WhatsApp has announced enhancements to its contact management features, allowing users to add and manage contacts from any device. Previously, contact management was limited to mobile devices, requiring users to input phone numbers or scan QR codes. The update…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Data Breach Exposes 93,000 Transak Users Due to Employee’s Device Misuse
Transak is an operation that enables users to buy cryptocurrencies using the Metamask, Binance, and Trust Wallet platforms. The company has just announced a data breach that exposed the names and identity documents of approximately 93,000 users. According to…
The Growing Role of AI in Ethical Hacking: Insights from Bugcrowd’s 2024 Report
Bugcrowd’s annual “Inside the Mind of a Hacker” report for 2024 reveals new trends shaping the ethical hacking landscape, with an emphasis on AI’s role in transforming hacking tactics. Compiled from feedback from over 1,300 ethical hackers, the report explores…
AI-Driven Deepfake Scams Cost Americans Billions in Losses
As artificial intelligence (AI) technology advances, cybercriminals are now capable of creating sophisticated “deepfake” scams, which result in significant financial losses for the companies that are targeted. On a video call with her chief financial officer, in which other…
Security Risks Discovered in Popular End-to-End Encrypted Cloud Storage Platforms
Recent cryptographic analysis by researchers at ETH Zurich has uncovered significant security vulnerabilities in five major end-to-end encrypted (E2EE) cloud storage platforms: Sync, pCloud, Icedrive, Seafile, and Tresorit. These platforms are collectively used by over 22 million people and…
Lounge Scam at Bengaluru Airport Costs Woman ₹ 87,000
Bhargavi Mani, 28, had her life turned upside down when she fell victim to a sophisticated scam that took place at Kempegowda International Airport in Bengaluru. While trying to gain access to the airport lounge before her flight, Bhargavi…
Infostealer-Injecting Plugins infect Thousands of WordPress Sites
Hackers are using WordPress sites to install malicious plugins that propagate malware that steals information by displaying fake updates and errors. Infostealing malware has become a global nuisance for security defenders in recent years, as compromised credentials are used…
How Ignoring These Wi-Fi Settings Can Leave You Vulnerable to Hackers
In today’s plugged-in world, most of us rely on the Internet for nearly everything from shopping and banking to communicating with family members. Whereas increasing reliance on the internet has exposed opportunities for doing just about anything remotely, it…
Critical Flaw in Open Policy Agent Exposed NTLM Credentials, Patch Released
A now-resolved security vulnerability in Styra’s Open Policy Agent (OPA) could have exposed New Technology LAN Manager (NTLM) hashes, potentially leading to credential leakage. If exploited, the flaw allowed attackers to capture the NTLM credentials of the OPA server’s…
WeChat’s Updated Encryption System Prone to Threats for its Users
More than a billion people send messages over WeChat and as per a new study recently, it discovered some security flaws in terms of the encryption system. While some applications use end-to-end encryption to prevent secret conversations from being…
The Impact of Google’s Manifest V3 on Chrome Extensions
Google’s Manifest V3 rules have generated a lot of discussion, primarily because users fear it will make ad blockers, such as Ublock Origin, obsolete. This concern stems from the fact that Ublock Origin is heavily used and has been…
Old Redbox Kiosks Hacked to Expose Customers’ Private Details
DVD Rental Service Redbox may be a thing of the past, but the data privacy issues it created for users may persist for some time. Redbox allows users to rent DVDs from its 24,000 autonomous kiosks throughout the United…
Western Digital Fined Over $310 Million for Patent Infringement
In a landmark case, data storage major Western Digital has been asked to pay the highest fine of $315.7 million for violating patents associated with data encryption technology. SPEX Technologies owns these patents, having acquired them from Spyrus that…
AI Data Breach Reveals Trust Issues with Personal Information
Insight AI technology is being explored by businesses as a tool for balancing the benefits it brings with the risks that are associated. Amidst this backdrop, NetSkope Threat Labs has recently released the latest edition of its Cloud and…
Nidec Corporation Ransomware Attack: Data Leak on Dark Web
In a recent disclosure, Nidec Corporation, a global leader in precision motors and automotive components, confirmed a significant data breach from a ransomware attack that occurred earlier this year. Hackers, after failing to extort the company, leaked stolen data…
Security Experts Downplay the Significance of the Chinese Quantum “Hack”
Security experts have recommended caution following a series of doom-laden reports in recent days claiming that Chinese researchers have cracked military-grade encryption via quantum computing technology. The reports, which first appeared in the South China Morning Post last week,…
HM Surf Bug in macOS Raises Data Privacy Concerns
Several vulnerabilities in the Safari web browser for macOS may have left users open to being spied on, having their data stolen, and acquiring other types of malware thanks to this security weakness. Specifically, the vulnerability arises from the…
Vietnamese Hackers Target Digital Marketers in Malware Attack
Cyble Research and Intelligence Lab recently unearthed an elaborate, multi-stage malware attack targeting not only job seekers but also digital marketing professionals. The hackers are a Vietnamese threat actor who was utilising different sophisticated attacks on systems by making…
North Korean Hackers Develop Linux Variant of FASTCash Malware Targeting Financial Systems
A new Linux variant of FASTCash malware has surfaced, targeting the payment switch systems of financial institutions. North Korean hackers, linked to the Hidden Cobra group, have expanded their cyber arsenal to now include Ubuntu 22.04 LTS distributions. Previously,…
Microsoft Builds Fictitious Azure Tenants to Lure Phishers to Honeypots
Microsoft employs deceptive tactics against phishing actors, creating realistic-looking honeypot tenants with Azure access and luring attackers in to gather intelligence on them. Tech giant can use the acquired data to map malicious infrastructure, gain a better understanding of…