and a verified badge has been revealed as a highly sophisticated spyware tool. Security researchers discovered that the extension secretly recorded screenshots and exfiltrated sensitive user data without consent.| CySecurity News - Latest Information Security and Hacking Incidents
Artificial intelligence has become one of the most talked-about technologies in recent years, with billions of dollars poured into projects aimed at transforming workplaces. Yet, a new study by MIT suggests that while official AI programs inside companies are struggling, employees are quietly driving a separate wave of adoption on their own. Researchers are calling this the rise of the “shadow AI economy.”| CySecurity News - Latest Information Security and Hacking Incidents
The virtual private network market is filled with countless providers, each promising secure browsing and anonymity. In such a crowded space, VP.NET has emerged with the bold claim of changing how VPNs function altogether. The company says it is “the only VPN that can’t spy on you,” insisting that its system is built in a way that prevents monitoring, logging, or exposing any user data. | CySecurity News - Latest Information Security and Hacking Incidents
Six popular password managers serving tens of millions of users remain vulnerable to unpatched clickjacking flaws that could allow cybercriminals to steal login credentials, two-factor authentication codes, and credit card information. | CySecurity News - Latest Information Security and Hacking Incidents
A comprehensive roadmap has been unveiled by Microsoft to enable it to future-proof its security infrastructure, marking a decisive step toward securing the company's products and services with quantum-safe protection by 2033 — two years ahead of the target set by the United States and other governments. | CySecurity News - Latest Information Security and Hacking Incidents
Such vulnerabilities occur when malicious input forces a program to write data beyond allocated memory limits.| www.cysecurity.news
An investigation uncovers India’s black market for bank accounts, exposing systemic lapses exploited by cybercriminals for scams.| CySecurity News - Latest Information Security and Hacking Incidents
Officials revealed that the scam involved insider leaks at the authorised Card Protection Plan (CPP) call centre, Teleperformance, in Gurugram.| CySecurity News - Latest Information Security and Hacking Incidents
The vulnerability, a directory traversal bug, was addressed in WinRAR version 7.13.| CySecurity News - Latest Information Security and Hacking Incidents
With a decade-long track record, VexTrio uses backend exploits in major websites to target unsuspecting users.| CySecurity News - Latest Information Security and Hacking Incidents
China’s Ministry of State Security warns of biometric data risks in crypto reward schemes, citing threats to national security and personal privacy.| CySecurity News - Latest Information Security and Hacking Incidents
Air France–KLM suffers major customer data breach, highlighting rising cyber threats and security challenges in global aviation.| CySecurity News - Latest Information Security and Hacking Incidents
A report indicates that more than 8% of borrowers will be using these financing structures by 2025.| CySecurity News - Latest Information Security and Hacking Incidents
Gemini CLI GitHub Actions is an AI coding assistant that is activated by pull requests and new issues on GitHub.| CySecurity News - Latest Information Security and Hacking Incidents
Latest Information Security and hacker news site.Know about cyber crime and law. Cyber Security updates to improve your network security| CySecurity News - Latest Information Security and Hacking Incidents
International operation dismantles BlackSuit ransomware, seizing infrastructure and funds, as researchers warn of Chaos ransomware reemergence.| CySecurity News - Latest Information Security and Hacking Incidents
Latest Information Security and hacker news site.Know about cyber crime and law. Cyber Security updates to improve your network security| CySecurity News - Latest Information Security and Hacking Incidents
The Fed warned orgs about this spectral threat, which has been known to infiltrate institutions and critical infrastructure across all sectors.| CySecurity News - Latest Information Security and Hacking Incidents