With global tensions on the rise, ensuring your home security system is up to par is a wise decision. Advances in science and technology have provided a variety of effective options, with even more innovations on the horizon. Smart…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Apple’s AI Features Demand More Power: Not All iPhones Make the Cut
A large portion of Apple’s developer conference on Monday was devoted to infusing artificial intelligence (AI) technology into its software. Some of the features Apple has rumoured to incorporate are not expected to work on all iPhones. If you…
New Extortion Scheme Targets GitHub Repositories
A new wave of cyberattacks is targeting GitHub repositories, wiping their contents, and demanding ransom from victims. This alarming campaign, first identified on Wednesday by Germán Fernández, a security researcher at Chilean cybersecurity firm CronUp, is being orchestrated by…
Ransomware Rampage in Canada: Can New Security Laws Stop It?
In Canada, the ransomware business is booming, with some of the largest corporations having fallen victim to them, including London Drugs, the City of Hamilton, Ont., and the government of Newfoundland and Labrador. Even though criminals often boast about…
Microsoft Revises AI Feature After Privacy Concerns
Microsoft is making changes to a controversial feature announced for its new range of AI-powered PCs after it was flagged as a potential “privacy nightmare.” The “Recall” feature for Copilot+ was initially introduced as a way to enhance user…
Club Penguin Fans Target Disney Server, Exposing 2.5 GB of Internal Data
Club Penguin fans reportedly hacked a Disney Confluence server to collect information about their favourite game but ended up with 2.5 GB of internal corporate data instead. From 2005 until 2018, Club Penguin was a multiplayer online game (MMO)…
DuckDuckGo Launches Anonymous Chatbot Service to Protect User Privacy
Concerned about modern chatbots learning from your personal data? DuckDuckGo has introduced a free and “anonymous” solution for users to interact with popular chatbots without compromising their privacy. The new service, DuckDuckGo AI Chat, ensures that all interactions between…
New Ransomware Variant “Fog” Targets U.S. Education and Recreation Sectors
Arctic Wolf Labs has identified a new, sophisticated ransomware variant named “Fog,” which has been aggressively targeting organizations in the United States, particularly within the education and recreation sectors. This variant came to light following several incident response cases in…
Attackers Exploit 2018 ThinkPHP Vulnerabilities to Install ‘Dama’ Web Shells
Chinese threat actors are exploiting CVE-2018-20062 and CVE-2019-9082 vulnerabilities in ThinkPHP applications to install Dama, a persistent web shell. The web shell allows for further exploitation of the compromised endpoints, such as enlisting them as part of the perpetrators’…
Software Supply Chain Attacks: A Major Strategy for Cybercriminals
A new research indicates that software supply chain attacks are becoming an increasingly effective method for cybercriminals to compromise large organizations and disrupt their IT infrastructure. A report by BlackBerry revealed that a significant majority (74%) of companies have…
New macOS Malware Threat: What Apple Users Need to Know
Recently, the Moonlock Lab cybersecurity team discovered a macOS malware strain that can easily evade detection, posing a significant threat to users’ data privacy and security. The infection chain for this malware begins when a Mac user visits a…
eSIM Connections: Redefining Mobile Service and Flexibility
This eSIM management technology will have a significant impact on the IoT, as it represents an evolution from physical SIM cards to virtual SIM cards, which will have the greatest impact on its acceptance. Mobile network operators (MNOs), who…
5 Signs Your Wi-Fi Has Been Hacked: Protect Your Bank Details
The tech company Aura sent its experts to investigate the telltale indicators that cybercriminals have overcome your wi-fi. A hacker can access all of your sensitive information through your wifi in a number of methods, and it’s far easier to…
FBI Reveals 7,000 Decryption Keys to Combat LockBit Ransomware
In a major development against cybercrime, the US Federal Bureau of Investigation (FBI) has disclosed the recovery of over 7,000 decryption keys to assist victims of the notorious LockBit ransomware gang. This revelation follows a disruptive international law enforcement…
Ticketmaster and Santander Breaches Expose Cloud Security Flaws
Recent data breaches at Ticketmaster and Santander Bank have exposed major security vulnerabilities in the use of third-party cloud storage services. These breaches highlight the urgent need for robust security measures as more organisations move their data to the cloud.…
Employees Claim OpenAI and Google DeepMind Are Hiding Dangers From the Public
A number of current and former OpenAI and Google DeepMind employees have claimed that AI businesses “possess substantial non-public data regarding the capabilities and limitations of their systems” that they cannot be expected to share voluntarily. The claim was…
The Hidden Cost of Connected Cars: Your Driving Data and Insurance
Driving to a weekend getaway or a doctor’s appointment leaves more than just a memory; it leaves a data trail. Modern cars equipped with internet capabilities, GPS tracking, or services like OnStar, capture your driving history. This data is…
Security researcher says Azure Tags are security threat but Microsoft disagrees
Tenable recently identified a notable security issue within Microsoft’s Azure Network service tags. While Tenable classified this as a high-severity vulnerability, Microsoft disagreed with this classification. Despite their differences, both companies jointly disclosed the security issue on Monday. What…
Nvidia Climbs to Second Place in Global Market Value, Surpassing Apple
This month, Nvidia has achieved a historic achievement by overtaking Apple to become the world’s second most valuable company, a feat that has only been possible because of the overwhelming demand for its advanced chips that are used to…
Experts Warn: AI Chatbots a ‘Treasure Trove’ for Criminals, Avoid ‘Free Accounts
Cybersecurity experts have informed The U.S. Sun that chatbots represent a “treasure trove” ripe for exploitation by criminals. The intelligence of artificial intelligence chatbots is advancing rapidly, becoming more accessible and efficient. Because these AI systems mimic human conversation…