The Battlefield: Cloud Computing Cloud computing has become an integral part of modern military operations. The IDF relies heavily on cloud-based systems from troop management to logistics, communication, and intelligence gathering. These systems allow for flexibility, scalability, and efficient resource…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Are We Ready for the Next Wave of Cyber Threats?
In our increasingly digital world, cybersecurity is a growing concern for everyone— from businesses and governments to everyday individuals. As technology advances, it opens up exciting possibilities and creates new, sophisticated cyber threats. Recent high-profile attacks, like those on Ascension…
AT&T Paid Attackers $370K to Delete Stolen Customer Data
AT&T reportedly paid a hacker more than $370,000 to remove stolen customer data. In an extraordinary turn of events, the ransom may not have gone to those responsible for the breach. Last Friday, AT&T disclosed that an April data…
AT&T Data Breach: Essential Steps for Victims to Protect Themselves
Telecom giant AT&T recently disclosed a massive data breach affecting nearly all of its approximately 110 million customers. If you were a customer between May 2022 and January 2023, there is a high chance your data, including call and…
Subscription Services Accused of Using ‘Dark Patterns’ to Manipulate Customers
It is a widespread practice among subscription sites to manipulate customers’ behaviour around subscriptions and personal data to influence their decisions, according to a new report by two international consumer protection organizations. It is defined as the practice of…
New Hacking Method: Akami DNS Data Exfiltration
When it comes to cybercrime, getting into a system is only half the battle; the real challenge is extracting the stolen data without being detected. Companies often focus on preventing unauthorised access, but they must also ensure that data…
Unveiling the Mule Accounts Menace in Modern Money Laundering
In a recent statement, a member of the RBI’s board of governors has urged banks to step up efforts against mule accounts. According to Piyush Shukla, money mules in India do much more than move money. A MULE ACCOUNT…
Raman Research Institute’s Breakthrough in Quantum Cybersecurity
Scientists at the Raman Research Institute have achieved a significant breakthrough in cybersecurity by developing a novel method for generating truly unpredictable random numbers. This development is essential for strengthening encryption in quantum communications, addressing one of the most…
AI Minefield: Risks of Gen AI in Your Personal Sphere
Many customers are captivated by Gen AI, employing new technologies for a variety of personal and corporate purposes. However, many people ignore the serious privacy implications. Is Generative AI all sunshine and rainbows? Consumer AI products, such as OpenAI’s ChatGPT,…
Phishing Kit FishXProxy Equips Online Criminals for Success
Phishing campaigns have always been a threat, but a new toolkit called FishXProxy is making it alarmingly easy for even inexperienced cybercriminals to carry out sophisticated scams. SlashNext Email Security researchers have disclosed exclusive details about FishXProxy, a new…
Microsoft Faces Criticism Over Data Breach Notification Emails
Microsoft recently began notifying some customers via email about a potential data breach that might have compromised their personal information. However, the company’s approach has faced heavy criticism, with many saying the emails resembled spam or phishing attempts. Cybersecurity…
Data Breach Exposes Millions of mSpy Spyware Customers
A data breach at the phone surveillance operation mSpy has compromised the personal information of millions of customers who purchased access to the phone spyware app over the past decade, as well as the Ukrainian company behind it. In…
Debunking Common Myths About VPNs
Virtual Private Networks (VPNs) are important tools for online privacy, but they’re often misunderstood. Here, we clear up the top five myths to help you understand what VPNs can and can’t do for your digital security. Myth 1: All VPNs…
Apple Alerts Pegasus-like Attack on Indian Activists and Leaders
On July 10, two individuals in India received alarming notifications from Apple, Inc. on their iPhones, indicating they were targeted by a “mercenary” attack. This type of spyware allows attackers to infiltrate personal devices, granting access to messages, photos,…
Akira Ransomware: The Need for Rapid Response
Threat actors wielding the Akira ransomware demonstrated unprecedented efficiency in a recent cyber attack that sent shockwaves through the cybersecurity community. Their lightning-fast data exfiltration took just over two hours, representing a dramatic shift in the average time it takes…
Cyber Criminals Siphoned ‘Almost All’ of AT&T’s Call Logs Over Six Months
Hackers accessed AT&T’s data storage platform in April, stealing metadata from “nearly all” call records and messages sent by users over a six-month period in 2022. AT&T filed paperwork with the Securities and Exchange Commission (SEC) on Friday, stating…
Major Ransomware Attack Targets Evolve Bank, Impacting Millions
An Arkansas-based financial services organization confirmed the incident on July 1 shortly after the ransomware gang published data it claimed had been stolen during the attack and published it on its website. According to the company, there was no…
Improved ViperSoftX Malware Distributed Through eBooks
Researchers have found new advancements in the ViperSoftX info-stealing malware, which was first discovered in 2020. This malware has become more sophisticated, using advanced techniques to avoid detection. One of its new methods is using the Common Language Runtime…
Chinese Expert Confirms Authenticity of Leaked F-35 and F-15 Documents
One of the key findings of a Chinese expert on information security is the authenticity of recent documents that leaked information on the F-35 fighter jet and sensitive US weapons. According to the expert, the documents appear authentic. Ivan…
Dubai Customs Introduces Blockchain Platform to Streamline Commerce
Dubai Customs has recently unveiled a new blockchain platform aimed at streamlining commercial activities in the region, reinforcing its status as a technology-forward market. This initiative seeks to address and overcome obstacles hindering entrepreneurship in Dubai by leveraging blockchain…