A ransomware attack targets Windows system administrators by using Google advertisements to promote fraudulent download sites for Putty and WinSCP. WinSCP and Putty are popular Windows applications; WinSCP is an SFTP and FTP client, while Putty is an SSH…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Slack Faces Backlash Over AI Data Policy: Users Demand Clearer Privacy Practices
In February, Slack introduced its AI capabilities, positioning itself as a leader in the integration of artificial intelligence within workplace communication. However, recent developments have sparked significant controversy. Slack’s current policy, which collects customer data by default for training…
Ransomware Attack Leaves Michigan Hospitals in Chaos Nine Days On
It is continuing to cause problems for Michigan Ascension hospitals as a result of a cyberattack, which has forced some ambulances to be diverted to other hospitals in the event of medical emergencies, delayed diagnostic imaging, and affected prescription…
Vermont’s Data Privacy Law Sparks State Lawmaker Alliance Against Tech Lobbyists
Vermont legislators recently disregarded national trends by passing the strictest state law protecting online data privacy — and they did so by using an unusual approach designed to avoid industrial pressure. The Vermont Data Privacy Law: An Overview Right to…
Bengaluru Man Arrested for Exploiting Woman in Online Interview
Panaji: In a disturbing cybercrime case, the Goa Cyber Crime Police arrested a Bengaluru resident, Mohan Raj V, for allegedly cyberbullying and extorting a woman from Goa. The arrest was made on Saturday after a strategic operation by the…
Punjab Police Break Up Two Scam Call Centers, Arrest 155 Suspects
Over the past 24 hours, Punjab police have busted two fake call centres based in Mohali operating under the cybercrime division. People settling in foreign countries were targeted by the illegal units operating from Industrial Area Phase-7 and Phase-8B…
Top Cybersecurity Risks in Edge Computing : Here’s All You Need to Know
Managing a large number of endpoints poses considerable challenges, especially in handling security logs. Over half of chief information security officers find the volume of daily alerts overwhelming, and monitoring a decentralized framework further heightens cybersecurity risks. Currently, 56%…
Engineering Giant Arup Falls Victim to £20m Deepfake Video Scam
The 78-year-old London-based architecture and design company Arup has a lot of accolades. With more than 18,000 employees spread over 34 offices worldwide, its accomplishments include designing the renowned Sydney Opera House and Manchester’s Etihad Stadium. Currently, it is…
Teaching AI Sarcasm: The Next Frontier in Human-Machine Communication
In a remarkable breakthrough, a team of university researchers in the Netherlands has developed an artificial intelligence (AI) platform capable of recognizing sarcasm. According to a report from The Guardian, the findings were presented at a meeting of the Acoustical…
IBM’s Exit from Cybersecurity Software Shakes the Industry
In an unexpected move that has disrupted the cybersecurity equilibrium, IBM has announced its exit from the cybersecurity software market by selling its QRadar SaaS portfolio to Palo Alto Networks. This development has left many Chief Information Security Officers…
Financial Institutions Now Required to Disclose Breaches Within 30 Days
The 30-Day Deadline The Securities and Exchange Commission (SEC) is demanding financial institutions to report security vulnerabilities within 30 days of discovering them. Why the Change? On Wednesday, the SEC adopted revisions to Regulation S-P, which controls how consumers’ personal…
Cybercriminals Exploit Windows Quick Assist in Latest Ransomware Campaign
A recent wave of cyberattacks has seen financially motivated criminals leveraging Windows Quick Assist, a built-in remote control and screen-sharing tool, to deploy Black Basta ransomware on victim networks. Microsoft has investigated these attacks since mid-April 2024, identifying the…
Deepfakes and AI’s New Threat to Cyber Security
With its potential to manipulate reality, violate privacy, and facilitate crimes like fraud and character assassination, deepfake technology presents significant risks to celebrities, prominent individuals, and the general public. This article analyses recent incidents which bring such risks to…
North Korean Hacker Group Kimsuky Deploys New Linux Malware ‘Gomir’ via Trojanized Software Installers
North Korean hacker group Kimsuky has unveiled a new Linux malware named “Gomir,” a variant of the GoBear backdoor. This development marks a significant advancement in the group’s cyber espionage tactics. Kimsuky, linked to North Korea’s military intelligence, the…
Banco Santander Reports Data Breach, Reaffirms Transaction Security
There was a malicious incident reported by Bank Santander that involved an individual who had accessed the data of one of its service providers. The malicious incident resulted in a data breach, which affected the bank’s customers and posed…
How Attackers Distribute Malware to Foxit PDF Reader Users
Threat actors are exploiting a vulnerability in Foxit PDF Reader’s alert system to deliver malware through booby-trapped PDF documents, according to researchers at Check Point. The researchers have identified several campaigns targeting Foxit Reader users with malicious PDF files.…
Quantum Navigation Systems: Safeguarding Against GPS Spoofing
Britain has achieved a world-first with a series of test flights that show the key technologies of a future quantum navigation system meant to counter one of the most potentially dangerous, yet little discussed, dangers to transportation: GPS jamming and…
Google Introduces Advanced Anti-Theft and Data Protection Features for Android Devices
Google is set to introduce multiple anti-theft and data protection features later this year, targeting devices from Android 10 up to the upcoming Android 15. These new security measures aim to enhance user protection in cases of device theft…
Self Proclaimed “Crypto King” Aiden Pleterski Charged With $30 Million Scam
Aiden Pleterski, also known as the “Crypto King,” and his partner, Colin Murphy, have been arrested and charged with allegedly defrauding investors of $40 million CAD (about $30 million USD) in a cryptocurrency and foreign exchange investment scam. Earlier…
Surge in Cyber Attacks on German Businesses Costs Billions of Euros
Around 80% of targeted firms have fallen victim to data theft, espionage, or sabotage, according to the German digital industry association Bitkom. Cybercrime is on the rise in Germany, with damages estimated to cost the economy €148 billion annually.…