A Cybernews research team discovered a huge exposed data server on June 25th. The server contained 3GB of personal information and telemetry from iPhones equipped with an app known as “Home V.” According to the log samples, the data…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Bengaluru Techie Loses ₹11.8 Crore in “Digital Arrest” Scam Over 18 Days
A Bengaluru software engineer recently fell victim to a complex cyber scam, losing ₹11.8 crore in just 18 days. The incident highlights the growing sophistication of cybercrimes in India, particularly in tech hubs like Bengaluru. The victim, whose identity…
Clop Ransomware Gang Threatens 66 Companies with Data Leak After Cleo Breach
The Clop ransomware gang has intensified its extortion tactics following a data theft attack targeting Cleo software. On its dark web portal, the group revealed that 66 companies have been given 48 hours to meet their ransom demands. According…
Look Who’s Back: LockBit Gears Up for a Comeback With Version 4.0
The infamous LockBit ransomware group has announced its return with the upcoming release of LockBit 4.0, set for February 2025. This marks a big moment for the group, which has had major setbacks over the last year. A global…
New Alert: Windows and Mac Are the Target of a Self-Deleting Ransomware
The ransomware epidemic may have been stopped by recent law enforcement operations that disrupted attack infrastructure, led to the arrest of cybercriminals, and broke up some threat groups, but this would be wrong as well. A recent study on…
Global Crypto Hacks Escalate to $2.2 Billion in 2024
Chainalysis, a blockchain analytics company that provides data analysis on the blockchain ecosystem, has reported that the volume of compromised crypto funds and the number of hacking incidents are set to rise in 2024. The report states that the…
Free VPN Big Mama Raises Security Concerns Amid Cybercrime Links
Big Mama VPN, a free virtual private network app, is drawing scrutiny for its involvement in both legitimate and questionable online activities. The app, popular among Android users with over a million downloads, provides a free VPN service while…
Understanding TPM: The Key Security Feature Powering Windows 11 Compatibility
When Microsoft launched Windows 11 in 2021, it introduced a strict hardware compatibility requirement, including the necessity for a Trusted Platform Module (TPM) that adheres to the TPM 2.0 standard. A TPM is a secure cryptoprocessor designed to manage…
Hackers are Employing Amazon Appstore to Propagate Malware
‘BMI CalculationVsn’ is a malicious Android spyware app that was identified on the Amazon Appstore. It poses as a simple health tool while covertly harvesting data from compromised devices. Cybersecurity researchers from McAfee Labs discovered the app and notified…
Proton Docs vs Google Docs in the Productivity Space
< p style=”text-align: justify;”>For those who are concerned about privacy, Proton has announced an end-to-end encrypted document editor intended to be a viable alternative to Microsoft Word and Google Docs. This application, released on Wednesday by the Swiss software…
Executives Targeted by Advanced Mobile Phishing Attacks
< p style=”text-align: justify;”>Mobile phishing attacks have continued to advance, targeting corporate executives. A report from mobile security firm Zimperium describes these attacks as highly sophisticated means of exploiting mobile devices. Thus, there is an emerging need for awareness…
Ledger Phishing Scam Targets Cryptocurrency Wallets
A sophisticated phishing email campaign has emerged, targeting cryptocurrency users by impersonating Ledger, a prominent hardware wallet provider. These fraudulent emails claim that the recipient’s Ledger wallet seed phrase — also known as a recovery or mnemonic seed —…
The Future of Artificial Intelligence: Progress and Challenges
Artificial intelligence (AI) is rapidly transforming the world, and by 2025, its growth is set to reach new heights. While the advancements in AI promise to reshape industries and improve daily lives, they also bring a series of challenges that…
Juniper Networks Warns of Mirai Malware Threat to Routers with Default Passwords
Juniper Networks has issued a warning about a vulnerability in its Session Smart Routers, emphasizing the risk of Mirai malware infection if factory-set passwords are not changed. Starting December 11, the company began receiving reports from customers about “suspicious…
Ledger Users Targeted by Sophisticated Phishing Attacks
< p style=”text-align: justify;”> Ledger users are once again in the crosshairs of phishing attacks as hackers employ increasingly advanced tactics to steal crypto assets. The latest campaigns involve fake emails crafted to deceive users into revealing their secret…
Here’s How to Safeguard Your Data From Data Brokers
Privacy concerns have grown as more of our private data is being gathered online. We share intimate details with just a few clicks. The majority of people, however, are ignorant of how extensively their data is shared. Behind the…
Massive Credit Card Breach Puts Millions at Risk
< p style=”text-align: justify;”> A significant credit card breach has been uncovered, threatening to disrupt holiday shopping for millions of Americans. The breach stems from an Amazon Web Services (AWS) S3 bucket left unsecured online, which contained sensitive customer data,…
Cybersecurity Essentials : Key to Success for All Businesses to Navigate Security
The journey of building a business is an exhilarating experience, whether it’s a startup taking its first steps, a small-to-medium business (SMB) scaling new heights, or an enterprise striving for sustained growth. However, regardless of the size or stage,…
Beware of Fake Delivery Text Scams During Holiday Shopping
< p style=”text-align: justify;”> As the holiday shopping season peaks, cybercriminals are taking advantage of the increased online activity through fake delivery text scams. Disguised as urgent notifications from couriers like USPS and FedEx, these scams aim to steal…
Thousands of SonicWall Devices Vulnerable to Critical Security Threats
< p style=”text-align: justify;”> Thousands of SonicWall network security devices are currently exposed to severe vulnerabilities, with over 20,000 running outdated firmware that no longer receives vendor support. This puts countless organizations at risk of unauthorized access and potential…