Category: CySecurity News – Latest Information Security and Hacking Incidents

General Motors Under Fire for Secretly Spying on Drivers

  In a developing story that has captured public attention, General Motors (GM) finds itself embroiled in controversy amidst accusations of clandestine surveillance and unauthorised data sharing with insurance companies. The unfolding narrative, spearheaded by investigative journalist Kashmir Hill of…

Is Your VPN Safe? Or Can It be Hacked?

A virtual private network is one of the simplest ways for consumers to secure their internet activity. VPNs utilize tunneling technology to encrypt a user’s online traffic and make it unreadable to prying eyes. This additional layer of security has…

ToddyCat APT Is Siphoning Data on ‘Industrial Scale’

  ToddyCat, an advanced persistent threat (APT) gang that targets the government and defence industries, has been seen collecting stolen data “on an industrial scale” from victim organisations in Asia-Pacific.  Kaspersky researchers first disclosed details regarding the elusive gang’s actions…

Where Hackers Find Your Weak Spots: A Closer Look

Social engineering is one of the most common attack vectors used by cyber criminals to enter companies. These manipulative attacks often occur in four stages:  Info stealing from targets Building relationships with target and earning trust Exploitation: Convincing the target…

MITRE Breach: State Hackers Exploit Ivanti Zero-Days

A state-backed hacking group successfully breached MITRE Corporation’s systems in January 2024 by exploiting two Ivanti VPN zero-day vulnerabilities.  The incident was detected after suspicious activity was observed on MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified collaborative…

Rise In Cybercrime: Dark Web Fueling Credential Attacks

  In an unsettling situation, cybercriminals are increasingly turning to credential theft as a lucrative business, aided by the rise of infostealer malware attacks. Over the past three years, these threat actors have capitalised on the opportunity, compromising millions of…