The ransomware actor “ShadowSyndicate” was observed searching for servers that could be exposed to the aiohttp Python library’s directory traversal vulnerability, CVE-2024-23334. Aiohttp is an open-source toolkit designed to manage massively concurrent HTTP requests without the need for conventional…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Innovative Web Automation Solutions Unveiled by Skyvern AI
People can use Skyvern as more than just an automation tool; it’s a comprehensive solution that utilizes cutting-edge technologies such as large language models, computer vision, and proxy networks to streamline their online activities by leveraging cutting-edge technologies. Skyvern…
WhatsApp Beta Testing Expanded Authentication Methods for App Lock Feature
In a world where privacy and security are increasingly important, WhatsApp continues to prioritize the protection of user data through encrypted messaging. Recently, the app has been testing a new label to highlight chat encryption, further emphasizing its commitment…
McDonald’s Attributes Worldwide Outage to Third-Party Provider
McDonald’s faced significant disruptions in its fast-food operations on Friday, attributing the widespread technical issues to a third-party provider rather than a cyber attack. The outage, which occurred during a “configuration change,” affected stores in various countries including the UK,…
User Privacy: Reddit Discloses FTC Probe into AI Data Licensing Ahead of IPO
In a surprising turn of events, Reddit, the popular social media platform, has revealed that it is under investigation by the Federal Trade Commission (FTC) regarding its practices related to AI data licensing. The disclosure comes just before Reddit’s highly…
North Korean Hackers’ $12M Ethereum Laundering Via Tornado Cash Unveiled
It has been reported that North Korean hackers associated with the Lazarus Group have exploited Tornado Cash in a recent development to launder approximately $12 million worth of stolen Ethereum (ETH) in the last 24 hours, using the coin…
Russian Hackers Breach Microsoft’s Security: What You Need to Know
In a recent set of events, reports have surfaced of a significant cyberattack on Microsoft, allegedly orchestrated by Russian hackers. This breach, attributed to a group known as Midnight Blizzard or Nobelium, has raised serious concerns among cybersecurity experts…
Decentralised Identity: The Next Revolution Enabled by Block Chain Technology
Identity is crucial in our daily digital life, from accessing websites and applications to establishing our credentials online. Traditional identity systems are no longer trusted as a result of numerous data breaches and unethical corporate usage of consumer data…
TRAI Updates Regulations to Prevent SIM Swap Fraud in Telecom Porting
The Telecom Regulatory Authority of India (TRAI) recently announced updated regulations aimed at combating SIM swap fraud in the telecom sector. According to the new regulations, telecom subscribers will be prohibited from porting out of their current network provider…
Leak of Greek Diaspora Emails Shakes Government: A Closer Look
The recent leak of Greek diaspora emails has sent shockwaves through the conservative government of Prime Minister Kyriakos Mitsotakis. The scandal, which unfolded in March 2024, has raised questions about privacy, data protection, and political accountability. Let’s delve into the…
Fraudulent Antivirus Software Faces FTC Lawsuit After Raking in Millions
The US Federal Trade Commission filed a lawsuit alleging that two antivirus software packages, Restoro and Reimage, are counterfeit goods that have defrauded customers out of “ten of millions” of dollars. FTC investigators apparently went undercover and purchased the…
Private AI Chatbot Not Safe From Hackers With Encryption
AI helpers have assimilated into our daily lives in over a year and gained access to our most private information and worries. Sensitive information, such as personal health questions and professional consultations, is entrusted to these digital companions. While providers…
Cyber Attacks Threaten Essential Services
As per a recent report by BlackBerry, it was revealed that critical infrastructure providers faced a surge in cyberattacks during the latter part of 2023. Shockingly, these providers bore the brunt of 62% of all industry-related cyberattacks tracked from…
eSIM Vulnerabilities: SIM Swappers Exploit Flaws, Hijack Phone Numbers
According to a new report, SIM-swapping crimes are rising worldwide, mainly committed by eSIM (Embedded Subscriber Identity Modules) users. eSIMs are digitally stored SIM cards that are embedded using software into devices. As a result, hackers are now attempting…
Cybersecurity Specialists Caught Moonlighting as Dark Web Criminals
A recent study conducted by the Chartered Institute of Information Security (CIISec) has uncovered a concerning trend in the cybersecurity field. The study reveals that many cybersecurity professionals, facing low pay and high stress, are resorting to engaging in…
The Surge of FakeBat Malware in Search-Based Malvertising Campaigns
In recent months, cybersecurity researchers have observed a concerning surge in search-based malvertising campaigns, with documented incidents nearly doubling compared to previous periods. Amidst this uptick in online threats, one particular malware variant has captured the attention of experts:…
Exploitation of Windows SmartScreen Bypass Flaw Facilitates Deployment of DarkGate RAT
The operators behind the DarkGate malware have been taking advantage of a recently patched flaw in Windows SmartScreen through a phishing scheme. This campaign involves circulating counterfeit Microsoft software installers to spread the malicious code. Researchers from Trend Micro,…
International Initiative Targets Cybercrime
The Cybercrime Atlas initiative has shifted into its operational phase in 2024, marking a significant milestone in global cybersecurity efforts. Originating from discussions at the RSA Conference two years prior, the initiative aims to dismantle cybercriminal networks by mapping…
Change Healthcare Detects Ransomware Attack Vector
The cyberattack’s widespread destruction underscores how threat actors can do significant damage by targeting a relatively unknown vendor that serves a vital operational function behind the scenes. The AlphV ransomware group disrupted basic operations to the critical systems of…
Unraveling Evolv Technology’s Alleged UK Government Testing Controversy
Evolv Technology, a prominent player in the field of AI-driven weapons-scanning technology, has found itself embroiled in controversy following revelations about its testing claims with the UK government. The company’s scanners, heralded as “intelligent” detectors capable of identifying concealed…