Britain's National Cyber Security Center, part of its signals intelligence agency GCHQ, said it had dealt with 429 cyber incidents in the 12 months to the end of August.
Cyberattacks seem inevitable lately, and large-scale theft of customer data has begun to feel almost routine. Attacks that upend company operations are exposing troubling vulnerabilities
Disruption had eased significantly by early Sunday despite some continuing delays, according to airport officials and data, while regulators said they were investigating the source of the cyberattack
A cyberattack targeting check-in and boarding systems has snarled air traffic and caused delays at some of Europe's top airports, officials said Saturday. The Brussels airport says the attack means that only manual check-in and boarding was possible there, and the incident was having a large impact on flight schedules. There was a cyberattack on Friday night 19 September against the service provider for the check-in and boarding systems affecting several European airports including Brussels Airport, it said in a statement. Authorities at Berlin's Brandenburg Airport said a service provider for passenger handling systems was attacked on Friday evening, prompting airport operators to cut off connections to the systems. London Heathrow Airport, Europe's busiest, said a technical issue affected a service provider for check-in and boarding systems. Collins Aerospace, which provides check-in and boarding systems for several airlines across multiple airports globally, is experiencing a .
The luxury carmaker, owned by India's Tata Motors, said it shut down its systems in early September to contain the hack that has severely disrupted its retail and manufacturing operations
Qantas detected the cyberattack on June 30, the last day of the financial year, and later found that personal information belonging to 5.7 million customers had been stolen
India emerges as a key source of the cybercrime, prompting companies to strengthen their security systems and train employees
A new CERT-In advisory warns Chrome users on Windows, Mac, and Linux of a flaw that allows remote hackers to run malicious code
Tuhin Kanta Pandey calls for constant vigilance, cyber drills, and strong internal safeguards to protect exchanges and investors from escalating online threats
Shadow AI, the unauthorised use of artificial intelligence tools, models, or platforms, is emerging as a new threat, according to IBM's annual 'Cost of Data Breach' report
Backed by Avataar Ventures and others, SAFE to invest in agentic AI for real-time, autonomous cyber risk assessment as demand for boardroom-level solutions grows
CoinDCX offers up to 25% bounty after $44.2 mn theft. Firm seeks white-hat help in crypto recovery, amid rising cyberattacks on Indian exchanges
A new CERT-In advisory warns of critical flaws in Microsoft software that could let attackers steal data, run malicious code, or bypass system protections
CERT-In warns that Airoha-powered Bluetooth earbuds and speakers can be hacked to spy on users, steal call data, and hijack conversations
A politically motivated hacker breached Columbia University's data systems last week, stealing troves of student documents while briefly shutting down the school's computer systems, a university official said. The June 24 cyberattack prompted widespread network outages on campus, locking students and staff out of their email accounts, coursework and video conference software for several hours. On the same day, images of President Donald Trump's smiling face appeared on several public monitors across the Manhattan campus. A spokesperson for Columbia declined to elaborate on the political motivations behind the attack. But they described a highly sophisticated hacktivist who had gained access to private student records in an attempt to further a political agenda. The spokesperson said it was unclear if the Trump photo display was connected to the data breach. We are investigating the scope of the apparent theft and will share our findings with the University community as well as anyo
The company has initiated a security assessment and data log analysis, Max Financial said
A ceasefire between Iran and Israel has not ended the threat of cyberattacks from hacking groups supportive of Tehran, the FBI and federal cybersecurity officials warned on Monday. In a public bulletin, the authorities warned that hacking groups affiliated with or supportive of Tehran may still seek to disrupt or disable critical infrastructure systems in the US such as utilities, transportation and economic hubs. Hackers may also target defence contractors or other American companies with ties to Israel, the agencies said. Despite a declared ceasefire and ongoing negotiations towards a permanent solution, Iranian-affiliated cyber actors and hacktivist groups may still conduct malicious cyber activity, the agencies warned. The warning of continued cyberthreats after a halt to conventional warfare reflects the often opaque nature of cyber conflict. Hacking groups may have only loose ties to a nation state, and may seek to retaliate as an alternative to traditional military action.
The attack was first reported by the Wall Street Journal, which cited unnamed sources as saying the hack was potentially the work of a foreign government
India foiled around two lakh cyberattacks targeting its power infrastructure in over the week during the Operation Sindoor, Union Power Minister Manohar Lal Khattar said here on Thursday. "Since the advancement in technology, new dangers have emerged -- cyberattacks or cybercrimes. There has been an increase in these, but the government has worked on it, and our cybersecurity has almost stopped all such dangers," Khattar told reporters here. He was addressing a press conference on the completion of 11 years of the BJP-led Central government. "There have been many cyberattacks on the country. As far as the Power department is concerned, around two lakh cyberattacks were attempted, but our cyber department foiled each one of them, and there were no losses," the minister said. Khattar said these attempts were made in "eight to ten days" around the time Operation Sindoor went underway. Asked whether the attacks were made from within the country or outside it, the minister said these .
The M&S incident is being widely reported as an example of what is known as "SIM swap". It's a form of fraud that is on the rise and understanding how to protect against it will help limit its impact