A rising number of top-tier tech companies in the U.S. have unknowingly employed North Korean cyber agents disguised as remote IT professionals, with the operatives channeling lucrative tech salaries back to Pyongyang to support the regime’s weapons program. Cybersecurity…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Global Data Breach Uncovers 23 Million Stolen Credentials
As a consequence of the fact that a single set of login credentials can essentially unlock an individual’s financial, professional, and personal life, the exposure of billions of passwords represents more than just a routine cybersecurity concern today- it…
Beware iPhone Users: Indian Government Issues Urgent Advisory Over Data Theft Risk
The Indian government has issued an urgent security warning to iPhone and iPad users, citing major flaws in Apple’s iOS and iPadOS software. If not addressed, these vulnerabilities could allow cybercriminals to access sensitive user data or make devices…
Scattered Spider Cyberattack Cripples M&S, Co-op: DragonForce Ransomware Causes Weeks-Long Disruption
Weeks after a significant cyberattack disrupted operations at major British retailers, companies like Marks & Spencer (M&S) and Co-op are still struggling to restore full functionality. Despite public reassurances, the scope of the attack is proving more serious than…
Türkiye-Linked Hackers Exploit Zero-Day in Messaging App to Target Kurdish Military
A Türkiye-aligned cyberespionage group, Marbled Dust, has exploited a previously unknown zero-day vulnerability to launch attacks on users of Output Messenger — specifically those associated with the Kurdish military in Iraq, according to a report from Microsoft Threat…
Report Reveals Serious Security Issues in Common Browser Extensions
Modern digital workflows have become increasingly dependent on browser extensions, supporting a variety of tasks ranging from grammar correction, password management, and advanced AI integrations into everyday tasks. Browser extensions have become widely used across both personal and corporate…
Malicious Chrome Extensions Spoof Password Managers in Novel Polymorphic Attack
Cybersecurity experts have uncovered a novel technique for a malicious web browser extension to spoof any installed add-on. “The polymorphic extensions create a pixel perfect replica of the target’s icon, HTML popup, workflows and even temporarily disables the legitimate…
Lostkeys Malware: Russian Group Coldriver Targets Western Officials in Espionage Campaign
A new wave of cyber espionage has emerged, with Russian hackers deploying a sophisticated malware strain known as “Lostkeys” to infiltrate the systems of Western officials, journalists, and NGOs. According to researchers from Google’s Threat Intelligence Group, the malware…
Bangladesh’s Deepfake Challenge: Why New Laws Aren’t Enough
Bangladesh has taken a big step to protect its people online by introducing the Cyber Security Ordinance 2025. This law updates the country’s approach to digital threats, replacing the older and often criticized 2023 act. One of its most…
New AI Video Tool Scam Delivers Noodlophile Malware to Steal Your Data
Cybercriminals are using fake AI-powered video generation tools to spread a newly discovered malware strain called ‘Noodlophile’, disguised as downloadable media content. Fraudulent websites with names like “Dream Machine” are being promoted in high-visibility Facebook groups, pretending to be…