When businessman Mohammed Yousaf received an urgent plea for assistance from one of his oldest friends, he rushed to the rescue. The 56-year-old received a WhatsApp message from the account of a man he had been friends with for…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Are The New AI PCs Worth The Hype?
In recent years, the realm of computing has witnessed a remarkable transformation with the rise of AI-powered PCs. These cutting-edge machines are not just your ordinary computers; they are equipped with advanced artificial intelligence capabilities that are revolutionizing the…
Microsoft Revamps Security Leadership, Empowering Deputy CISOs
There have been a series of major security breaches recently, and Microsoft is making changes to its security practices, organizational structure, and executive compensation to address the issue, as government leaders and big customers increasingly pressure the company to…
Here’s Why You Shouldn’t Trust VPNs Blindly
In an era where we should be gravely concerned about online privacy and security, Virtual Private Networks (VPNs) have come through as indispensable tools for safeguarding digital identities. However, amidst the buzz of VPN advertisements promising invincibility against cyber…
Android Flaw Exposes DNS Queries Despite VPN Kill Switch
Several months ago, a Mullvad VPN user discovered that Android users have a serious privacy concern when using Mullvad VPN. Even with the Always-On VPN feature activated, which ensures that the VPN connection is always active, and with the…
Microsoft Introduces Passkey Authentication for Personal Microsoft Accounts
Microsoft has introduced a new feature allowing Windows users to log into their Microsoft consumer accounts using a passkey, eliminating the need for traditional passwords. This passkey authentication method supports various password-less options such as Windows Hello, FIDO2 security…
Experts Warn Criminals Could Exploit Jogging Apps for Targeting People
Experts caution that users of running apps should heighten their privacy settings to thwart potential stalkers and other malicious actors from accessing sensitive information regarding their activities. While platforms like Strava enable joggers and hikers to share route details…
Backdoor Malware: Iranian Hackers Disguised as Journalists
Crafting convincing personas APT42, an Iranian state-backed threat actor, uses social engineering attacks, including posing as journalists, to access corporate networks and cloud environments in Western and Middle Eastern targets. Mandiant initially discovered APT42 in September 2022, reporting that the…
Are Big Tech Companies Getting Rich from AI?
Big Tech companies like Amazon, Microsoft, and Alphabet have showcased impressive earnings, with a substantial boost from their advancements in artificial intelligence (AI) technology. Amazon’s quarterly report revealed a 13% increase in net sales, primarily attributed to its AWS…
Data of Domestic Violence Victims Leaked in ZircoDATA Hack
Monash Health, a Victorian public health agency, has announced that it had been impacted by the recent ZircoDATA hack. Earlier this year in February, ZircoDATA, which provides safe document storage, data management, and digital conversion of 9,000 clients across…
New Cuttlefish Malware Hijacks Router Connections, Cloud Data Stolen
In the ever-evolving landscape of cybersecurity threats, a new menace has emerged: Cuttlefish. This sophisticated malware targets enterprise-grade and small office/home office (SOHO) routers, posing a significant risk to both businesses and individual users alike. Discovered by Lumen Technologies’…
Report: Spanish Authorities Discover CPF Nomination Note on iPad of Slain Singaporean Woman in Spain
Singaporean authorities, along with two banks and Hong Kong police, thwarted a scam targeting a 70-year-old victim, recovering over S$370,000. The Singapore Police Force (SPF) disclosed that DBS detected suspicious transactions amounting to about S$180,000, promptly blocking further transfers…
Hackers are Targeting Routers Across the Globe
When hackers identify an unsecured router, they penetrate it by installing malware that provides them persistence, the ability to launch distributed denial of service (DDoS) assaults, hide malicious data, and more. But what happens when the hackers discover a…
CISA Ask Companies to Fix Path Traversal Vulnerabilities
CISA and FBI urge companies to take patch actions CISA and the FBI recommended software companies today to assess their products and fix route traversal security flaws before selling. Attackers can leverage path traversal vulnerabilities (also known as directory traversal)…
NSW Cybercrime Squad Arrests Suspect in Million-Person Data Breach Case
In a significant development, the Cybercrime Squad in New South Wales (NSW) has made a crucial breakthrough in a case involving a mass data breach affecting approximately one million individuals. The arrest of a 46-year-old man from Fairfield West…
Insect Farmers Embrace AI to Drive Down Production Costs
The insect farming industry, previously thought of as an industry that was in desperate need of development, has rapidly gained popularity as a practical and sustainable solution to the severe worldwide challenges of food safety, environmental degradation, and aid…
Facial Recognition System Breach Sparks Privacy Concerns in Australia
A significant privacy breach has shaken up the club scene in Australia, as a facial recognition system deployed across multiple nightlife venues became the target of a cyberattack. Outabox, the Australian firm responsible for the technology, is facing intense scrutiny…
DropBox E-Signature Breach Exposes Customer Data
DropBox has announced a breach in its DropBox Sign eSignature platform, formerly known as HelloSign. The breach, uncovered on April 24, has left customer data vulnerable, including authentication tokens, MFA keys, hashed passwords, and personal information. The breach was…
French Hospital CHC-SV Refuses to Pay LockBit Ransomware Demand
The Hôpital de Cannes – Simone Veil (CHC-SV) in France revealed that it has received a ransom demand from the Lockbit 3.0 ransomware gang and refused to pay the ransom. On April 17, the 840-bed hospital announced a serious…
Strengthening Password Security: Addressing Misconceptions and Best Practices
According to recent research by the Institution of Engineering and Technology (IET), conducted to mark World Password Day, only one in five people in the UK can correctly identify a secure password over a risky one. This alarming statistic…