In today’s digital landscape, small and medium-sized businesses (SMBs) are increasingly becoming prime targets for cybercriminals looking to exploit vulnerabilities for financial gain. A recent report from cybersecurity firm Sophos sheds light on the top cyber threats facing SMBs,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Security Flaws Discovered in ChatGPT Plugins
Recent research has surfaced serious security vulnerabilities within ChatGPT plugins, raising concerns about potential data breaches and account takeovers. These flaws could allow attackers to gain control of organisational accounts on third-party platforms and access sensitive user data, including…
Privacy Perils: Experts Warn of Pitfalls in Sharing Pregnancy Photos Online
Taking pregnancy pictures online can even lead to the creation of a digital identity for your child that could be exploited, according to data scientists. When a child appears online, experts say it puts them at risk of identity…
Crypto Phishing Scams: $47M Lost in February
In February, cybercriminals orchestrated a series of sophisticated crypto phishing scams, resulting in a staggering $47 million in losses. These scams, often initiated through social media platforms like X (formerly Twitter), saw a dramatic 40% surge in victims compared…
Sophisticated Vishing Campaigns are Rising Exponentially Worldwide
Voice phishing, also known as vishing, is popular right now, with multiple active campaigns throughout the world ensnaring even savvy victims who appear to know better, defrauding them of millions of dollars. South Korea is one of the global…
MarineMax’s Cyber Resilience: Responding to SEC on Cyberattack Incident
MarineMax, a national retailer of boats and million-dollar yachts, reported on March 12 that a “cybersecurity incident” disrupted its operations, according to documents filed with the Securities and Exchange Commission (SEC). According to the company, unauthorized access to the…
Protect Yourself: Tips to Avoid Becoming the Next Target of a Microsoft Hack
The realm of cybersecurity, particularly within the Microsoft 365 environment, is in a constant state of evolution. Recent events involving major tech firms and cybersecurity entities underscore a crucial truth: grasping security best practices for Microsoft 365 isn’t synonymous…
Expert Urges iPhone and Android Users to Brace for ‘AI Tsunami’ Threat to Bank Accounts
In an interview with Techopedia, Frank Abagnale, a renowned figure in the field of security, provided invaluable advice for individuals navigating the complexities of cybersecurity in today’s digital landscape. Abagnale, whose life inspired the Steven Spielberg film “Catch Me…
Thinking of Stealing a Tesla? Just Use Flipper Zero
Researchers have found a new way of hijacking WiFi networks at Tesla charging stations for stealing vehicles- a design flaw that only needs an affordable, off-the-shelf tool. Experts find an easy way to steal a Tesla As Mysk Inc. cybersecurity…
Hackers Exploit Vulnerability in Popup Builder Plugin for WordPress
In a concerning development for website owners and administrators, hackers have been exploiting a vulnerability in the popular Popup Builder plugin for WordPress, resulting in the infection of over 3,300 websites worldwide. This security flaw, officially tracked as CVE-2023-6000,…
Where is AI Leading Content Creation?
Artificial Intelligence (AI) is reshaping the world of social media content creation, offering creators new possibilities and challenges. The fusion of art and technology is empowering creators by automating routine tasks, allowing them to channel their energy into more imaginative…
Roku Data Breach: Over 15,000 Accounts Compromised; Data Sold for Pennies
A data breach impacting more than 15,000 consumers was revealed by streaming giant Roku. The attackers employed stolen login credentials to gain unauthorised access and make fraudulent purchases. Roku notified customers of the breach last Friday, stating that hackers…
LockBit’s Double Cross: Ransom Paid, Data Remains Locked Away
In exchange for the payment of a ransom, LockBit ransomware blocks access to the computer systems of its users. With LockBit, all computers on a network can be encrypted by encrypting them, confirming that the target is valuable, spreading…
Private Operators to Manage Mobile Speed Cameras in New Zealand
In a significant shift, New Zealand Transport Agency Waka Kotahi (NZTA) has opened a tender to hand over the management of the country’s 45 mobile speed cameras to private operators from next year. This move, the first of its…
Change Ransomware Attack: UnitedHealth Profits from a Crisis it Created
Change Ransomware Incident: Details so far The change Ransomware attack Last week, an Oregon medical practice suffered a serious Ransomware attack called Change Ransomware. Due to the attack, the medical practice was left with an empty bank account. The only…
Europe’s Digital Markets Act Compels Tech Corporations to Adapt
Europeans now have the liberty to select their preferred online services, such as browsers, search engines, and iPhone apps, along with determining the usage of their personal online data. These changes stem from the implementation of the Digital Markets…
Japan Blames Lazarus for PyPi Supply Chain Attack
Japanese cybersecurity officials issued a warning that North Korea’s infamous Lazarus Group hacking group recently launched a supply chain attack on the PyPI software repository for Python apps. Threat actors disseminated contaminated packages with names like “pycryptoenv” and “pycryptoconf”…
Cybersecurity Teams Tackle AI, Automation, and Cybercrime-as-a-Service Challenges
In the digital society, defenders are grappling with the transformative impact of artificial intelligence (AI), automation, and the rise of Cybercrime-as-a-Service. Recent research commissioned by Darktrace reveals that 89% of global IT security teams believe AI-augmented cyber threats will…
Hyper-Personalization in Retail: Benefits, Challenges, and the Gen-Z Dilemma
Customers often embrace hyper-personalization, which is defined by customized product suggestions and AI-powered support. Marigold, Econsultancy, Rokt, and The Harris Poll polls reveal that a sizable majority of consumers—including 88% of Gen Zers—view personalized services as positive additions to their…
Critical Vulnerabilities in GovQA Platform Expose Sensitive Government Records
In a significant cybersecurity revelation, critical vulnerabilities were discovered in the GovQA platform, a tool extensively used by state and local governments across the U.S. to manage public records requests. Independent researcher Jason Parker uncovered flaws that, if exploited,…