A significant amount of cryptocurrency, valued at nearly $10 million, has been reported stolen from personal accounts belonging to Jeff “Jihoz” Zirlin, one of the co-founders associated with the video game Axie Infinity and its affiliated Ronin Network. According…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Nvidia CEO Believes AI Would Kill Coding
When ChatGPT was first made public by OpenAI in November 2022, many were taken aback by its abilities. People discovered an array of opportunities for the AI chatbot, ranging from asking it to write poetry and music to debug…
Google’s Magika: Revolutionizing File-Type Identification for Enhanced Cybersecurity
In a continuous effort to fortify cybersecurity measures, Google has introduced Magika, an AI-powered file-type identification system designed to swiftly detect both binary and textual file formats. This innovative tool, equipped with a unique deep-learning model, marks a significant…
From Classrooms to Cyberspace: The AI Takeover in EdTech
Recently, the intersection between artificial intelligence (AI) and education technology (EdTech) has become one of the most significant areas of concern and growth within the educational industry. The rapid adoption of AI-based EdTech tools is creating a unique set…
Ransomware Distributed Through Mass Exploitation of ConnectWise ScreenConnect
Shortly after reports emerged regarding a significant security flaw in the ConnectWise ScreenConnect remote desktop management service, researchers are sounding the alarm about a potential large-scale supply chain attack. Kyle Hanslovan, CEO of Huntress, expressed concerns about the exploitation…
Serco Leisure Faces Legal Action for Unlawful Employee Face Scanning
Serco Leisure, a prominent leisure firm based in the UK, finds itself at the centre of a regulatory storm as the Information Commissioner’s Office (ICO) intensifies its scrutiny. The ICO has raised serious concerns over the alleged illegal processing of…
Amazon Issues ‘Warning’ For Employees Using AI At Work
A leaked email to employees revealed Amazon’s guidelines for using third-party GenAI tools at work. Business Insider claims that the email mandates employees to refrain from using third-party software due to data security concerns. “While we may find ourselves…
LockBit Ransomware: Covertly Evolving Towards Next-Gen Threats Amid Takedown Efforts
In a significant development, law enforcement dismantled the infrastructure of LockBit ransomware earlier this week, uncovering the clandestine work on a next-generation file encryption malware. Referred to as LockBit-NG-Dev, this emerging threat, likely the precursor to LockBit 4.0, was…
Rethinking Trust: The Case Against Blind Reliance on Antivirus Software
Most users would believe that the best antivirus programs are the most trustworthy type of software in the market, however, it turns out that perceptions can be deceiving and there is no such thing as a foolproof solution. As…
Cell Service Restored Following Extensive AT&T Outage
AT&T has resolved issues affecting its mobile phone customers following widespread outages on Thursday, according to a company announcement.Throughout the day, tens of thousands of cell phone users across the United States reported disruptions. Reports on Downdetector.com, a platform…
Canadian University Vending Machine Malfunction Discloses Use of Facial Recognition
A faulty vending machine at a Canadian university has unintentionally exposed the fact that several of them have been covertly utilising facial recognition technology. Earlier this month, a snack dispenser at the University of Waterloo displayed the error message…
Cybersecurity Nightmare Unfolds as Malawi’s Immigration Systems Under Attack
There has been a recent cyberattack on Malawi, according to President Lazarus Chakwera, which has caused the government to stop issuing passports. However, some observers believe such an attack did not occur. Chakwera informed parliament on Wednesday that security…
Rise in Fake Life Insurance Emails, Action Fraud Warns
Over the past few weeks, a surge in fraudulent emails impersonating reputable life insurance companies has prompted over 800 reports to Action Fraud, the UK’s national reporting centre for fraud and cybercrime. The scam emails are cleverly crafted to…
Nation-State Cyber Attacks Cause Pharmacy Delays: A Critical Healthcare Concern
In recent weeks, pharmacies across the United States have experienced significant delays, leaving patients waiting for essential medications. The cause of these delays is now being attributed to a wave of cyber attacks orchestrated by nation-state hackers, raising serious…
Critical DNS Bug Poses Threat to Internet Stability
As asserted by a major finding, researchers at the ATHENE National Research Center in Germany have identified a long-standing vulnerability in the Domain Name System (DNS) that could potentially lead to widespread Internet outages. This flaw, known as “KeyTrap”…
Cybercriminals Exploit Google Cloud Run in Extensive Banking Trojan Scheme
Security experts have issued a warning about hackers exploiting Google Cloud Run to distribute significant amounts of banking trojans such as Astaroth, Mekotio, and Ousaban. Google Cloud Run enables users to deploy various services, websites, or applications without the…
Here’s Why Robust Space Security Framework is Need of the Hour
Satellite systems are critical for communication, weather monitoring, navigation, Internet access, and numerous other purposes. These systems, however, suffer multiple challenges that jeopardise their security and integrity. To tackle these challenges, we must establish a strong cybersecurity framework to…
AI’s Dark Side: Splunk Report Forecasts Troubled Trends in Privacy and Security
There is no doubt that AI is going to be very beneficial to security professionals, but cybercriminals will be looking for ways to harness the power of AI to their advantage as well. As bad actors push artificial intelligence…
ConnectWise ScreenConnect Vulnerability: Navigating the Breach Risk
ConnectWise ScreenConnect, a widely-used remote access software, is facing a critical vulnerability that could expose sensitive data and allow the deployment of malicious code. Described as an authentication bypass flaw, the severity-rated vulnerability poses a significant risk to more…
Analysis: AI-Driven Online Financial Scams Surge
Cybersecurity experts are sounding the alarm about a surge in online financial scams, driven by artificial intelligence (AI), which they warn is becoming increasingly difficult to control. This warning coincides with an investigation by AAP FactCheck into cryptocurrency scams…