Recent ransomware attacks have impacted two major water supply systems in the United States and the United Kingdom, with Boston-based Veolia North America and England’s Southern Water falling victim to cyber threats. In both instances, attackers have reportedly seized…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Hackers Drain Wallets via Cracked macOS Apps using Scripts Accessed From DNS Records
Hackers have found another clever way to transfer information-stealing malware to macOS users, apparently through DNS records that could hide malicious scripts. The attack is being targeted to macOS Ventura and later, depending on the vulnerable applications repackaged as PKG…
Enhanced Security Alert: Setting Up Stolen Device Protection on iOS 17.3
It has been announced that Apple has released iOS 17.3, the latest version of its iPhone operating system. This new version has several important new features, including Stolen Device Protection, which provides users with additional security measures if their…
LockBit Ransomware Outfit Claims Subway as its Latest Victim
Due to an alleged ransomware attack by the notorious LockBit ransomware gang, the multinational fast-food restaurant giant Subway is facing a potential PR nightmare. Reports suggest Subway’s systems were exploited by the LockBit gang, known for its aggressive modus…
Dangerous Trends: YouTube Stream-Jacking Attacks Reach Alarming Levels
A recent trend among major streaming platforms has been to increase their threat of stream-jacking attacks. Cybercriminals aim to compromise high-profile accounts, especially those with large follower counts, so that their deceptive messages may reach a large audience through…
ColdRiver APT: Google TAG Warns Against Russian APT Group is Using a Custom Backdoor
Google has warned that a Russia-linked threat actor named ‘COLDRIVER’ which is expanding its targets has also been developing custom malware. ColdRiver APT The ColdRiver APT (aka “Seaborgium“, “Callisto”, “Star Blizzard”, “TA446”) is a Russian cyberespionage outfit that has been…
Security Trends to Monitor in 2024
As the new year unfolds, the business landscape finds itself on the brink of a dynamic era, rich with possibilities, challenges, and transformative trends. In the realm of enterprise security, 2024 is poised to usher in a series of…
Crypto Firm Terraform Labs Files for Chapter 11 Bankruptcy in US
Following the 2022 collapse of its cryptocurrencies, Singapore-based Terraform Labs (TFL), the firm behind digital assets TerraUSD (UST) and Luna, filed for Chapter 11 bankruptcy in Delaware. The Chapter 11 bankruptcy protection petition was confirmed by Terraform Labs, which…
The Impact of AI-Generated Content on Internet Quality
In a comprehensive study conducted by the Amazon Web Services (AWS) AI Lab, a disconcerting reality has surfaced, shaking the foundations of internet content. Shockingly, an extensive 57.1% of all sentences on the web have undergone translation into two…
Trezor Unveils Unauthorized User Data Access, Highlighting Emerging Phishing Threat
Hardware wallet manufacturer Trezor recently announced a security breach that may have exposed the personal data of approximately 66,000 users. The breach involved unauthorized access to a third-party support portal. Trezor, a renowned provider of cryptocurrency hardware wallets, took…
Undetected Threat: Chinese Hackers’ Long-Term VMware Exploitation
CVE-2023-34048 is a pathogen that can be exploited remotely by an attacker who has network access to execute arbitrary code remotely due to an out-of-bounds write flaw found in VMware’s DCERPC implementation, which can be tracked as CVE-2023-34048 (CVSS…
Google to put Disclaimer on How its Chrome Incognito Mode Does ‘Nothing’
The description of Chrome’s Incognito mode is set to be changed in order to state that Google monitors users of the browser. Users will be cautioned that websites can collect personal data about them. This indicates that the only entities…
Cryptographers Groundbreaking Discovery Enables Private Internet Searches
The desire for private internet searches has long been a cryptographic challenge. Historically, getting information from a public database without disclosing what was accessed (known as private information retrieval) has been a difficult task, particularly for large databases. The…
Major Data Breach Hits Popular Brands
VF Corp, the parent company of renowned brands including Timberland, The North Face, and Vans is grappling with a significant cybersecurity breach. Discovered on December 13, 2023, the breach by the ALPHV group disrupted the online systems of these…
Aftermath of Ransomware Attacks Take a Mental and Physical Toll on Security Pros
A research conducted by the Royal United Services Institute (RUSI) has underlined the mental and physical toll that cybersecurity workers face in their work. Through a series of interviews with people who had been at the forefront of ransomware attacks…
Security Researchers Establish Connections Between 3AM Ransomware and Conti, Royal Cybercriminal Groups
Security researchers examining the operations of the recently surfaced 3AM ransomware group have unveiled strong connections with notorious entities like the Conti syndicate and the Royal ransomware gang. The 3AM ransomware, also known as ThreeAM, has adopted a novel…
CISA’s Proactive Measures averted Ransomware, Millions Preserved
The threat of ransomware attacks has increased in recent years, causing significant disruptions across a wide range of industries across the country, causing significant disruptions. Various industries have been affected by these attacks, with schools closing, hospitals diverting patients,…
Google DeepMind Cofounder Claims AI Can Play Dual Role in Next Five Years
Mustafa Suleyman, cofounder of DeepMind, Google’s AI group, believes that AI will be able to start and run its own firm within the next five years. During a discussion on AI at the 2024 World Economic Forum, the now-CEO…
The Pros and Cons of Large Language Models
In recent years, the emergence of Large Language Models (LLMs), commonly referred to as Smart Computers, has ushered in a technological revolution with profound implications for various industries. As these models promise to redefine human-computer interactions, it’s crucial to…
Accounts on Payoneer in Argentina Compromised in 2FA Bypass Incidents
A significant number of Payoneer users in Argentina have reported unauthorized access to their 2FA-protected accounts, resulting in the theft of funds while they were asleep. Payoneer, a financial services platform facilitating online money transfer and digital payments, is…