Criminals are using a new “Digital House Arrest” method to target individuals. Scammers contact victims and compel them to stay home by pretending to be law enforcement officials such as police officers, Central Bureau of Investigation (CBI) agents, or customs…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Google Issues Emergency Update for New Chrome Vulnerability
Google has announced an urgent security update for its Chrome browser to fix a newly discovered vulnerability that is actively being exploited. This recent flaw, identified as CVE-2024-5274, is the eighth zero-day vulnerability that Google has patched in Chrome…
Truecaller Introduces AI Voice Feature for Personalized Call Responses
The Caller ID company Truecaller will now allow users to create an AI version of their voice to answer calls. Truecaller, known for identifying and blocking spam calls, is introducing a new feature for users with access to its…
Invest in Future-Proofing Your Cybersecurity AI Plan
With the ongoing barrage of new attacks and emerging dangers, one might argue that every day is an exciting day in the security operations centre (SOC). However, today’s SOC teams are experiencing one of the most compelling and transformative…
Adapting Cybersecurity Policies to Combat AI-Driven Threats
Over the last few years, the landscape of cyber threats has significantly evolved. The once-common traditional phishing emails, marked by obvious language errors, clear malicious intent, and unbelievable narratives, have seen a decline. Modern email security systems can easily…
Microsoft Uncovers Moroccan Cybercriminals Exploiting Gift Card Scams
An armed cybercriminal group working out of Morocco has been targeting major retailers for creating fake gift cards, infiltrating their systems to steal millions of dollars by using them as a source of revenue, according to a new report…
PSNI Faces £750,000 Fine for Major Data Breach
The Police Service of Northern Ireland (PSNI) is set to receive a £750,000 fine from the UK Information Commissioner’s Office (ICO) due to a severe data breach that compromised the personal information of over 9,000 officers and staff. This…
Gurugram: Deputy Manager Arrested For Providing Bank Details To Cyber Thieves
A team from the Gurugram Police cyber unit detained a Deputy Manager of a private bank for allegedly providing bank accounts for cyber fraud in order to attain his goals, police said. According to Priyanshu Diwan, Assistant Commissioner of…
Massive Cyber Attack on MoD Raises Job Concerns for Army Staff
There is a growing concern among soldiers in the armed forces that their information has been hacked, which may have led to a cyber attack on the Ministry of Defence. According to a law firm, these soldiers fear losing…
Microsoft’s Windows 11 Recall Feature Sparks Major Privacy Concerns
Microsoft’s introduction of the AI-driven Windows 11 Recall feature has raised significant privacy concerns, with many fearing it could create new vulnerabilities for data theft. Unveiled during a Monday AI event, the Recall feature is intended to help users…
Hidden Cyber Threat Exposed After Six Years
A newly identified cyber threat group, known as “Unfading Sea Haze,” has been secretly infiltrating military and government networks in the South China Sea region since 2018, according to a recent report by Bitdefender researchers. The group’s activities align…
Case Study: Implementing an Anti-Phishing Product and Take-Down Strategy
Introduction: Phishing attacks have become one of the most prevalent cybersecurity threats, targeting individuals and organizations to steal sensitive information such as login credentials, financial data, and personal information. To combat this growing threat, a comprehensive approach involving the deployment…
APT41 Strikes Again: Attacks Italian Industry Via Keyplug Malware
APT41: A well-known Chinese cyberespionage group with a history of targeting various sectors globally. They are known for their sophisticated techniques and possible state backing. KeyPlug: A modular backdoor malware allegedly used by APT41. It is written in C++ and…
Shadow IT Surge Poses Growing Threat to Corporate Data Security
It was recently found that 93% of cybersecurity leaders have deployed generative artificial intelligence in their organizations, yet 34% of those implementing the technology have not taken steps to minimize security risks, according to a recent survey conducted by…
Have You Been Defrauded? This Scam Survival Toolkit Can Help You Recover
Wondering what to do in the aftermath of a fraud can be extremely difficult. The Better Business Bureau’s (BBB) new fraud Survival Toolkit helps fraud survivors navigate the recovery process. Fraudsters target people from many walks of life. BBB…
YouTube Emerging as a Hotspot for Cyber Threats: Avast Report
YouTube has become a new battleground for cybercriminals to launch phishing attacks, spread malware, and promote fraudulent investment schemes, according to a recent report by Avast, a leading security vendor. Avast’s researchers highlighted the use of tools like Lumma…
EPA Report Reveals Cybersecurity Risks in U.S. Water Systems
A recent report from the Environmental Protection Agency (EPA) revealed that over 70% of surveyed water systems have failed to meet key cybersecurity standards, making them vulnerable to cyberattacks that could disrupt wastewater and water sanitation services across the…
LockBit Ransomware Gang Claims Responsibility for London Drugs Cyberattack
In a recent turn of events, the LockBit ransomware gang has claimed responsibility for the cyberattack on Canadian pharmacy chain London Drugs, which occurred in April. The cybercriminals are now threatening to release sensitive data online after reportedly unsuccessful negotiations…
Cryptojacking Alert: GhostEngine Disables Endpoint Protections
Recently found malware uses advanced techniques to defeat antivirus safeguards, delete signs of infection, and permanently infect devices with cryptocurrency-mining software, experts said. “The first goal of the GhostEngine malware is to disable endpoint security solutions and specific Windows event…
Sharenting: What parents should consider before posting their children’s photos online
21st century parenting is firmly grounded in technology. From iPads keeping kids entertained on flights, to apps that allow parents to track their children’s feeds, development, and more, technology has changed what it means to be a parent. But…