One of the largest newspaper groups in the US- Lee Enterprises, faced the brunt of a cyberattack recently. The newspaper giant, which has readership across 72 markets in 25 states, reported the unfortunate incident of a cyberattack on February 7, 2025. The attack forced the media conglomerate to temporarily bring down its IT infrastructure offline.
A significant data breach has occurred at the Community Health Center (CHC), a US-based nonprofit organization providing patient-centered healthcare. This is the third case within a span of just 7 days.
Artificial Intelligence is dangerous when manipulated and exploited by threat actors. One such recent example of AI menace is GhostGPT. It’s yet another AI chatbot that was developed with the sole purpose of making it easy and convenient for cybercriminals. This unrestricted generative AI model has garnered immense popularity within days of its launch.
The automotive industry is increasingly becoming a popular pick among threat actors. Because of its perceived vulnerabilities and dynamic trends, the automotive industry is no longer safe from the prying eyes of cybercriminals. The recent data breach at Volkswagen is no different. The cyber incident exposed the personal data of 800K EV customers!
Africa’s rapid digitization attempts have made it a prime target among threat actors. Jumping onto the digitization bandwagon just to stay relevant without having the proper knowledge, resources, and infrastructure is affecting Africa badly.
India has been experiencing an alarming rise in API (Application Programming Interface) attacks, with banking and utilities sectors emerging as primary targets. APIs, the backbone of digital services and communications systems, are becoming vulnerable with each passing day.
Google has always prioritized protecting its users and preventing phishing attempts. To achieve this, it has established strict guidelines for sending emails to Gmail users. Violating these guidelines can result in your emails being marked as spam or bouncing back, instead of successfully reaching the inboxes of your intended recipients.
These measures are part of Google’s phishing protection efforts to ensure a secure and reliable email environment.
Blue Yonder, an AI-oriented supply chain management platform, has been attacked by threat actors. The breach, identified as a ransomware attack, happened on November 21st, 2024. The attack has resulted in a massive impact on the company’s major infrastructure, which it utilizes to offer premium services to its customer base.
Just when the whole world is going gaga over the latest launch of iPhone 16 Pro, a piece of news stunned every Apple enthusiast. The voiceover feature of iPhone and iPad could read out passwords aloud, thereby raising serious privacy concerns. Although Apple has now patched the two bugs, Apple users are feeling a bit concerned about data safety.
The FBI recently managed to dismantle a massive Chinese state-sponsored cyberattack in a joint operation. The hacker group, known by the name of Flax Typhoon, used a botnet to attack thousands of devices and gain access to the US and overseas data. The ultimate goal of the attack was to create disruption and steal sensitive data. The botnet primarily targeted devices such as digital video recorders, IoT gadgets, and routers, thereby making it a highly sophisticated network dedicated to carrying out malicious cyberattacks.
Fortinet, a security vendor based in California, has recently released an official confirmation regarding a data breach. The hacker, known by the name of FortiBitch, has leaked 440GB worth of data on BreachForums. Fortinet believes that the data breach is not that big of a deal and has impacted only a ‘small number’ of Fortinet users.
Turkish language speakers are being targeted by a malicious Android program. This program is targeting them with the sole purpose of gaining access to users’ sensitive data.
A sudden spike in the number of cyber scam incidents has led to panic among electricity consumers in Delhi, India. Power distribution companies or discoms have warned consumers to be highly vigilant while paying their bills online.
Recently, a Delhi-based doctor has been scammed by a similar cyber fraud. He clicked on a malicious link to pay his electricity bill and lost a staggering INR 6 lakh.
Threat actors never fail to surprise us with their out-of-the-box ideas and this time also, it’s no different! An Aussie got arrested as he was trying to gain access to passengers’ data by creating a fake Wi-Fi access point.
The LockBit ransomware gang, known for its Russian connection, has just claimed to publish a huge cache file that it allegedly stole from the US Federal Reserve Central Banking System. LockBit published 21 different links that contain important files. These files seem to belong to the torrents, archived files, and parent directories of Evolve Bank and Trust. Here’s the catch- Evolve Bank and Trust was recently restricted for unethical and unsafe banking practices.
Cybercrime has penetrated deep into the corporate world. Even though corporate organizations and enterprises are doing their best to keep hackers at bay, the threat actors somehow manage to stay one step ahead.
Commuting from one place to another isn’t just time-consuming but can also feel heavy on your pocket. No, this is not about the rising prices of gasoline. In a serious turn of events, a new and alarming type of smishing incident has been sweeping across all the states of the USA.
There’s a new kid named CoralRaider in the block of Vietnamese cyber criminals. These cyber attackers have targeted Asian organizations and brands with the aim of gaining access to social media account details and sensitive user data. The specialty of CoralRaider lies in seamless data extraction through legitimate services and social engineering tactics.
Phishing scams have become commonplace and have intruded into our everyday lives in ways beyond our imagination. Commoners, as well as A-listers across the globe, have fallen prey to phishing scams.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.