The Internet Archive is allegedly subject to continuing DDoS (distributed denial-of-service) attacks. The attacks began over the Memorial Day holiday weekend, according to the California-based charity, and some users reported being unable to access the digital archive site for several hours on Monday.…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Iranian Hacker Group Void Manticore Linked to Destructive Cyber Attacks on Israel and Albania
A recent report from Check Point Research (CPR) has unveiled the activities of an Iranian hacker group known as Void Manticore, which has been linked to a series of destructive cyber attacks on Israel and Albania. Affiliated with Iran’s…
Geoffrey Hinton Discusses Risks and Societal Impacts of AI Advancements
Geoffrey Hinton, often referred to as the “godfather of artificial intelligence,” has expressed grave concerns about the rapid advancements in AI technology, emphasising potential human-extinction level threats and significant job displacement. In an interview with BBC Newsnight, Hinton warned…
400% Increase in MoD Data Breaches Sparks Fears of Cyber Threats from Russia and China
Data breaches within the Ministry of Defence (MoD) have surged nearly fivefold over the past five years, raising concerns about the UK’s resilience against cyber threats from nations like Russia and China. MoD figures reveal 550 data incidents last…
Risks of Generative AI for Organisations and How to Manage Them
Employers should be aware of the potential data protection issues before experimenting with generative AI tools like ChatGPT. You can’t just feed human resources data into a generative AI tool because of the rise in privacy and data protection…
Combatting International Spoofed Calls: India’s New Measures to Protect Citizens
In recent times, fraudsters have increasingly used international spoofed calls displaying Indian mobile numbers to commit cybercrime and financial fraud. These calls, which appear to originate within India, are actually made by criminals abroad who manipulate the calling line…
From Courtroom to Cyber Threat: The JAVS Viewer 8 Incident
Hackers have broken into a popular brand of recording software used in courtrooms, jails, and prisons, allowing them to obtain complete control of the system via a backdoor implanted in an update to the application. Software and its purpose Justice…
ASML and TSM Face Uncertain Future in Event of Chinese Assault on Taiwan
If China invades Taiwan, chip machine maker ASML is rumoured to have the ability to disable its equipment remotely in TSMC’s fabrication facilities. In ASML’s EUV lithography systems, the most extensive client is TSMC, which uses extreme ultraviolet (EUV)…
Unmasking the Trojan: How Hackers Exploit Innocent Games for Malicious Intent
Hackers continue to find ingenious ways to infiltrate organizations and compromise sensitive data. Recently, a peculiar attack vector emerged—one that leverages an unsuspecting source: a Python clone of the classic Minesweeper game. In this blog post, we delve into the…
Windows 11: Home or Pro? A Comprehensive Comparison
With every major version of Windows, there are several editions to choose from. Windows 11 has many versions in addition to Home, Pro, Enterprise, and Windows 11 SE, which are specially designed for students. Although Windows 11 contains a…
Sharp Dragon Shifts Cyber Attacks to New Frontiers: Africa and the Caribbean
Check Point Research has been monitoring Sharp Dragon, a Chinese cyber threat group, since 2021. This group, previously known as Sharp Panda, has primarily targeted organisations in Southeast Asia with phishing campaigns. Recently, however, they have expanded their activities to…
Moroccan Cybercrime Group Storm-0539 Exploits Gift Card Systems with Advanced Phishing Attacks
A Morocco-based cybercrime group, Storm-0539, is making headlines for its sophisticated email and SMS phishing attacks aimed at stealing and reselling gift cards. Microsoft’s latest Cyber Signals report reveals that this group is responsible for significant financial theft, with…
What is GPS Jamming, a Rising Concern for Global Aviation?
Estonia has accused neighbouring Russia of jamming GPS navigation equipment in airspace over the Baltic republics, echoing airline worries that they have been dealing with such interference for months. Estonian Foreign Minister Margus Tsahkna’s accusation, for which he gave…
US Drug Distributor Cencora Reveals Major Cyberattack, Sensitive Medical Data Breached
A recent cyberattack on healthcare services has been disclosed by US drug distributor Cencora, revealing a significant breach compromising highly sensitive medical data. According to Reuters, the company notified affected individuals, stating that personal and highly sensitive medical information…
New Apple Wi-Fi Vulnerability Exposes Real-Time Location Data
Aside from Find My, maps, routes, and emergency SOS, Apple’s location services are quite handy, and they have many useful features. A research team at the University of Maryland has uncovered a critical vulnerability in Apple’s location services, which…
Massive Data Breach Exposes Sensitive Information of Indian Law Enforcement Officials
Recently, a significant data breach compromised the personal information of thousands of law enforcement officials and police officer applicants in India. Discovered by security researcher Jeremiah Fowler, the breach exposed sensitive details such as fingerprints, facial scans, signatures, and…
New ShrinkLocker Ransomware Exploits BitLocker to Encrypt Files
The new ransomware strain, ShrinkLocker, is creating significant concerns by using Windows BitLocker to encrypt corporate systems through the creation of new boot partitions. ShrinkLocker, named for its method of creating a boot volume by shrinking available non-boot partitions,…
Machine Identities Pose Major Threat to Indian Organizations: CyberArk
In an era where digital transformation is swiftly reshaping the business world, the most recent research from CyberArk, an identity security company, highlights a growing concern: identity-related breaches. The 2024 Identity Security Threat Landscape Report highlights a concerning trend…
One in Three Healthcare Providers at Risk, Report Finds
A recent report reveals that more than a third of healthcare organisations are unprepared for cyberattacks, despite an apparent rise in such incidents. Over the past three years, over 30% of these organisations have faced cyberattacks. The HHS Office…
Guarding Against SQL Injection: Securing Your Cisco Firepower Management Center
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not adequately…