Category: CySecurity News – Latest Information Security and Hacking Incidents

Bitcoin and Nostr: What Lies Beyond Decentralization and Freedom

In today’s digital expanse, in some countries governments and corporations wield immense power, two remarkable projects—Bitcoin and Nostr—have emerged as champions of decentralization. Their stories are quite similiar, revealing their struggle for financial autonomy, censorship resistance, and individual empowerment. Bitcoin:…

Why AI-Driven Cybercrime Could Be Your Business’s Biggest Risk

  The way technology keeps shifting its paradigm, the line between genuine interactions and digital deception is becoming increasingly difficult to distinguish. Today’s cybercriminals are leveraging the power of generative artificial intelligence (AI) to create more closely intricate and harder-to-detect…

Here’s How to Safeguard Yourself Against Phone Scams

  Sophisticated phone scams are becoming more common and more relentless. The numbers are mind-boggling. According to the FTC, impostor fraudsters cost US consumers $2.7 billion in 2023, and the figure is rising year after year.  These are merely the…

Beyond Prioritization: Security Journey for Organizations

Organizations face an overwhelming number of vulnerabilities, and deciding which ones to address first can be a challenge for many. However, it’s essential to recognize that prioritization is merely the beginning of a more comprehensive security journey. The Limitations of…

Slack Fixes AI Security Flaw After Expert Warning

  Slack, the popular communication platform used by businesses worldwide, has recently taken action to address a potential security flaw related to its AI features. The company has rolled out an update to fix the issue and reassured users that…

Protecting Your Wallet: Understanding NGate Android Malware

A new and sophisticated malware has emerged, targeting the increasingly popular Near Field Communication (NFC) payment systems. Known as NGate, this Android malware has been discovered by ESET Research and poses a significant risk to users’ financial security. This blog…

Hackers Spread Disinformation to undermine Taiwan’s Military

  Foreign hackers are increasingly targeting Taiwan by hijacking social media accounts to spread disinformation aimed at undermining the country’s military, according to a statement released by the Ministry of Justice Investigation Bureau (MJIB) yesterday. The hackers, believed to be…

How AI and Machine Learning Are Revolutionizing Cybersecurity

  The landscape of cybersecurity has drastically evolved over the past decade, driven by increasingly sophisticated and costly cyberattacks. As more businesses shift online, they face growing threats, creating a higher demand for innovative cybersecurity solutions. The rise of AI…

Navigating Without GPS: Quantum Breakthroughs and Their Impact

From everyday smartphone users to military operations, GPS plays a crucial role in determining precise locations. However, the dependency on GPS comes with its own set of vulnerabilities, including signal disruptions and potential spoofing. Enter the groundbreaking research from Sandia…

Flight Aware User Data Leaked Following Misconfiguration

  FlightAware, a flight tracking company, urges some customers to change their account login passwords after a data breach may have compromised private data. This Houston-based technology company provides aircraft tracking data in both real time and historical format. Furthermore,…

Chemical Giant Orion Loses $60 Million in Email Scam

  Luxembourg-based Orion S.A., a leading supplier of carbon black, has been defrauded of a staggering $60 million. The company alerted the US Securities and Exchange Commission (SEC) on August 10th through an official filing (Form 8-K). The filing reveals…

AI-Enhanced Crypto Scams: A New Challenge for ASIC

The Australian Securities and Investments Commission (ASIC) has been at the forefront of combating crypto scams, working tirelessly to protect consumers from fraudulent schemes. Despite a reported decline in the number of scams since April, ASIC continues to emphasize the…

Lessons for Banks from the Recent CrowdStrike Outage

  The recent disruption caused by CrowdStrike has been a wake-up call for financial institutions, highlighting that no cybersecurity system is entirely foolproof. However, this realisation doesn’t lessen the need for rigorous preparation against potential cyber threats. What Happened with…

New Report Reveals Rising Attacks on macOS Systems

  A new report published by Intel471 reveals that macOS is increasingly being targeted by threats developing malware specific to the operating system or using cross-platform languages to achieve their goals on macOS computers through malware being developed for Mac…

Massive Data Leak Exposes Sensitive Information for Millions

  A significant data breach has compromised the personal information of millions of individuals across the United States, United Kingdom, and Canada. The leaked data, obtained from a company called National Public Data, includes highly sensitive information such as names,…

X Confronts EU Legal Action Over Alleged AI Privacy Missteps

  X, the artificial intelligence technology company of Elon Musk, has reportedly been accused of unlawfully feeding personal information about its users to its artificial intelligence technology without their consent according to a privacy campaign group based in Vienna. This…

FBI and Allies Dismantle Dispossessor Ransomware Network

  The FBI announced on Monday that it has taken down the servers and websites used by the Radar/Dispossessor ransomware group. This action was part of a global investigation involving the U.K.’s National Crime Agency, the Bamberg Public Prosecutor’s Office,…

Microsoft Patches Critical SmartScreen Vulnerability Exploited by Attackers

  Microsoft’s SmartScreen feature, a cornerstone of Windows security, faced a significant setback when a critical vulnerability, CVE-2024-38213, was exploited by cybercriminals. This vulnerability allowed attackers to circumvent SmartScreen’s protective mechanisms and deliver malicious code to unsuspecting users. The vulnerability…

Xapo Bank Aims To Boost Bitcoin Safety With Tech And Bunkers

  Satoshi Nakamoto, the pseudonymous developer of Bitcoin, published the system’s whitepaper in 2008, bluntly criticising financial institutions and the confidence they demand. However, in 2010, one of the most notable Bitcoin collaborators in its early days and the recipient…

Cloud Security Report Highlights Misconfiguration and IAM as Top Threats

Traditional cloud security issues once associated with service providers are declining in significance, as per the Cloud Security Alliance’s 2024 Top Threats report,  However, new challenges persist. Misconfigurations, weak identity and access management (IAM), and insecure application programming interfaces (APIs)…

The UK Erupts in Riots as Big Tech Stays Silent

  For the past week, England and parts of Northern Ireland have been gripped by unrest, with communities experiencing heightened tensions and an extensive police presence. Social media platforms have played an unjust role in spreading information, some of it…

AI and the Legal Framework: A Critical Turning Point

  It is no secret that the rapid advancement of generative artificial intelligence (AI) is transforming several industries – including the legal sector. Using AI, lawyers and legal departments can be able to handle all sorts of tasks from standard…