In the ever-changing environment of education, a seismic shift is taking place, with technology emerging as a change agent and disrupting conventional approaches to learning. Technology bridges the gap between theoretical knowledge and practical application, especially in the transformative…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Apple’s Private Cloud Compute: Enhancing AI with Unparalleled Privacy and Security
At Apple’s WWDC 2024, much attention was given to its “Apple Intelligence” features, but the company also emphasized its commitment to user privacy. To support Apple Intelligence, Apple introduced Private Cloud Compute (PCC), a cloud-based AI processing system designed…
Sandton Police Raid Uncovers Massive Counterfeit SIM Card Operation
In response to a tip-off about suspicious activities occurring at a Sandton home, the South African Police Service (SAPS) took action. Upon receiving this information, members of the Gauteng Organised Crime Investigation Unit operationalised the intelligence as soon as…
Truist Bank Confirms Data Breach After Information Surfaces on Hacking Forum
Truist Bank, one of the largest commercial banks in the United States, has confirmed a cybersecurity breach after stolen data appeared for sale on a hacking forum. The breach, which occurred in October 2023, was brought to light when…
Ransomware Attackers Are Weaponizing PHP Flaw to Infect Web Servers
Security researchers revealed that ransomware attackers have swiftly turned a simple-to-exploit PHP programming language vulnerability—which allows malicious code to be executed on web servers—into a weapon. As of Thursday last week, Censys’ Internet scans had found 1,000 servers infected…
The Indispensable Role of the CISO in Navigating Cybersecurity Regulations
With evolving cyber threats and stringent regulatory requirements, CISOs are tasked with ensuring the confidentiality, integrity, and availability of an organization’s digital systems and data. This article examines the regulatory landscape surrounding cybersecurity and explores effective strategies for CISOs…
Major Data Breach at CUHK Affects Over 20,000 Students and Staff
Over 20,000 individuals from the Chinese University of Hong Kong (CUHK) were impacted by a data breach at one of the institution’s schools in the city that resulted in their personal information being stolen. This is just the latest…
Phishing Attack Abuses Windows Search Protocol to Deploy Malware
A recently developed phishing campaign has emerged, leveraging the Windows Search protocol to deliver malicious scripts to unsuspecting users. This sophisticated attack uses HTML attachments to exploit the search-ms URI, pushing harmful batch files hosted on remote servers. The…
Identity Verification Becomes Crucial in the Digital Age
In the rapidly changing digital landscape, identity verification is emerging as a critical concern. As Web3 places increasing emphasis on data ownership and trust, authenticating one’s identity is becoming a major challenge. Recently, Roundtable anchor Rob Nelson and Ralf…
Protecting Your Business from Snowflake Platform Exploitation by UNC5537
A recent report from Mandiant, a subsidiary of Google Cloud, has uncovered a significant cyber threat involving the exploitation of the Snowflake platform. A financially motivated threat actor, identified as UNC5537, targeted around 165 organizations’ Snowflake customer instances, aiming…
Confidential NHS Patient Data Discovered in Jesmond Alleyway
The confidential medical information that is believed to have been held by a medical student in Jesmond was discovered among household waste last week in Jesmond. A letter sent by a patient’s doctor following an appointment, filled with sensitive…
Ascension Breached Due to Employee Downloading Malicious File
Ascension, one of the largest healthcare systems in the United States, disclosed that a ransomware attack in May 2024 was initiated when an employee mistakenly downloaded a malicious file onto a company device. The healthcare provider indicated that the…
Researchers Find ChatGPT’s Latest Bot Behaves Like Humans
A team led by Matthew Jackson, the William D. Eberle Professor of Economics in the Stanford School of Humanities and Sciences, used psychology and behavioural economics tools to characterise the personality and behaviour of ChatGPT’s popular AI-driven bots in…
The High Cost of Ransomware: Change Healthcare’s $22 Million Payout and Its Aftermath
A Costly Decision: The $22 Million Ransom When Change Healthcare paid $22 million in March to a ransomware gang that had devastated the company as well as hundreds of hospitals, medical practices, and pharmacies throughout the US, the cybersecurity industry…
New Malware Campaign Exploits Windows Search to Spread
A new and intricate alware campaign has been discovered by Trustwave SpiderLabs, leveraging the Windows search feature embedded in HTML code to spread malicious software. The attack begins with a phishing email containing an HTML attachment disguised as a…
Data in Danger: Analyzing the Alleged Data Broker Breach
The protection of personal data is of utmost importance. A recent report has brought to public attention an alleged significant data breach involving a U.S. data broker. This incident, which purportedly affects billions of records and over 300 million people,…
Ascension Ransomware Attack: Worker Error Leads to Data Breach and Recovery Efforts
Ascension, one of the largest health systems in the country, recently revealed that a ransomware attack on its systems was due to a worker accidentally downloading a malicious file. The health system emphasized that this was likely an honest…
STR RAT: A Persistent Remote Access Trojan
The STR RAT is a remote access trojan (RAT) written in Java, first detected in 2020. Like other RATs, it allows threat actors full control of an infected machine. STR RAT is capable of keylogging, credential theft, and deploying…
Android 15’s Lockdown Mode Safeguards Your Phone Against “Juice Jacking”
You shouldn’t use any random cable that is provided to you to charge your favourite Android phone—or any other device, for that matter—at a public charging station for a few very good reasons. More importantly, there are always a…
European Telecom Industry at the Forefront of Quantum Technology Adoption
Even though quantum technologies may sound like something that is decades into the future, a new report released today shows that quantum technology has already come into being – especially in the telecommunications industry – even though most people…