A leading cybersecurity expert has warned that the NHS remains at risk of further cyber-attacks unless it updates its computer systems. This stark warning follows a significant ransomware attack that severely disrupted healthcare services across London. Prof Ciaran Martin,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
A Surge in Advanced Fraud Techniques is Eroding Business Trust
Fraudsters seem to be perpetually ahead of the curve. Early in 2022, research indicated that one in four online accounts was fraudulent, a figure that has only escalated since. In the auto lending sector alone, losses amounted to $7.9…
Mobile Encryption Innovation Aids Criminals, Europol Reports
Europol has proposed solutions to address some of the challenges posed by privacy-enhancing technologies found in Home Routing, which pose a challenge for law enforcement agencies in intercepting communications during criminal investigations as a result of these technologies. There…
Chinese APT40 Attackers Exploit SOHO Routers to Launch Attacks
Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the United Kingdom, and the United States have issued a joint advisory about APT40, a China-linked cyber espionage group, warning regarding its ability to co-opt exploits for newly…
Quantum Key Distribution Achieves Breakthrough with Semiconductor Quantum Dots
In the face of emerging quantum computing threats, traditional encryption methods are becoming increasingly vulnerable. This has spurred the development of quantum key distribution (QKD), a technology that uses the principles of quantum mechanics to secure data transmission. While…
DarkMe RAT: Microsoft SmartScreen Vulnerability Explored
In recent months, cybersecurity researchers have detected a surge in the exploitation of a critical vulnerability known as CVE-2024-21412. This vulnerability specifically targets Microsoft SmartScreen, a security feature designed to protect users from malicious websites and downloads. In this blog…
Double-Scam Alert: How Fraudsters Exploit Scam Victims Twice
The ACCC (Australian Competition and Consumer Commission) has cautioned that scammers are approaching victims with false offers to assist them in recovering from scams. Scammers and Fake Recovery Offers The National Anti-Scam Centre warns Australians who have had their money…
Patelco Credit Union Working Diligently to Recover from Security Incident
A ransomware attack on Patelco Credit Union in the Bay Area has disrupted banking services for nearly half a million members, with the outage potentially lasting for weeks. The credit union announced the attack on June 29 through Twitter.…
New Consumer Privacy Rights for Oregonians: What You Need to Know
As of July 1, Oregonians have gained significant new consumer privacy rights under the Oregon Consumer Privacy Act (OCPA). This law, enacted in July 2023 but now in effect, results from four years of work by the Attorney General’s…
Here’s How to Change IP Address Without VPN
The internet is becoming an increasingly important aspect of people’s lives since it allows them to perform an array of activities with minimal effort. However, it is also becoming a more dangerous place, as many hackers harm you by…
Supreme Court Directive Mandates Self-Declaration Certificates for Advertisements
In a landmark ruling, the Supreme Court of India recently directed every advertiser and advertising agency to submit a self-declaration certificate confirming that their advertisements do not make misleading claims and comply with all relevant regulatory guidelines before broadcasting…
Hackers Leak 10 Billion Passwords How Users Should Respond
Several months ago, security researchers discovered the world’s largest collection of stolen passwords and credentials had been uploaded to an infamous criminal marketplace where cybercriminals would trade such credentials for a considerable amount of money. A hacker known as…
New Golang-Based Botnet ‘Zergeca’ Discovered
Researchers at QiAnXin XLab have found a new and dangerous botnet called Zergeca. This botnet, written in the Go programming language (Golang), can launch powerful distributed denial-of-service (DDoS) attacks, which can overwhelm and shut down targeted websites or services.…
OpenAI Hack Exposes Hidden Risks in AI’s Data Goldmine
A recent security incident at OpenAI serves as a reminder that AI companies have become prime targets for hackers. Although the breach, which came to light following comments by former OpenAI employee Leopold Aschenbrenner, appears to have been limited to…
New Ghostscript Vulnerability Alarms Experts as Major Breach Threat
The information security community is buzzing with discussions about a vulnerability in Ghostscript, which some experts believe could lead to significant breaches in the coming months. Ghostscript, a Postscript and Adobe PDF interpreter, allows users on various platforms including…
Robot ‘Suicide’ in South Korea Raises Questions About AI Workload
At the bottom of a two-meter staircase in Gumi City Council, South Korea, a robot that worked for the city council was discovered unresponsive. There are those in the country who label the first robot to be built in…
FIA Confirms Cyberattack Compromising Email Accounts
The Fédération Internationale de l’Automobile (FIA), the governing body overseeing Formula 1 and other major motorsports worldwide, recently disclosed a significant cyberattack. This breach resulted from phishing attacks that compromised personal data within two FIA email accounts, exposing vulnerabilities…
BianLian Ransomware Strikes: US Companies Grapple with Data Breach Fallout
The BianLian ransomware organization is accused of cyberattacking against three major US companies, consisting of large amounts of sensitive data. The victims of the BianLian ransomware attack—Island Transportation Corp., Legend Properties Inc., and Transit Mutual Insurance Corporation of Wisconsin—had their…
Eldorado Ransomware is Targeting Windows, VMware ESXi VMs
Eldorado, a new ransomware-as-a-service (RaaS), was released in March and has locker variations for VMware ESXi and Windows. The gang has already claimed 16 victims, the majority of whom are in the United States and work in real estate,…
Hacker Breaches OpenAI, Steals Sensitive AI Tech Details
Earlier this year, a hacker successfully breached OpenAI’s internal messaging systems, obtaining sensitive details about the company’s AI technologies. The incident, initially kept under wraps by OpenAI, was not reported to authorities as it was not considered a threat…
Passkeys Aren’t Foolproof: New Study Reveals Vulnerabilities in Popular Authentication Method
Despite their growing popularity, passkeys are not as secure as many believe. According to Joe Stewart, principal security researcher at eSentire’s Threat Response Unit (TRU), many online accounts using passkeys can still fall victim to adversary-in-the-middle (AitM) attacks. This…
Qilin Attack On London Hospitals Leaves Cancer Patient With No Option
The latest figures suggest that nearly 1,500 medical operations have been cancelled at some of London’s leading hospitals in the four weeks following Qilin’s ransomware attack on pathology services provider Synnovis. But perhaps no one was more severely impacted…
Critical npm Account Takeover Vulnerability Sold on Dark Web
A cybercriminal known as Alderson1337 has emerged on BreachForums, offering a critical exploit targeting npm accounts. This vulnerability poses a significant threat to npm, a crucial package manager for JavaScript managed by npm, Inc., a subsidiary of GitHub. Alderson1337…
The Decline of Serverless Computing: Lessons For Enterprises To Learn
In the rapidly changing world of cloud technology, serverless computing, once hailed as a groundbreaking innovation, is now losing its relevance. When it first emerged over a decade ago, serverless computing promised to free developers from managing detailed compute and…
Breaking the Silence: The OpenAI Security Breach Unveiled
In April 2023, OpenAI, a leading artificial intelligence research organization, faced a significant security breach. A hacker gained unauthorized access to the company’s internal messaging system, raising concerns about data security, transparency, and the protection of intellectual property. In this…
Twilio Alerts Authy Users of Potential Security Risks Involving Phone Numbers
The U.S. messaging giant Twilio has been accused of stealing 33 million phone numbers over the past week as a result of a hacker’s exploit. Authy, a popular two-factor authentication app owned by Twilio that uses the phone numbers…
Ministry of Justice Workers’ Online Comments Highlight Workplace Communication Risks
Ministry of Justice employees referred to a woman as a “bitch” in an online conversation, which she later received a copy of, serving as a reminder of the importance of careful workplace communication, says an employment lawyer. Academic and…
Hackers Attack HFS Servers to Install Malware and Mine Monero
Cybersecurity researchers have identified a wave of attacks targeting outdated versions of the HTTP File Server (HFS) software from Rejetto, aiming to distribute malware and cryptocurrency mining tools. These attacks exploit a critical security flaw known as CVE-2024-23692, which…
Behind the Scenes: How Patelco Responded to the Ransomware Threat
Patelco Credit Union, a prominent financial institution based in Dublin, has been thrust into the spotlight due to a crippling ransomware attack. With over half a million members affected, the situation underscores the critical importance of robust cybersecurity measures for…
Ransomware Extortion Demands Increase to $5.2 Million Per Attack
Ransomware demands are skyrocketing in 2024, with the average extortion demand per ransomware attack exceeding $5.2 million per incident in the first half of the year. Following an attack on India’s Regional Cancer Centre (RCC) on April 20, a…
Fintech Frenzy as Affirm and Others Emerge as Victims in Evolve Breach
The recent attack on one of the largest financial services providers has led to a problem for many companies that work with the provider, two of which have already alluded to possible negative implications for customer data due to…
Indonesia’s Worst Cyber Attack Exposes Critical IT Policy Failures
Indonesia recently faced its worst cyber attack in years, exposing critical weaknesses in the country’s IT policy. The ransomware attack, which occurred on June 20, targeted Indonesia’s Temporary National Data Center (PDNS) and used the LockBit 3.0 variant, Brain…
YouTube: A Prime Target for Cybercriminals
As one of today’s most popular social media platforms, YouTube frequently attracts cybercriminals who exploit it to run scams and distribute malware. These schemes often involve videos masquerading as tutorials for popular software or ads for cryptocurrency giveaways. In other…
Cisco Patches NX-OS Zero-Day Exploited by Chinese Attackers
Cisco patched a NX-OS zero-day, identified as CVE-2024-20399 (CVSS score of 6.0), which the China-linked group Velvet Ant used to deploy previously unidentified malware as root on vulnerable switches. The bug exists in the CLI of Cisco NX-OS Software;…
Gen Z’s Payment Preferences are Transforming Retail and Dining
The future of payment technologies and consumer trends are exploding; GenZ’s are more tuned to flexible, and reliable payment sources. The market is evolving with the needs of this generation and adapting new business models and technologies to meet…
Wise and Evolve Data Breach Highlights Risks of Third-Party Partnerships
Wise, a prominent financial technology company, recently disclosed a data breach impacting some customer accounts due to a ransomware attack on their former partner, Evolve Bank & Trust. The breach has raised significant concerns about the security of third-party…
Inside the Ticketmaster Hack: 440,000 Taylor Swift Fans at Risk
In May, the hacking group ShinyHunters claimed to have gotten personal information from more than 500 million Ticketmaster users and was selling the data on the dark web, and the business has now admitted that consumer data may have been…
This New Ransomware Group Uses Phone Calls to Pressure Victims
Researchers have identified a new ransomware group called Volcano Demon, responsible for at least two successful attacks in the past two weeks. Tim West, an analyst at cybersecurity firm Halcyon, revealed that the group targeted companies in the manufacturing…
HubSpot Investigates Limited Security Breach Affecting Customer Accounts
Cambridge, Massachusetts-based enterprise software provider HubSpot is handling a security compromise that has affected many customer accounts. Less than fifty accounts have been compromised, the business said in an online post. Although the investigation is still ongoing, HubSpot stressed…
RBI Issues Advisory to Support Cybersecurity in Banks
Amid escalating cyber threats, the Reserve Bank of India (RBI) has released a comprehensive advisory to all scheduled commercial banks. This advisory, disseminated by the Department of Banking Supervision in Mumbai, stresses upon the paramount importance of robust cybersecurity…
Maintaining Sanity Amidst Unnecessary CVE Reports
Developers strive to maintain robust codebases, but occasionally, they encounter dubious or exaggerated reports that can disrupt their work. A recent incident involving the popular open-source project “ip” sheds light on the challenges faced by developers when dealing with Common…
New Intel CPU Vulnerability ‘Indirector’ Found
Researchers from the University of California, San Diego, have discovered a new vulnerability in modern Intel processors, specifically the Raptor Lake and Alder Lake generations. This vulnerability, named ‘Indirector,’ can be used to steal sensitive information from the CPU. The…
A World of Novel Risks: Stress-Testing Security Assumptions
The most severe security failures are generally those that we cannot anticipate – until they occur. Prior to 9/11, national security and law enforcement planners expected that airline hijackers would land their planes and reach a settlement — until…
Comparitech Report Reveals Average Ransom Demands of Over $5.2 Million in Early 2024
In the first half of 2024, the average ransom demand per ransomware attack reached over $5.2 million (£4.1 million), according to a new analysis by Comparitech. This figure is derived from 56 known ransom demands issued by cybercriminals from…
SEBI Circular Forces Stock Gaming Apps to Shut Down and Reevaluate
As of May 24, a circular was issued by SEBI prohibiting stock exchanges and intermediaries in India from sharing time-sensitive share price information with fantasy trading platforms that gamify stock trading in real-time. In the week after the Securities…
CocoaPods Security Alert: Critical Bugs Expose Millions of Apps
A recent security analysis discovered critical vulnerabilities in CocoaPods, the widely used dependency management platform for Apple developers. These vulnerabilities pose significant risks to iOS and macOS apps, potentially allowing attackers to compromise user data and system integrity. Apple CocoaPods…
New Online Scam: Fraudsters Pose as Police Officers to Extort Money
Cyber fraudsters have developed a new method to deceive unsuspecting individuals by posing as police officers and claiming that a relative has been arrested in a narcotics case. They demand a bribe to drop the charges, preying on the victims’…
Australian Man Arrested for Evil Twin Wi-Fi Attacks on Domestic Flights
Police in Australia have arrested and charged a man with nine cybercrime crimes for allegedly setting up fictitious public Wi-Fi networks using a portable wireless access point to steal data from unsuspecting users. The man designed “evil twin” Wi-Fi…
The Growing Cybersecurity Concerns of Generative Artificial Intelligence
In the rapidly evolving world of technology, generative artificial intelligence (GenAI) programs are emerging as both powerful tools and significant security risks. Cybersecurity researchers have long warned about the vulnerabilities inherent in these systems. From cleverly crafted prompts that can…
New Rules for Quantum Encryption Unveiled by Cryptographers
Cryptographers are making significant strides in the field of quantum encryption, developing new rules that promise to enhance data security in the quantum computing age. As quantum computers advance, they pose a threat to current encryption methods, which rely…
EU Claims Meta’s Paid Ad-Free Option Violates Digital Competition Rules
European Union regulators have accused Meta Platforms of violating the bloc’s new digital competition rules by compelling Facebook and Instagram users to either view ads or pay to avoid them. This move comes as part of Meta’s strategy to…
Exploring Fake-Bat Loaders: Distribution Tactics and Cybercrime Networks
There has been a significant increase in the number of threats exploiting the drive-by-download method during the first half of 2024, such as the FakeBat loader, formerly EugenLoader or PaykLoader. There has been an increasing emphasis on using this…
Tech Giants Face Backlash Over AI Privacy Concerns
Microsoft recently faced material backlash over its new AI tool, Recall, leading to a delayed release. Recall, introduced last month as a feature of Microsoft’s new AI companion, captures screen images every few seconds to create a searchable library. This…
The Future of Cybersecurity Jobs in an AI-Driven World
The Future of Cybersecurity Jobs in an AI-Driven World Artificial Intelligence (AI) is revolutionizing the cybersecurity landscape, enhancing both the capabilities of cyber attackers and defenders. But a pressing question remains: Will AI replace cybersecurity jobs in the future?…
RansomHub and RansomHouse: Unmasking the Culprits Behind Italy’s Attacks
Hackers have claimed responsibility for three major cyberattacks in Italy in the last 24 hours. The RansomHub and RansomHouse gangs allegedly carried out the ransomware assaults in Italy. RansomHub targeted the websites of Cloud Europe and Mangimi Fusco, while RansomHouse…
CDK Cyberattack Traced to BlackSuit Hackers: U.S. Auto Industry Under Siege
Cybercriminals have carried out a series of hacks targeting big companies by breaking into the back ends of their software suppliers, disrupting operations at auto dealerships all over the U.S. This is the latest in a wide-ranging series that…
LockBit Ransomware Attack on Infosys McCamish Systems Exposes Sensitive Data of Over Six Million Individuals
Infosys McCamish Systems (IMS) recently disclosed that a LockBit ransomware attack earlier this year compromised sensitive information of more than six million individuals. IMS, a multinational corporation specializing in business consulting, IT, and outsourcing services, primarily serves the insurance…
Five Challenges to Adoption of Liquid Cooling in Data Centers
Data centre liquid cooling systems are becoming increasingly popular due to their greater heat management effectiveness when compared to traditional air cooling methods. However, as technology advances, new security issues emerge, such as cybersecurity and physical risks. These concerns…
Critical Vulnerabilities Found in Emerson Gas Chromographs Expose Systems
Multiple critical vulnerabilities have been identified in Emerson gas chromatographs, posing risks such as unauthorized access to sensitive data, denial-of-service conditions, and arbitrary command execution. Gas chromatographs are essential in various industries like chemical, environmental, and healthcare sectors for…
5G Vulnerabilities Expose Mobile Devices to Serious Threats
Researchers from Penn State University have uncovered critical vulnerabilities in 5G technology that put mobile devices at risk. At the upcoming Black Hat 2024 conference in Las Vegas, they will reveal how attackers can exploit these weaknesses to steal…
Inside the Espionage: How Nobelium Targets French Diplomatic Staff
Cybersecurity threats have become increasingly sophisticated, and state-sponsored actors continue to target government institutions and diplomatic entities. One such incident involves a Russian threat actor known as “Nobelium,” which has been launching spear phishing attacks against French diplomats. ANSSI Issued…
Brain Cipher Ransomware Targets Indonesia’s National Data Center in Major Cyberattack
A new ransomware operation known as Brain Cipher has emerged, targeting organizations worldwide. This operation recently gained media attention due to an attack on Indonesia’s temporary National Data Center. Indonesia is developing National Data Centers to securely store servers…
Cyberattack by BlackSuit Targets Kadokawa and CDK Global
In early June, Kadokawa’s video-sharing platform Niconico experienced a server outage, which has now been claimed by the Russia-linked hacker group BlackSuit. This group, a rebrand of the Royal ransomware operation and linked to the defunct Conti cybercrime syndicate, has…
Microsoft Announces New Deadlines for Windows Updates
A July 4 deadline for Windows users who have not updated their systems is fast approaching. It was only two weeks ago that a two-week-old security vulnerability found in Windows was found to have been reactivated. Despite Microsoft’s claim…
Top Data Breaches and Cyber Attacks in 2024
We’re more than halfway into 2024, and we’ve already witnessed some of the largest and the most damaging data breaches in recent history. And just when you thought some of these hacks couldn’t be much worse, they did. The…
Korean ISP Accused of Installing Malware to Block Torrent Traffic
A major scandal has emerged in South Korea, where the internet service provider KT is accused of intentionally installing malware on the computers of 600,000 subscribers. This invasive action was reportedly designed to interfere with and block torrent traffic,…
Kadokawa Group Hit by Major Ransomware Attack
Kadokawa Group, the parent company of renowned game developer FromSoftware, has fallen victim to a gruesome ransomware attack. The Japanese conglomerate, known for its diverse involvement in book publishing, the video-sharing service Niconico, and various other media enterprises, revealed…
Pipeline Hijacking: GitLab’s Security Wake-Up Call
A major vulnerability exists in some versions of GitLab Community and Enterprise Edition products, which might be exploited to run pipelines as any user. GitLab is a prominent web-based open-source software project management and task tracking tool. There are an…
Phishing And The Threats of QR Codes
Cybercriminals have always been adept at abusing the latest technological developments in their attacks, and weaponizing QR codes is one of their most recent strategies. QR codes have grown in popularity as a method for digital information sharing due…
Kimsuky Unleashes TRANSLATEXT Malware on South Korean Academic Institutions
An investigation has found that a North Korea-linked threat actor, known as Kimsuky, has been involved in the use of a malicious Google Chrome extension to steal sensitive information to collect information as part of an ongoing intelligence collection…
TeamViewer’s Corporate Network Compromised in Suspected APT Hack
iTeamViewer, a remote access software company, has announced that its corporate environment was compromised in a cyberattack. According to the company, the breach was detected on Wednesday, June 26, 2024, and is believed to have been carried out by…
37signals Boosts Profits by Over $1 Million by Exiting Cloud Computing
This year, software company 37signals has made headlines with its decision to leave cloud computing, resulting in a significant profit boost of over $1 million (£790,000). This move highlights a growing trend among businesses reassessing the value of cloud…
Why You Should Mask Your Email Address
In today’s digital age, entering your real email address into a website is a risky move. It’s all too common for websites to sell your information to data brokers, who then use it for marketing, targeted ads, or even…
Apology Accepted: Ken Griffin’s Tax Records and the IRS
A Case of Privacy Breach and Unintended Disclosure In an unprecedented turn of events, the Internal Revenue Service (IRS) recently issued a public apology to billionaire investor Ken Griffin. The reason? Leaked tax records that exposed sensitive financial information, including…
AI-Generated Exam Answers Outperform Real Students, Study Finds
In a recent study, university exams taken by fictitious students using artificial intelligence (AI) outperformed those by real students and often went undetected by examiners. Researchers at the University of Reading created 33 fake students and employed the AI…
Hyperscaling and On-Chain Confidentiality: The Cornerstones of Web3’s Future
The future of Web3 is being significantly shaped by two critical advancements: hyperscaling and on-chain confidentiality. As blockchain technology continues to evolve, these innovations are poised to address some of the fundamental challenges faced by decentralized systems, paving the…
China’s Backdoor Data Infiltration: A Growing Concern For Indian Government
Indian security agencies are concerned about a potential huge data breach triggered by Chinese microchips and hardware detected in biometric attendance systems (BAS) deployed in central and state government buildings, including sensitive departments. During their investigations, intelligence agencies discovered…
AI Accelerates Healthcare’s Digital Transformation
Throughout the healthcare industry, CIOs are implementing technologies that allow precision diagnostics, reduce clinician workload, and automate back-office functions, from ambient documentation to machine learning-based scheduling. A lot of data is available in Penn Medicine BioBank, an institution run…
Hacker Claims Data Breach of India’s Blue-Collar Worker Database
A hacker claims to have accessed a large database linked with the Indian government’s portal for blue-collar workers emigrating from the country. The eMigrate portal’s database allegedly includes full names, contact numbers, email addresses, dates of birth, mailing addresses,…
Jack Dorsey Warns: The Blurring Line Between Real and Fake
Tech billionaire Jack Dorsey, best known as the founder of Twitter (now X), has issued a stark warning about the future. He predicts that in the next five to ten years, it will become increasingly difficult for people to…
The Role of Immutable Data Storage in Strengthening Cybersecurity
In today’s rapidly advancing digital world, how organisations store their data is crucial to their cybersecurity strategies. Whether protecting sensitive customer information, securing intellectual property, or ensuring smooth business operations, effective data storage methods can prominently impact an organisation’s…
Fresh MOVEit Vulnerability Under Active Exploitation: Urgent Updates Needed
A newly discovered vulnerability in MOVEit, a popular file transfer tool, is currently under active exploitation, posing serious threats to remote workforces. Cybercriminals are taking advantage of this flaw to gain unauthorized access to sensitive data. This exploitation highlights…
Hackers Slip Backdoor into WordPress Plugins in Latest Supply-Chain Attack
Security researchers announced on Monday that there had been a supply chain attack on up to 36,000 WordPress plugins running on a wide range of websites that had been backdoored by unknown hackers. Currently, researchers from security firm Wordfence…
Web3 in Healthcare: Privacy, Consent, and Equity
The convergence of Web3 technologies and the healthcare industry has sparked significant interest and investment. As blockchain, decentralized applications (dApps), and smart contracts gain traction, the potential benefits for healthcare are immense. However, this rapid adoption also brings cybersecurity challenges…
Rethinking the Cloud: Why Companies Are Returning to Private Solutions
In the past ten years, public cloud computing has dramatically changed the IT industry, promising businesses limitless scalability and flexibility. By reducing the need for internal infrastructure and specialised personnel, many companies have eagerly embraced public cloud services. However, as…
Ransomware Strikes Auto Dealerships: The CDK Global Incident
The Attack The automotive industry has faced an unprecedented challenge: a cyberattack targeting CDK Global, a major software provider for auto dealerships. This incident has sent shockwaves through the industry, affecting dealerships across the United States. In this blog post,…
P2Pinfect Worm Now Delivering Ransomware on Redis Servers
Cado Security experts warned that the P2Pinfect worm is used in attacks on Redis servers to deliver ransomware and cryptocurrency mining payloads. Palo Alto Networks Unit 42 researchers uncovered the P2P worm P2PInfect in July 2023, which targets Redis…
The Blockchain Revolution: Transforming Industries Beyond Finance
Blockchain technology, which was first developed as part of the backbone of cryptocurrencies such as Bitcoin, has grown beyond its original purpose. To enhance efficiency, reduce fraud, and spur innovation across various industries, it has its unique attributes-decentralization, transparency,…
Google Chrome Users at Risk: Study Reveals Dangerous Extensions Affecting 280 Million
A recent study has unveiled a critical security threat impacting approximately 280 million Google Chrome users who have installed dangerous browser extensions. These extensions, often masquerading as useful tools, can lead to severe security risks such as data theft,…
BSNL Reportedly Suffers Major Data Breach: Sensitive User Information at Risk
Bharat Sanchar Nigam Limited (BSNL) has reportedly experienced a significant data breach, with the responsible threat actor claiming to have acquired sensitive user and operational data. The government-owned telecom provider’s servers were attacked, resulting in the hackers obtaining SIM…
Digital Afterlife: Are We Ready for Virtual Resurrections?
Imagine receiving a message that your deceased father’s “digital immortal” bot is ready to chat. This scenario, once confined to science fiction, is becoming a reality as the digital afterlife industry evolves. Virtual reconstructions of loved ones, created using…
Law Enforcement is Spying on Thousands of U.S. Citizens’ Mail
The Washington Post reported on Monday that federal law enforcement authorities have long received information about certain Americans’ mail via a little-known U.S. Postal Service operation known as the “mail covers program.” While officials argue that the program is…
From Hype to Reality: Understanding Abandoned AI Initiatives
A survey discovered that nearly half of all new commercial artificial intelligence projects are abandoned in the middle. Navigating the AI Implementation Maze A recent study by the multinational law firm DLA Piper, which surveyed 600 top executives and decision-makers…
Cybercriminal Group UNC5537 Strikes with Major Data Breaches
In recent weeks, the cybercriminal group UNC5537 has made significant waves. This ransomware gang, potentially linked to ShinyHunters or Scattered Spider, stole over 560 million customer records from Ticketmaster. On May 28, they listed this data for sale on…
Why Cybercriminals Keep Targeting the NHS: Insights into the Latest Attack
In a statement released on 3 June, NHS England confirmed that the patient data managed by the company Synnovis for blood testing was stolen in a ransomware attack. In a threat to extort money from Synnovis, a group of…
Back-to-Back Cyberattacks Disrupt Car Dealers in the US and Canada
In recent weeks, car dealerships across the United States and Canada have been severely disrupted by consecutive cyberattacks, underlining the growing vulnerability of the automotive retail sector. These attacks, involving sophisticated ransomware operations, have caused significant operational challenges, impacting…
IT and Consulting Firms Leverage Generative AI for Employee Development
Generative AI (GenAI) has emerged as a driving focus area in the learning and development (L&D) strategies of IT and consulting firms. Companies are increasingly investing in comprehensive training programs to equip their employees with essential GenAI skills, spanning from…
Ensuring Secure Communication in the Digital Age with VPNs and Post-Quantum Cryptography
Cryptography secures online communication, but with reported losses of $534 million due to data breaches in 2023, robust encryption is crucial. Weak encryption invites breaches and man-in-the-middle attacks. Strong VPNs provide robust encryption and secure internet communication paths, essential…
NTA Faces Exam Security Crisis Amid Darknet Threats
The National Testing Agency (NTA) in India is in the midst of a serious crisis, with its staff worried about the safety of any exam due to claims that the NTA’s website was hacked. Following the cancellation of the…
Campaign Oversight Results in Leak of Senior Tories’ Private Info
Although local party anger has been expressed over the selection of Conservative Chairman Richard Holden as the party’s candidate for Basildon and Billericay, he has been appointed at the very last minute as the party’s candidate. The BBC contacted…