Recently, ransomware groups have been increasingly adopting newer tactics, one of them being the transparent, quasi-corporate strategy with the media, with the benefits of building pressure on the victims to pay ransom. According to a report, released this week by…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Rise of OLVX: A New Haven for Cybercriminals in the Shadows
OLVX has emerged as a new cybercrime marketplace, quickly gaining a loyal following of customers seeking through the marketplace tools used to conduct online fraud and cyberattacks on other websites. The launch of the OLVX marketplace follows along with…
LockBit is Recruiting Members of ALPHV/BlackCat and NoEscape Ransomware Outfit
Recruiting affiliates and developers from the troubled BlackCat/ALPHV and NoEscape ransomware operations is one of the calculated steps being taken by the LockBit ransomware group. An ideal opportunity emerged for LockBit to expand its network due to the recent…
China Issues Warning About Theft of Military Geographic Data in Data Breaches
China issued a cautionary notice regarding the utilization of foreign geographic software due to the discovery of leaked information concerning its critical infrastructure and military. The Ministry of State Security, while refraining from assigning blame, asserted that the implicated…
Appleās Push Notification Data Used to Investigate Capitol Rioters; Apple Sets Higher Legal bar
When it initially came to light that governments globally demanded push notification data from Apple and Google, suspicion mounted that the US government was doing the same. This has now been confirmed, with one use of it being the monitoring…
MrAnon Stealer Propagates via Email with Fake Hotel Booking PDF
FortiGuard Labs cybersecurity experts have discovered a sophisticated email phishing scheme that uses fraudulent hotel reservations to target unsuspecting victims. The phishing campaign involves the deployment of an infected PDF file, which sets off a chain of actions that…
Epic Games Wins: Historic Decision Against Google in App Store Antitrust Case
The conflict between tech behemoths Google and Apple and Fortnite creator Epic Games is a ground-breaking antitrust lawsuit that has rocked the app ecosystem. An important turning point in the dispute occurred when a jury decided to support the gaming…
The Dark Side of Digital Reading: E-Books as Corporate Surveillance Tools
There is an electronic trail behind every single reader when they read a newspaper online, buy an eBook, or watch a video on their computer. For companies and law enforcement agencies alike, this trail is likely to be a…
Custom GPTs Might Coarse Users into Giving up Their Data
In a recent study by Northwestern University, researchers uncovered a startling vulnerability in customized Generative Pre-trained Transformers (GPTs). While these GPTs can be tailored for a wide range of applications, they are also vulnerable to rapid injection attacks, which can…
China Launches Probe into Geographic Data Security
China has started a security investigation into the export of geolocation data, a development that highlights the nation’s rising concerns about data security. The probe, which was made public on December 11, 2023, represents a major advancement in China’s attempts…
New Surveillance Reform Bill Raises Concerns Regarding Americans Data Privacy
Spies might be made out of regular employees at US companies if the recently proposed and approved legislation by the House Intelligence Committee greatly expands the federal government’s surveillance powers, experts warn. The legislation, called H.R. 6611 or the…
Sandman APT Gains Traction: Chinese Hackers Amplify Cybersecurity Risks
It has been discovered that there is a strong coincidence in the targeting and tactics of Sandman, a mysterious advanced persistent threat (APT) that has been identified to use backdoors referred to as “Keypluggs,” and KEYPLUG, a China-based threat…
How are the AI-powered Robocop Keeping New Yorkās Busiest Subway Station Safe?
Sharing her experience with the AI-powered robot cop in a New York subway station, ZDNETās Nina Raemont reported of the robot ā K5 ā patrolling in The Times Square-42nd St. subway station’s mostly deserted mezzanine. It was pacing swiftly from…
The United States is Monitoring Vulnerabilities in Bitcoin
The United States has shown a keen interest in the cybersecurity aspects of Bitcoin, particularly honing in on a vulnerability associated with the Ordinals Protocol in 2022. The National Vulnerability Database (NVD), overseen by the National Institute of Standards…
AI and Blockchain Convergence: A Game Changer in the Digital Sector
AI and blockchain are two of the most revolutionary technologies of our time, and their combination will totally transform the tech sector. The two main axes around which blockchain is conceptualised are cryptocurrencies and the infrastructure supporting them, which…
17 Risky Apps Threatening Your Smartphone Security
Users of Google Android and Apple iPhone smartphones have recently received a vital warning to immediately remove certain apps from their devices. The programs that were found to be potentially dangerous have been marked as posing serious concerns to the…
Versions 14 and 13 of Android are Vulnerable to New Lock Screen Bypass Exploits
Using Android 14 and 13 smartphones, a newly discovered bug allowing the user to bypass the lock screen can compromise sensitive information from Google accounts stored in users’ Google accounts, according to security researcher Jose Rodriguez. It has now…
AI Tools are Quite Susceptible to Targeted Attacks
Artificial intelligence tools are more susceptible to targeted attacks than previously anticipated, effectively forcing AI systems to make poor choices. The term “adversarial attacks” refers to the manipulation of data being fed into an AI system in order to…
Is Your Android Device Tracking You? Understanding its Monitoring Methods
In general discussions about how Android phones might collect location and personal data, the focus often falls on third-party apps rather than Google’s built-in apps. This awareness has grown due to numerous apps gathering significant information about users, leading…
Detecting Mobile Hacks: Signs and Solutions
The possibility of getting hacked is a worrying reality in a time when our lives are inextricably linked to our smartphones. Hackers’ strategies, which are always looking for ways to take advantage of weaknesses, also evolve along with technology. Thankfully,…