A recent surge of “swatting” incidents across America, primarily targeting Republican politicians, has perplexed police agencies and put victims in risk this holiday season, driving lawmakers to demand for stricter anti-swatting laws and harsher penalties. Swatting entails filing a…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Trading Tomorrow’s Technology for Today’s Privacy: The AI Conundrum in 2024
Artificial Intelligence (AI) is a technology that continually absorbs and transfers humanity’s collective intelligence with machine learning algorithms. It is a technology that is all-pervasive, and it will soon be all-pervasive as well. It is becoming increasingly clear that,…
A Closer Look At The Future of MagSafe in Apple’s Ecosystem
Apple is actively exploring ways to enhance MagSafe, aiming to enable wireless data transfer and seamless recognition and authentication of connected accessories. Currently, placing a MagSafe-compatible iPhone on a MagSafe charger allows for charging, even with an added MagSafe iPhone…
Data Insights Exposes Ledger’s Granular Tracking: Is Privacy at Stake?
An investigation by Rekt Builder has raised concerns about the extent of data collection by Ledger Live, the official software for managing Ledger hardware wallets. The developer claims that Ledger Live tracks every move users make, including the apps…
OpenAI Employee Claims Prompt Engineering is Not the Skill of the Future
If you’re a prompt engineer — a master at coaxing AI models behind products like ChatGPT to produce the best results — you could earn well over six figures. However, an OpenAI employee claims that the talent is not…
Cybersecurity Breach Shakes Sydney’s Woollahra Council Libraries
Sydney’s Woollahra Council Libraries were the target of a cyberattack that sent shockwaves across the community, demonstrating how susceptible information is in the digital age. Concerns regarding protecting personal data and the possible repercussions of such breaches have been raised…
Microsoft Implements Disablement of Widely Exploited MSIX App Installer Protocol Due to Malware Attacks
On Thursday, Microsoft announced the reactivation of the ms-appinstaller protocol handler, reverting it to its default state due to widespread exploitation by various threat actors for malware dissemination. The Microsoft Threat Intelligence team reported that the misuse of the…
How are LLMs with Endpoint Data Boost Cybersecurity
The issue of capturing weak signals across endpoints and predicting possible patterns of intrusion attempts is ideally suited for Large Language Models (LLMs). The objective is to mine attack data in order to improve LLMs and models and discover new…
The Growing Concern About School Record Hacking
The confidential documents stolen from schools and dumped online by ransomware gangs are raw, intimate and graphic. They describe student sexual assaults, psychiatric hospitalizations, abusive parents, truancy — even suicide attempts. Cybercriminals are not only seeking ransom payouts but…
RingGo: Phone Parking Service Suffers Data Breach, Customer Data Stolen
UK-based pay-by-phone parking service – RingGo – has suffered a data breach, where information including partial credit card numbers of several of its customers has been leaked. The EasyPark-owned company informed that the data of at least 950 customers had…
Hackers are Launching DDoS Attacks During Peak Business Hours
Threat groups’ tactics to avoid detection and cause harm are becoming increasingly sophisticated. Many security practitioners have seen distributed denial-of-service (DDoS) attacks carried out during peak business hours, when firms are more likely to be understaffed and caught off…
Parent Company of CBS and Paramount Discloses Cybersecurity Breach Impacting 80K Individuals
The parent company of CBS and Paramount, National Amusements, has recently reported a data breach that occurred a year ago, affecting 82,128 individuals. TechCrunch initially covered the incident, which was disclosed in a legal filing with the Attorney General…
Five Ways the Internet Became More Dangerous in 2023
The emergence of cyber dangers presents a serious threat to people, companies, and governments globally at a time when technical breakthroughs are the norm. The need to strengthen our digital defenses against an increasing flood of cyberattacks is highlighted by…
Three Ways Smart Devices Can Compromise Your Privacy
Any gadget that has an internet connection and can be operated by a computer or smartphone is considered a smart device. Home appliances, security cameras, thermostats, doorbells, lighting systems, and other networked gadgets are examples of such devices. Smart…
Cullman County Courthouse Hit by Ransomware
A hostile cyberattack recently affected the Cullman County Courthouse, causing disruptions to regular operations and causing shockwaves throughout the community. The ransomware attack that affected the courthouse’s systems had serious repercussions for Cullman County residents as well as the local…
Hackers Stole Cryptocurrency Worth $2 Billion in Year 2023
For another year, crypto-stealing cases made headlines. However, as per crypto security firms, this was the first time since 2020, that the trend has been declining. Based on dozens of cyberattacks and thefts this year, hackers stole over $2 billion…
Digital Battlefields: Artists Employ Technological Arsenal to Combat AI Copycats
Technology is always evolving, and the art field has been on the frontline of a new battle as a result – the war against artificial intelligence copycats. In the fast-paced world of artificial intelligence, it is becoming more and…
Government Advises Social Media Platforms on IT Rule Compliance Amid Deepfake Concerns
In response to escalating concerns surrounding the rise of deepfakes and misinformation fueled by artificial intelligence (AI), the government has issued a directive for all platforms to adhere to IT rules, as outlined in an official release. The advisory…
Gaming PCs as Silent Storytellers: Why Privacy Is Crucial
Online games and video games are incredibly popular as a way to connect with people and interact with them. They are a great way to connect with others and interact with them. Many people enjoy playing games online, either…
Hackers Threaten to Leak South Africa’s Private Financial Data, Demand R1.1 Billion Ransom
In a recent cyber threat, hackers have threatened to release all of South Africa’s private financial data unless TransUnion and Experian, the two biggest consumer credit reporting companies in the country, agree to pay ransom of R1.1 billion. The companies…