Cyber Attack
-
Read moreCybercriminals are using fake file conversion tools to infect users' devices with malware. The FBI has issued an urgent warning about free Word to PDF converters that secretly install malicious software, leading to identity theft, ransomware attacks, and data breaches.
-
Read moreCybercriminals have developed a new malware attack that hides harmful software inside JPEG image files, allowing them to steal passwords from unsuspecting victims. By using steganography, a technique that hides data inside images, hackers can bypass security defenses and infect devices.
-
Read moreThe FBI, CISA, and MS-ISAC have issued a critical alert about Medusa ransomware, a highly destructive cyber threat that is targeting key industries worldwide. With over 300 victims across healthcare, education, law, insurance, and manufacturing, Medusa ransomware is rapidly expanding its reach, using sophisticated tactics to extort businesses.
-
Read moreA new cyber threat is targeting developers and online users through AI-generated fake GitHub repositories. Attackers are using deceptive documentation and hidden malware to steal sensitive data, including login credentials, cryptocurrency wallets, and two-factor authentication (2FA) codes.
-
Read moreElon Musk has alleged that a large-scale cyber-attack targeted X (formerly Twitter), causing widespread outages. While no evidence has been provided, Musk suggested that the attack may have originated from Ukraine. This raises concerns about cyber threats targeting major social media platforms.
-
Read moreIndian tech giant Tata Technologies, a key player in automotive and aerospace engineering, has allegedly fallen victim to a massive ransomware attack. The Hunters International ransomware group claims to have stolen 1.4 TB of sensitive data, potentially impacting major clients like Ford, McLaren, Honda, and Airbus.
-
Read moreA new phishing campaign is targeting Windows users with a deceptive technique called ClickFix, tricking victims into executing malicious PowerShell commands. The attack, active since March 2025, deploys a modified version of the Havoc command-and-control (C2) framework through SharePoint abuse, allowing attackers to take full control of compromised systems.
-
Read moreAngel One, a leading financial services platform, has confirmed a data breach impacting 8 million users after hackers gained unauthorized access to its Amazon Web Services (AWS) resources. The breach was discovered when dark web monitoring alerts signaled potential data leakage. While the company acted quickly to secure its systems, concerns remain about how the breach occurred and its long-term implications.
-
Read moreA dangerous phishing campaign is targeting job seekers in the Web3 and cryptocurrency industry. Attackers are using fake job listings and fraudulent interview invites to trick victims into downloading a malicious video meeting app called GrassCall. Once installed, the malware steals login credentials, authentication data, and cryptocurrency wallets.
-
Read moreA new phishing attack is targeting Amazon Prime users, tricking them with fake renewal notifications to steal login credentials, personal details, and payment information. Discovered by the Cofense Phishing Defense Center on February 18, 2025, this attack uses advanced social engineering techniques and multiple layers of deception.