Web3 technology promises to transform the internet, making it decentralized, secure, and transparent. However, many people hesitate to adopt it due to a lack of trust in the technology. Building this trust requires clear explanations, user-friendly experiences, and a…
Category: CySecurity News – Latest Information Security and Hacking Incidents
PowerSchool Breach Compromises Student and Teacher Data From Kâ12 Districts
PowerSchool, a widely used software serving thousands of Kâ12 schools in the United States, has suffered a major cybersecurity breach. The Breach has left several schools worried about the potential exposure of critical student and faculty data. With over…
ICAO Investigates Potential Data Breach Amid Cybersecurity Concerns
The International Civil Aviation Organization (ICAO), a United Nations agency tasked with creating global aviation standards, has disclosed an investigation into a potential cybersecurity incident. Established in 1944, ICAO works with 193 member states to develop and implement aviation-related…
$494 Million Stolen in Cryptocurrency Wallet Breaches This Year
As a result of the churning threat landscape, new threats are always emerging while others disappear or fade into irrelevance. Wallet drainers trick their victims into signing malicious transactions in order to steal their assets. As the name implies,…
AI and Blockchain: Shaping the Future of Personalization and Security
The integration of Artificial Intelligence (AI) and blockchain technology is revolutionizing digital experiences, especially for developers aiming to enhance user interaction and improve security. By combining these cutting-edge technologies, digital platforms are becoming more personalized while ensuring that user…
Passkeys: The Future of Secure and Seamless Online Authentication
Passwords have been a cornerstone of digital security for decades, but managing them has grown increasingly complex. Even with the help of password managers, users face the challenge of creating and remembering countless unique, complex passwords. The days of…
Sophisticated Credit Card Skimmer Malware Targets WordPress Checkout Pages
Recent cybersecurity reports have highlighted a new, highly sophisticated credit card skimmer malware targeting WordPress checkout pages. This stealthy malware embeds malicious JavaScript into database records, leveraging database injection techniques to effectively steal sensitive payment information. Its advanced design…
Play Ransomware: A Rising Global Cybersecurity Threat
Play ransomware, also known as Balloonfly or PlayCrypt, has become a significant cybersecurity threat since its emergence in June 2022. Responsible for over 300 global attacks, this ransomware employs a double extortion model â stealing sensitive data before encrypting…
Meta Removes Independent Fact Checkers, Replaces With “Community Notes”
Meta to remove fact-checkers Meta is dumping independent fact-checkers on Instagram and Facebook, similar to what X (earlier Twitter) did, replacing them with âcommunity notesâ where usersâ comments decide the accuracy of a post. On Tuesday, Mark Zuckerberg in a…
Gravy Analytics Data Breach Exposes Sensitive Location Data of U.S. Consumers
Gravy Analytics, the parent company of data broker Venntel, is facing mounting scrutiny after hackers reportedly infiltrated its systems, accessing an alarming 17 terabytes of sensitive consumer data. This breach includes detailed cellphone behavior and location data of U.S.…
Silent Crow Claims Hack of Russiaâs Rosreestr, Leaks Citizensâ Personal Data
The hacking group Silent Crow has claimed responsibility for breaching Russia’s Federal Service for State Registration, Cadastre, and Cartography (Rosreestr), releasing what it describes as a fragment of the agencyâs database. The leak reportedly includes sensitive personal information of…
Japan Attributes Ongoing Cyberattacks to China-Linked MirrorFace Group
Japan’s National Police Agency (NPA) and the National Centre of Incident Readiness and Strategy for Cybersecurity (NISC) have officially attributed a prolonged cyberattack campaign targeting Japanese organizations and individuals since 2019 to the China-linked threat actor MirrorFace, also known…
New Variant of Banshee Stealer Targets macOS with Enhanced Evasion Tactics
Cybersecurity researchers have identified a dangerous new version of Banshee Stealer, a sophisticated malware specifically targeting macOS users. This updated strain is designed to bypass antivirus defenses and steal sensitive data from millions of macOS devices. Originally detected in…
India Proposes New Draft Rules Under Digital Personal Data Protection Act, 2023
The Ministry of Electronics and Information Technology (MeitY) announced on January 3, 2025, the release of draft rules under the Digital Personal Data Protection Act, 2023 for public feedback. A significant provision in this draft mandates that parental consent must…
California Man Sues Banks Over $986K Cryptocurrency Scam
Ken Liem, a California resident, has filed a lawsuit against three major banks, accusing them of negligence in enabling a cryptocurrency investment scam. Liem claims he was defrauded of $986,000 after being targeted on LinkedIn in June 2023 by a…
The Digital Markets Act (DMA): A Game Changer for Tech Companies
The Digital Markets Act (DMA) is poised to reshape the European digital landscape. This pioneering legislation by the European Union seeks to curb the dominance of tech giants, foster competition, and create a fairer digital marketplace for consumers and businesses…
1Password Acquires Trelica to Strengthen SaaS Management and Security
1Password, the renowned password management platform, has announced its largest acquisition to date: Trelica, a UK-based SaaS (Software-as-a-Service) management company. While the financial details remain undisclosed, this strategic move aims to significantly enhance 1Passwordâs ability to help businesses better…
Critical Command Injection Vulnerability Found in Aviatrix Network Controller (CVE-2024-50603)
Jakub Korepta, Principal Security Consultant at Securing, has discovered a critical command injection vulnerability in the Aviatrix Network Controller, identified as CVE-2024-50603. This flaw, impacting versions 7.x through 7.2.4820, has been assigned the highest possible CVSS severity score of…
Android Malware ‘FireScam’ Poses As Telegram Premium to Steal User Data
The latest Android malware called ‘FireScam’ is being shared as a premium variant of the Telegram application through phishing sites on GitHub that impersonate the RuStore, a Russian app market for mobile devices. About FireScam vulnerability Russian internet group VK…
This New Malware Exploits VPN Apps to Hijack Devices
A newly discovered malware, named PLAYFULGHOST, is causing concern among cybersecurity experts due to its versatile capabilities for data theft and system compromise. According to researchers, this malware employs techniques such as screen and audio capture, keylogging, remote shell…