A significant uptick in distributed denial of service (DDoS) attacks has plagued Sweden as the nation navigates its path towards joining NATO, reports network performance management provider Netscout. The onslaught commenced notably in May 2023, following a colossal 500…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Google’s Med-Gemini: Advancing AI in Healthcare
On Tuesday, Google unveiled a new line of artificial intelligence (AI) models geared toward the medical industry. Although the tech giant has issued a pre-print version of its research paper that illustrates the capabilities and methodology of these AI models,…
AI vs Human Intelligence: Who Is Leading The Pack?
Artificial intelligence (AI) has surged into nearly every facet of our lives, from diagnosing diseases to deciphering ancient texts. Yet, for all its prowess, AI still falls short when compared to the complexity of the human mind. Scientists are…
AI Takes the Controller: Revolutionizing Computer Games
The computer games industry has been a part of Andrew Maximov’s life for 12 years and despite all of this experience, he still marvels at how much money it costs to build some of the biggest games of all…
Privacy Breach Rocks Australian Nightlife as Facial Recognition System Compromised
A significant privacy breach has shaken up the club scene in Australia, as a facial recognition system deployed across multiple nightlife venues became the target of a cyberattack. Outabox, the Australian firm responsible for the technology, is facing intense…
Hackers Claim Biggest Attack On UAE in History
The United Arab Emirates government was the target of a significant data breach attack that has the cybersecurity industry on edge. The attacker, who goes by the username “UAE,” has not been recognized. Unless a ransom of 150 bitcoins (about…
Cyber Criminal Sentenced for Targeting Therapy Patients
In a recent legal case that has shaken Finland, cyber offender Julius Kivimäki, known online as Zeekill, has been sentenced to six years and three months behind bars for his involvement in a sophisticated cybercrime operation. The case revolves around…
Industrial Cyberattackers Reverting to USB Tactics, Says Honeywell Report
In a surprising turn of events, the use of removable media, particularly USB devices, has resurged as a favoured tactic among industrial cyber attackers. Honeywell’s recently released “2024 USB Threat Report” sheds light on this concerning trend, emphasizing its…
Apple Working to Patch Alarming iPhone Issue
Apple claims to be working rapidly to resolve an issue that resulted in some iPhone alarms not setting off, allowing its sleeping users to have an unexpected lie-in. Many people rely on their phones as alarm clocks, and some…
No MFA, No Defense: Change Healthcare Falls Victim to Citrix Account Hijacking
A UnitedHealth spokesperson confirmed that the black cat ransomware gang had breached Change Healthcare’s network, using stolen credentials to get into the company’s Citrix remote access service, which was not set up to support multi-factor authentication. It was revealed…
Safeguarding Your Employee Data From Identity Theft
In today’s digital age, where data breaches and cyberattacks are increasingly common, safeguarding against identity-based attacks has become paramount for organizations worldwide. Identity-based attacks, which involve the unauthorized access to sensitive information through compromised user credentials, pose significant risks…
Microsoft Alerts Users as Russian Hackers Target Windows Systems
As advancements in AI technology continue to unfold, the specter of cybercrime looms larger each day. Among the chorus of cautionary voices, Microsoft, the eminent IT behemoth, adds its warning to the fray. Microsoft’s Threat Intelligence researchers have issued…
North Korean Scammers Lure Developers with Fake Job Offers
A new cyber scam, dubbed “Dev Popper,” is preying on software developers through fake job interviews. This elaborate ruse, masquerading as genuine employment opportunities, aims to infiltrate the victim’s computer with a harmful Python backdoor, posing serious cyber threats. How…
Okta Alert: The Rise of Credential Stuffing Attacks Through Proxy Networks
According to Okta’s user warning, the availability of residential proxy services, stolen credentials, and scripting tools has led to an increase in credential-stuffing assaults that target online services. The Okta research team noticed a rise in credential-stuffing attempts against Okta…
Safeguarding Reproductive Health Workers: Addressing Risks Posed by Data Brokers and Doxxing
In today’s interconnected digital landscape, the acquisition and dissemination of personal data have reached unprecedented levels, posing significant risks to individuals across various sectors, including reproductive health workers. At the forefront of this modern dilemma are entities known as…
GM Car Buyers’ Nightmare: The Unveiling of a Program Raising Insurance Rates
It is believed that auto manufacturers are selling millions of pieces of data to the insurance industry about the driving behaviours of their customers. It is my responsibility to report the story about GM sharing driving data from connected…
Is ChatGPT Secure? Risks, Data Safety, and Chatbot Privacy Explained
You’ve employed ChatGPT to make your life easier when drafting an essay or doing research. Indeed, the chatbot’s ability to accept massive volumes of data, break down it in seconds, and answer in natural language is incredibly valuable. But…
User Privacy Threats Around T-Mobile’s ‘Profiling and Automated Decisions’
In today’s digital age, it is no secret that our phones are constantly tracking our whereabouts. GPS satellites and cell towers work together to pinpoint our locations, while apps on our devices frequently ping the cell network for updates on…
Quantum Technology: Implications for Digital Security
In our modern, highly connected world, where online transactions are everywhere, the looming presence of quantum computing casts a momentous shadow. Unlike classical computers, which rely on bits to process information, quantum computers leverage the peculiar properties of quantum…
Fraudulent npm Packages Deceive Software Developers into Malware Installation
A new cyber threat dubbed DEV#POPPER is currently underway, targeting software developers with deceitful npm packages disguised as job interview opportunities, aiming to dupe them into downloading a Python backdoor. Securonix, a cybersecurity firm, has been monitoring this activity…