The role of artificial intelligence (AI) in the realm of cybercrime has become increasingly prominent, with cybercriminals leveraging AI tools to execute successful attacks. However, defenders in the cybersecurity field are actively combating these threats. As anticipated by cybersecurity…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Microsoft’s Cybersecurity Report 2023
Microsoft recently issued its Digital Defense Report 2023, which offers important insights into the state of cyber threats today and suggests ways to improve defenses against digital attacks. These five key insights illuminate the opportunities and difficulties in the field…
No Code Application Development Platforms Set to Propel Your Business in 2024
The ability to develop web applications without extensive coding knowledge is a significant advantage in today’s AI-driven world. No-code web building platforms have become essential tools for entrepreneurs, businesses, and creative individuals seeking to swiftly launch web or mobile…
Operation Haechi IV: Interpol Arrest 3,500, Seize Assets Worth $300M
In a sweeping operation announced on Tuesday, the international police organization, Interpol has recently detained around 3,500 culprits who were allegedly linked to a cybercrime incident. The agency has also seized assets worth $300 million, across 34 countries. The operation,…
1.5 Billion Real Estate Records Leaked, Including Elon Musk and Kylie Jenner
Jeremiah Fowler, a cybersecurity researcher, uncovered and notified VPNMentor about an exposed database related to the New York-based online business Real Estate Wealth Network. The compromised database had 1.5 billion records, including real estate ownership data for millions of…
Sophisticated Web Injection Campaign Targets 50,000 Individuals, Pilfering Banking Data
Web injections, a favoured technique employed by various banking Trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cybercriminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In a…
The Effectiveness of AI is Limited in Cybersecurity, Yet Boundless in Cybercrime
Integrating artificial intelligence (AI) into the realm of cybersecurity has initiated a perpetual cycle. Cybersecurity professionals now leverage AI to bolster their tools and enhance detection and protection capabilities. Concurrently, cybercriminals exploit AI for orchestrating their attacks. In response,…
Rise in RaaS Operations and Implications for Business Security
Recently, there had been news regarding the cyber-attack in a Japanese port, that blocked the smooth transfer of goods – a hack in a Las Vegas resort which led to malfunction in slot machines and guest check-ins and a whopping…
Insomniac Games Cybersecurity Breach
A cyberattack has compromised the prestigious game company Insomniac Games, exposing private data without authorization. Concerns over data security in the gaming business have been raised by this hack, which has spread throughout the community. Targeting Insomniac Games, the company…
FBI Alarmed as Ransomware Strikes 300 Victims, Critical Sectors Under Siege
There was an advisory published late on Monday about the Play ransomware gang that was put out by the Federal Bureau of Investigation (FBI) together with the US Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security…
International Authorities Take Down ALPHV ransomware Gang’s Dark Web Leak Site
An international group of law enforcement groups has taken down the dark web leak site of the notorious ransomware gang known as ALPHV, or BlackCat. “The Federal Bureau of Investigation seized this site as part of a coordinated law…
Phishing Campaign Targets Instagram Users, Steals Backup Codes and Circumvent 2FA Protection
A recent phishing scheme has emerged, posing as a ‘copyright infringement’ email to deceive Instagram users and pilfer their backup codes. These codes, integral for the recovery of accounts, are used to circumvent the two-factor authentication safeguarding users’ accounts.…
HackersEra Launches Telecom Penetration Testing to Eliminate Cyber Threats
Cybercriminals have attacked telecom infrastructure, particularly as it shifts to an IP-based design with the introduction of Long-Term Evolution (LTE) networks, also referred to as LTE or 4G. Persistent attackers could spy on users’ cellular networks and record data…
Mr. Cooper Data Breach: 14 Million Customers Exposed
A major data breach at mortgage giant Mr. Cooper compromised the personal data of an astounding 14 million consumers, according to a surprising disclosure. Sensitive data susceptibility in the digital age is a worry raised by the occurrence, which has…
Decoding the Elusive ‘FedEx’ Scam: An Inside Look at the Tactics and Challenges
One type of spam that is going around lately is FedEx scam calls, which have been targeting people, and are also doing the rounds. Most people have been victims of online fraud at some point in their lives. For…
Digital Landline Switch Halted for Vulnerable Users in UK
UK- based phone companies have halted vulnerable customers from switching to digital landlines following “serious incidents” where telecare devices stopped working. These devices, which can be used to call for assistance in an emergency, are estimated to be utilized by…
Unveiling Storm-1152: A Top Creator of Fake Microsoft Accounts
The Digital Crimes Unit of Microsoft disrupted a major supplier of cybercrime-as-a-service (CaaS) last week, dubbed Storm-1152. The attackers had registered over 750 million fake Microsoft accounts, which they planned to sell online to other cybercriminals, making millions of…
Telus Makes History with ISO Privacy Certification in AI Era
Telus, a prominent telecoms provider, has accomplished a significant milestone by obtaining the prestigious ISO Privacy by Design certification. This certification represents a critical turning point in the business’s dedication to prioritizing privacy. The accomplishment demonstrates Telus’ commitment to implementing…
Hacked Health: Unmasking the Reasons Behind the Targeting of Medical Facilities
There is no more important way to handle sensitive data in the healthcare field than to take care of the patient’s own health, which is why taking care of sensitive data is just as important. Especially now that healthcare…
Belgium Commences Mega Drug Trial After Covert Apps Cracked
A significant trial began in a Belgian court on Monday, involving over 120 individuals accused of offenses such as drug and arms trafficking, extortion, torture, and attempted murder. This trial is notable not only for its sheer scale but…