State-sponsored hacking group APT37 (ScarCruft) is deploying advanced cyber-espionage tactics to infiltrate systems using malicious ZIP files containing LNK shortcuts. These files are typically disguised as documents related to North Korean affairs or trade agreements and are spread through…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Tata Technologies Cyberattack: Hunters International Ransomware Gang Claims Responsibility for 1.4TB Data Theft
Hunters International, a ransomware group known for high-profile cyberattacks, has claimed responsibility for a January 2025 cyberattack on Tata Technologies. The group alleges it stole 1.4TB of sensitive data from the company and has issued a threat to release…
Persistent Increase in Ransomware Attacks Raises Global Security Concerns
It was concluded that in the first five weeks of 2025, there was a significant increase in ransomware attacks targeted at the United States, marking a nearly 150% increase compared to the first five weeks of 2024. Based on…
Quantum Computers Threaten to Breach Online Security in Minutes
A perfect quantum computer could decrypt RSA-2048, our current strongest encryption, in 10 seconds. Quantum computing employs the principle of quantum physics to process information using quantum bits (qubits) rather than standard computer bits. Qubits can represent both states…
Fake Websites and Malware Threats: How to Stay Safe Online
Recent research from the cybersecurity company NordVPN has revealed a significant rise in online threats, with over 669 million malware attacks recorded in the UK in 2024 alone. This alarming number highlights the increasing risk of falling victim to…
Cybercriminals Abuse Microsoft Teams & Quick Assist for Remote Access
Trend Micro security experts discovered a sophisticated cyberattack that included social engineering tactics and commonly employed remote access tools. The attack, which uses stealthy infostealer malware, gives thieves permanent access over vulnerable PCs and allows them to steal sensitive…
Cyberattacks on Single Points of Failure Are Driving Major Industry Disruptions
Cybercriminals are increasingly targeting single points of failure within companies, causing widespread disruptions across industries. According to cybersecurity firm Resilience, attackers have shifted their focus toward exploiting key vulnerabilities in highly interconnected organizations, triggering a “cascading effect of disruption and…
AI as a Key Solution for Mitigating API Cybersecurity Threats
Artificial Intelligence (AI) is continuously evolving, and it is fundamentally changing the cybersecurity landscape, enabling organizations to mitigate vulnerabilities more effectively as a result. As artificial intelligence has improved the speed and scale with which threats can be detected…
Cyfox Launches OmniSec vCISO: Harnessing GenAI for Comprehensive Compliance and Cybersecurity Management
Cysecurity News recently interviewed CYFOX to gain an in-depth understanding of their new platform, OmniSec vCISO. The platform, designed to simplify compliance and bolster security operations, leverages advanced generative AI (genAI) and aims to transform what was traditionally the manual…
SilentCryptominer Threatens YouTubers to Post Malware in Videos
Experts have discovered an advanced malware campaign that exploits the rising popularity of Windows Packet Divert drivers to escape internet checks. Malware targets YouTubers Hackers are spreading SilentCryptominer malware hidden as genuine software. It has impacted over 2000 victims in…