Hackers are increasingly targeting individuals to steal cryptocurrency, access bank accounts, or engage in stalking. Although these attacks are relatively rare, it’s crucial to know how to protect yourself if you suspect someone has accessed your email or social…
Category: CySecurity News – Latest Information Security and Hacking Incidents
NATO Collaborates with Start-Ups to Address Growing Security Threats
Marking its 75th anniversary at a summit in Washington DC this week, the North Atlantic Treaty Organization (NATO) focused on Ukraine while emphasizing the importance of new technologies and start-ups to adapt to modern security threats. In its Washington…
Here’s How Nvidia’s Chips Can Disrupt Large-Scale Indian Weddings
The big large Indian wedding is all about making memories that will last a lifetime. Weddings of a significant size can budget anywhere between Rs 15 lakh and Rs 50 lakh specifically for photographs and videos that capture every…
Breaking Down the Clock PoC Exploits Utilized by Hackers Within 22 Minutes
It has been shown that threat actors are swift in weaponizing available proof-of-concept (PoC) exploits in real attacks, often within 22 minutes of publicly releasing these exploits. In that regard, Cloudflare has published its annual Application Security report for…
Hacker Subscription Service Exposes 600,000 Bank Card Details
A disturbing new hacker subscription service has emerged, offering access to 600,000 stolen bank card details for a fee of just £120. This service, identified by cybersecurity researchers from Flare, is named “Breaking Security” and allows its subscribers to…
3 Billion Attacks and Counting: The IDF’s Cyber Resilience
The Battlefield: Cloud Computing Cloud computing has become an integral part of modern military operations. The IDF relies heavily on cloud-based systems from troop management to logistics, communication, and intelligence gathering. These systems allow for flexibility, scalability, and efficient resource…
Are We Ready for the Next Wave of Cyber Threats?
In our increasingly digital world, cybersecurity is a growing concern for everyone— from businesses and governments to everyday individuals. As technology advances, it opens up exciting possibilities and creates new, sophisticated cyber threats. Recent high-profile attacks, like those on Ascension…
AT&T Paid Attackers $370K to Delete Stolen Customer Data
AT&T reportedly paid a hacker more than $370,000 to remove stolen customer data. In an extraordinary turn of events, the ransom may not have gone to those responsible for the breach. Last Friday, AT&T disclosed that an April data…
AT&T Data Breach: Essential Steps for Victims to Protect Themselves
Telecom giant AT&T recently disclosed a massive data breach affecting nearly all of its approximately 110 million customers. If you were a customer between May 2022 and January 2023, there is a high chance your data, including call and…
Subscription Services Accused of Using ‘Dark Patterns’ to Manipulate Customers
It is a widespread practice among subscription sites to manipulate customers’ behaviour around subscriptions and personal data to influence their decisions, according to a new report by two international consumer protection organizations. It is defined as the practice of…
New Hacking Method: Akami DNS Data Exfiltration
When it comes to cybercrime, getting into a system is only half the battle; the real challenge is extracting the stolen data without being detected. Companies often focus on preventing unauthorised access, but they must also ensure that data…
Unveiling the Mule Accounts Menace in Modern Money Laundering
In a recent statement, a member of the RBI’s board of governors has urged banks to step up efforts against mule accounts. According to Piyush Shukla, money mules in India do much more than move money. A MULE ACCOUNT…
Raman Research Institute’s Breakthrough in Quantum Cybersecurity
Scientists at the Raman Research Institute have achieved a significant breakthrough in cybersecurity by developing a novel method for generating truly unpredictable random numbers. This development is essential for strengthening encryption in quantum communications, addressing one of the most…
AI Minefield: Risks of Gen AI in Your Personal Sphere
Many customers are captivated by Gen AI, employing new technologies for a variety of personal and corporate purposes. However, many people ignore the serious privacy implications. Is Generative AI all sunshine and rainbows? Consumer AI products, such as OpenAI’s ChatGPT,…
Phishing Kit FishXProxy Equips Online Criminals for Success
Phishing campaigns have always been a threat, but a new toolkit called FishXProxy is making it alarmingly easy for even inexperienced cybercriminals to carry out sophisticated scams. SlashNext Email Security researchers have disclosed exclusive details about FishXProxy, a new…
Microsoft Faces Criticism Over Data Breach Notification Emails
Microsoft recently began notifying some customers via email about a potential data breach that might have compromised their personal information. However, the company’s approach has faced heavy criticism, with many saying the emails resembled spam or phishing attempts. Cybersecurity…
Data Breach Exposes Millions of mSpy Spyware Customers
A data breach at the phone surveillance operation mSpy has compromised the personal information of millions of customers who purchased access to the phone spyware app over the past decade, as well as the Ukrainian company behind it. In…
Debunking Common Myths About VPNs
Virtual Private Networks (VPNs) are important tools for online privacy, but they’re often misunderstood. Here, we clear up the top five myths to help you understand what VPNs can and can’t do for your digital security. Myth 1: All VPNs…
Apple Alerts Pegasus-like Attack on Indian Activists and Leaders
On July 10, two individuals in India received alarming notifications from Apple, Inc. on their iPhones, indicating they were targeted by a “mercenary” attack. This type of spyware allows attackers to infiltrate personal devices, granting access to messages, photos,…
Akira Ransomware: The Need for Rapid Response
Threat actors wielding the Akira ransomware demonstrated unprecedented efficiency in a recent cyber attack that sent shockwaves through the cybersecurity community. Their lightning-fast data exfiltration took just over two hours, representing a dramatic shift in the average time it takes…