An attempted sabotage of a widely used software tool has sparked concerns in Washington, D.C. about the vulnerability of the open-source supply chain and the potential involvement of foreign nation-states in covert operations. A software engineer named Andres Freund,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
AT&T Data Breach Reveals 73 Million Users’ Info on Hacker Forum
A telecommunications company, AT&T Inc., has confirmed that data that has recently been found to be on the dark web relating to 73 million of its past and present customers may have come from 2019 or earlier. Originally, the…
Navigating Data Protection: What Car Shoppers Need to Know as Vehicles Turn Tech
Contemporary automobiles are brimming with cutting-edge technological features catering to the preferences of potential car buyers, ranging from proprietary operating systems to navigation aids and remote unlocking capabilities. However, these technological strides raise concerns about driver privacy, according to…
Linux Servers Targeted by DinodasRAT Malware
Recently, cybersecurity experts have noticed a concerning threat to Linux servers worldwide. Known as DinodasRAT (also referred to as XDealer), this malicious software has been identified targeting systems running Red Hat and Ubuntu operating systems. The campaign, suspected to have…
Google Strengthens Gmail Security, Blocks Spoofed Emails to Combat Phishing
Google has begun automatically blocking emails sent by bulk senders who do not satisfy tighter spam criteria and authenticating their messages in line with new requirements to strengthen defences against spam and phishing attacks. As announced in October, users…
Deciphering the Impact of Neural Networks on Artificial Intelligence Evolution
Artificial intelligence (AI) has long been a frontier of innovation, pushing the boundaries of what machines can achieve. At the heart of AI’s evolution lies the fascinating realm of neural networks, sophisticated systems inspired by the complex workings of…
Beware of the FedEx Courier Scam: How Innocent Indians Are Losing Money
The FedEx courier scam has emerged as a cunning and heartless ploy to deceive unsuspecting victims. Operating primarily in India, this scam preys on people’s trust, fear, and lack of awareness. Let’s delve into the details of this treacherous scheme…
Rising Cybercrime Threats and Prevention Measures Ahead of 2024
According to projections from Statista, the FBI, and the IMF, the global cost of cybercrime is anticipated to experience a substantial increase. By 2027, it is estimated to surge to $23.84 trillion, marking a significant rise from the $8.44…
Here’s How Smart Card Are Tracking Your Private Data
Smart cars are already the norm on our roads, thanks to increased connectivity and technological breakthroughs. However, beneath the slick exteriors and technological capabilities is a worrisome reality: your vehicle may be spying on you and documenting every step,…
Australia Takes Stride In Cybersecurity Measures
In the aftermath of several high-profile cyber attacks targeting key entities like Optus and Medibank, Australia is doubling down on its efforts to bolster cybersecurity across the nation. The Australian government has unveiled a comprehensive plan to overhaul cybersecurity laws…
The Unseen Threat: How Chinese Hackers Target Family Members to Surveil Hard Targets
According to an indictment unsealed by American prosecutors, a Chinese hacking group known as APT 31, which is linked to China’s Ministry of State Security, has been targeting thousands of U.S. and Western politicians, foreign policy experts, academics, journalists, and…
The Week of Crypto Platform Breaches: Prisma Finance Incident Highlights
The past week witnessed a series of bewildering events in the realm of cryptocurrency, marked by breaches on two prominent platforms that left the crypto community grappling with perplexing motives and unexpected outcomes. The first incident unfolded on Tuesday…
Critical Security Alert Released After Malicious Code Found in XZ Utils
On Friday, Red Hat issued a high-priority security alert regarding a discovery related to two versions of a widely-used data compression library called XZ Utils (formerly known as LZMA Utils). It was found that these specific versions of the…
Behind the LockBit Takedown: Strategies and Significance
It was widely hailed as a major victory for law enforcement to take down LockBit in the sprawling war against ransomware and was considered one of the most important victories for law enforcement. However, after law enforcement takes down…
PyPI Halts New User Registrations to Combat Malware Campaign
The Python Package Index (PyPI) has implemented a temporary halt on user registrations and the creation of new projects due to an ongoing malware scheme. PyPI serves as a central hub for Python projects, aiding developers in discovering and…
Enterprise AI Adoption Raises Cybersecurity Concerns
Enterprises are rapidly embracing Artificial Intelligence (AI) and Machine Learning (ML) tools, with transactions skyrocketing by almost 600% in less than a year, according to a recent report by Zscaler. The surge, from 521 million transactions in April 2023…
What are Deepfakes and How to Spot Them
Artificial intelligence (AI)-generated fraudulent videos that can easily deceive average viewers have become commonplace as modern computers have enhanced their ability to simulate reality. For example, modern cinema relies heavily on computer-generated sets, scenery, people, and even visual effects.…
Virtual Reality Headsets: A Gateway for Hackers?
In the ever-evolving landscape of technology, virtual reality (VR) headsets have emerged as a fascinating gateway to immersive experiences. From gaming and entertainment to professional applications, VR promises a world beyond our physical confines. However, recent research has unveiled a…
Sophisticated Dutch Bank Helpdesk Scam Unveils Database with Over 7 Million Email Addresses
In January, authorities in Amsterdam made six arrests as part of a significant cybercrime inquiry, leading to the unearthing of a database containing 7.3 million email addresses, with around 5 million linked to Dutch residents. The investigation initially targeted…
EU AI Act to Impact US Generative AI Deployments
In a move set to reshape the scope of AI deployment, the European Union’s AI Act, slated to come into effect in May or June, aims to impose stricter regulations on the development and use of generative AI technology.…