In the ever-evolving landscape of cybercrime, phishing-as-a-service (PaaS) has emerged as a formidable threat, enabling cybercriminals to orchestrate sophisticated attacks with ease. Among the myriad PaaS platforms, Darcula stands out for its technical sophistication, global reach, and pervasive impact. …
Category: CySecurity News – Latest Information Security and Hacking Incidents
Protecting Your Privacy: How to Safeguard Your Smart TV Data
In an era of interconnected devices, our smart TVs have become more than just entertainment hubs. They’re now powerful data collectors, silently observing our viewing habits, preferences, and even conversations. While the convenience of voice control and personalized recommendations is…
Hackers Exploit Flaw in Ray Framework to Breach Servers
The Ray framework, a tool for scaling AI and Python workloads in open source, has been found vulnerable to multiple flaws that enable hackers to take control of devices and pilfer sensitive data. Cybersecurity researchers from Oligo disclosed their…
Novel Darcula Phishing Campaign is Targeting iPhone Users
Darcula is a new phishing-as-a-service (PhaaS) that targets Android and iPhone consumers in more than 100 countries by using 20,000 domains to impersonate brands and collect login credentials. With more than 200 templates available to fraudsters, Darcula has been…
The Rising Energy Demand of Data Centres and Its Impact on the Grid
In a recent prediction by the National Grid, it’s anticipated that the energy consumption of data centres, driven by the surge in artificial intelligence (AI) and quantum computing, will skyrocket six-fold within the next decade. This surge in energy…
Data Breach Alert: 3TB of NHS Scotland Data Held Ransom by Cyber Threat
A ransomware group targeting a small group of patients has published clinical data related to a small number of those patients on the internet that the Dumfries and Galloway Health Board is aware of. In the meantime, three terabytes…
Kiosks in Brookline is Tracking Cell Phone Data
Data is everywhere. It is at your fingertips. It’s all over town, yet your info may be shared around without your knowledge. Brookline put digital signs throughout town, which have gotten people talking since they are collecting individual cell…
Hacker Generates 1 Billion CGT Tokens Valued at $40 Million within Curio Ecosystem
The Curio decentralized finance (DeFi) initiative encountered a breach, with experts from Cyvers Alerts approximating the incurred losses to be around $16 million. The breach appears to have been orchestrated through an exploitation of vulnerabilities within the permissioned access…
Data Highways: Navigating the Privacy Pitfalls of New Automobiles
There is a possibility that these vehicles may be collecting vast amounts of information about their users that can be accessed by advertisers, data brokers, insurance companies and others, and that information could be shared with several companies including…
Unveiling the New Era of Hacking Ethics: Profit Over Principles
Hacking, once a realm of curiosity-driven exploration, has morphed into a complex ecosystem of profit-driven cybercrime. Originating in the 1960s, hacking was fueled by the insatiable curiosity of a brilliant community known as “hackers.” These early pioneers sought to…
Ransomware Strikes Tarrant Appraisal District
Tarrant Appraisal District (TAD) finds itself grappling with a major setback as its website falls prey to a criminal ransomware attack, resulting in a disruption of its essential services. The attack, which was discovered on Thursday, prompted swift action…
Unmasking Cyber Shadows: New Zealand’s Battle Against State-Backed Hackers
Recently, New Zealand accused China of engaging in “malicious cyber activity” targeting its parliament. This accusation sheds light on the growing tensions between nations and the need to safeguard democratic institutions from cyber espionage. In this blog, we delve into…
Facebook Spied on Users’ Snapchat Traffic in a Covert Operation, Documents Reveal
In 2016, Facebook initiated a secret initiative to intercept and decrypt network traffic between Snapchat users and the company’s servers. According to recently revealed court filings, the purpose was to better analyse user behaviour and help Facebook compete with…
‘Tycoon’ Malware Kit Bypasses Microsoft and Google Multifactor Authentication
An emerging phishing kit called “Tycoon 2FA” is gaining widespread use among threat actors, who are employing it to target Microsoft 365 and Gmail email accounts. This kit, discovered by researchers at Sekoia, has been active since at least…
The Great Data Heist: China’s Alleged Theft of Voter Data and Its Potential Impact
Chinese-backed hackers allegedly targeted U.S. officials, journalists, corporations, pro-democracy activists and the United Kingdom’s electoral watchdog in a comprehensive, state-backed attack on March 25, authorities announced in an announcement on March 25. The attack was aimed at targeting officials,…
Safeguarding the NHS: Protecting Against Potential Cyber Attacks from China
Recent concerns have surfaced regarding the vulnerability of the NHS to cyberattacks, particularly from China. Reports indicate that Beijing-backed actors exploited software flaws to access the personal details of millions of Britons. As experts in cybersecurity, it’s crucial to…
What Are The Risks of Generative AI?
We are all drowning in information in this digital world and the widespread adoption of artificial intelligence (AI) has become increasingly commonplace within various spheres of business. However, this technological evolution has brought about the emergence of generative AI,…
Data Breach at Giant Tiger: Protecting Customer Information in the Digital Age
In an increasingly interconnected world, data breaches have become a recurring nightmare for organizations of all sizes. The recent incident at Giant Tiger Stores Ltd., a popular discount retailer based in Ottawa, serves as a stark reminder of the importance…
Here Are Three Ways AI Will Transform Gaming Forever
Technology has been impacted by artificial intelligence in practically every field. You would struggle to identify a tech-related field where artificial intelligence hasn’t had some sort of impact, from data analysis to art programmes. AI hasn’t advanced as quickly…
Security Failure in Ray Framework Leads to Server Breach
There has been a hacking attack on a widely used open-source AI framework called Ray, which hackers have exploited to gain unauthorized access to servers and hijack their resources, as a result of an unpatched vulnerability. It has been…