Category: CySecurity News – Latest Information Security and Hacking Incidents

Cyberattacks Threaten US Hospitals: Patient Care at Risk

  A severe cyberattack on Ascension, one of the largest healthcare systems in the United States, has disrupted patient care significantly. The ransomware attack, which began on May 8, has locked medical providers out of critical systems that coordinate patient…

Massive Data Breach Hits London Hospitals Following Cyber Attack

  In a severe cyber attack targeting a London hospital, hackers have published a massive 400GB of sensitive data, raising significant alarm within the healthcare sector. This breach underscores the escalating threat posed by cybercriminals to critical infrastructure, especially within…

Behind the Breach: Understanding the Change Healthcare Cyberattack

Change Healthcare, a company that handles medical billing, claims processing, and other critical healthcare functions, fell victim to a sophisticated cyberattack. The attackers gained unauthorized access to the company’s systems, compromising a vast amount of sensitive data. The Breach UnitedHealth…

Cybercriminals Target UPI Payments: How to Stay Safe

  The Unified Payments Interface (UPI) has transformed the infrastructure of digital transactions in India, providing a fast, easy, and secure method for payments. However, its rapid adoption has also attracted the attention of cybercriminals. This article delves into the…

Five Tips to Avoid Financial Fraud

  Banks, credit card companies, the government, and a variety of other entities are continually looking for new ways to protect your money and data. But scammers never appear to be far behind. According to a 2023 Ipsos poll conducted…

Small Businesses Increasingly Concerned About Payment Fraud

  Small businesses are becoming more concerned about payment fraud, as revealed by a recent survey from regional bank KeyBank. The survey included nearly 2,000 small-to-medium-sized businesses with annual revenues of less than $10 million. The results show that payment…

From Siri to 5G: AI’s Impact on Telecommunications

The integration of artificial intelligence (AI) has significantly transformed the landscape of mobile phone networks. From optimizing network performance to enhancing user experiences, AI plays a pivotal role in shaping the future of telecommunications.  In this blog post, we delve…

EU Proposes New Law to Allow Bulk Scanning of Chat Messages

  The European elections have ended, and the European football tournament is in full flow; why not allow bulk searches of people’s private communications, including encrypted ones? Activists around Europe are outraged by the proposed European Union legislation.  The EU…

Securing Corporate Data: The Crucial Role of Third-Party Access Audits

  Organizations’ data and systems can be compromised by seemingly benign entities—third-party contractors, vendors, and outsourced service providers—when those entities are seemingly innocent. External entities that perform these tasks must have access to sensitive data and systems. However, improper management…

Defending Hospitals and Clinics: Strategies Against Ransomware

The healthcare industry has become a prime target for ransomware attacks in recent years. These malicious campaigns exploit vulnerabilities in healthcare systems, disrupt critical services, and compromise sensitive patient data.  According to Steve Stone, president of Rubrik’s Zero Labs, ransomware…

Hackers Exploit Snowflake Data, Targeting Major Firms

  Hackers who stole terabytes of data from Ticketmaster and other customers of the cloud storage firm Snowflake claim they gained access to some Snowflake accounts by breaching a Belarusian-founded contractor working with those customers. Approximately 165 customer accounts were…

The Growing Threat of Data Breaches to Australian Businesses

  Data breaches are now a significant threat to Australian businesses, posing the risk of “irreversible brand damage.” A cybersecurity expert from Fortinet, a global leader in the field, has raised alarms about cybercriminals increasingly targeting the nation’s critical infrastructure.…

When Legit Downloads Go Rogue: The Oyster Backdoor Story

Researchers from Rapid7 recently uncovered a sophisticated malvertising campaign that exploits unsuspecting users searching for popular software downloads. This campaign specifically targets users seeking legitimate applications like Google Chrome and Microsoft Teams, leveraging fake software installers to distribute the Oyster…

Hill Briefing on Encryption Canceled Suddenly by FBI

  Based on emails reviewed by POLITICO, the FBI abruptly cancelled two large Hill briefings scheduled for this week about encryption, without telling staffers who were invited. A two-day virtual briefing on “warrant-proof encryption” was scheduled for congressional staff last…

AI Technique Combines Programming and Language

  Researchers from MIT and several other institutions have introduced an innovative technique that enhances the problem-solving capabilities of large language models by integrating programming and natural language. This new method, termed natural language embedded programs (NLEPs), significantly improves the…

Ransomware Attackers Are Weaponizing PHP Flaw to Infect Web Servers

  Security researchers revealed that ransomware attackers have swiftly turned a simple-to-exploit PHP programming language vulnerability—which allows malicious code to be executed on web servers—into a weapon.  As of Thursday last week, Censys’ Internet scans had found 1,000 servers infected…

Identity Verification Becomes Crucial in the Digital Age

  In the rapidly changing digital landscape, identity verification is emerging as a critical concern. As Web3 places increasing emphasis on data ownership and trust, authenticating one’s identity is becoming a major challenge. Recently, Roundtable anchor Rob Nelson and Ralf…

Researchers Find ChatGPT’s Latest Bot Behaves Like Humans

  A team led by Matthew Jackson, the William D. Eberle Professor of Economics in the Stanford School of Humanities and Sciences, used psychology and behavioural economics tools to characterise the personality and behaviour of ChatGPT’s popular AI-driven bots in…

New Malware Campaign Exploits Windows Search to Spread

  A new and intricate alware campaign has been discovered by Trustwave SpiderLabs, leveraging the Windows search feature embedded in HTML code to spread malicious software. The attack begins with a phishing email containing an HTML attachment disguised as a…

Data in Danger: Analyzing the Alleged Data Broker Breach

The protection of personal data is of utmost importance. A recent report has brought to public attention an alleged significant data breach involving a U.S. data broker. This incident, which purportedly affects billions of records and over 300 million people,…

STR RAT: A Persistent Remote Access Trojan

  The STR RAT is a remote access trojan (RAT) written in Java, first detected in 2020. Like other RATs, it allows threat actors full control of an infected machine. STR RAT is capable of keylogging, credential theft, and deploying…

Apple Introduces Exclusive AI Features for Newest Devices

  Apple’s WWDC 2023 brought exciting news for tech enthusiasts: the introduction of Apple Intelligence, a groundbreaking AI system. However, if you’re eager to try out these new features, you’ll need the latest devices. Apple Intelligence features will be exclusively…

Securing a Dynamic World: The Future of Cybersecurity Operations

Cybersecurity has become a critical concern for organizations worldwide. As threats evolve and technology advances, the role of cybersecurity operations is undergoing significant transformation. Let’s delve into the key aspects of this evolution.  Today’s changing cyber threat landscape presents a…

Ransomware Attackers Target Canada’s Largest School Board

  The Toronto District School Board (TDSB) has issued a warning following a ransomware attack on its software testing environment and is currently investigating whether any personal data was compromised.  TDSB is Canada’s largest school board and the fourth largest…

AI vs. Developers: A Modern-Day Conundrum

  According to many experts, large language models and artificial intelligence are dramatically simplifying the process of creating quality software, and this is a perspective that is being touted a lot. It has even been predicted that this trend could…

Here’s How to Solve Top Challenges in Data Storage

  Data volumes are not only expanding, but also accelerating and diversifying. According to recent IDG research, data professionals state that data volumes are rising by 63 percent every month on average in their organisations. The majority of these organisations…

Tech Giants Aid Rural Hospitals in Cybersecurity Battle

  Microsoft and Google have announced initiatives to offer free or discounted cybersecurity services to rural hospitals across the United States, aiming to reduce their vulnerability to cyberattacks that have disrupted patient care and threatened lives, according to a joint…

AI Brings A New Era of Cyber Threats – Are We Ready?

  Cyberattacks are becoming alarmingly frequent, with a new attack occurring approximately every 39 seconds. These attacks, ranging from phishing schemes to ransomware, have devastating impacts on businesses worldwide. The cost of cybercrime is projected to hit $9.5 trillion in…

Enhancing Home Security with Advanced Technology

  With global tensions on the rise, ensuring your home security system is up to par is a wise decision. Advances in science and technology have provided a variety of effective options, with even more innovations on the horizon. Smart…

New Extortion Scheme Targets GitHub Repositories

  A new wave of cyberattacks is targeting GitHub repositories, wiping their contents, and demanding ransom from victims. This alarming campaign, first identified on Wednesday by Germán Fernández, a security researcher at Chilean cybersecurity firm CronUp, is being orchestrated by…

Microsoft Revises AI Feature After Privacy Concerns

  Microsoft is making changes to a controversial feature announced for its new range of AI-powered PCs after it was flagged as a potential “privacy nightmare.” The “Recall” feature for Copilot+ was initially introduced as a way to enhance user…

New macOS Malware Threat: What Apple Users Need to Know

  Recently, the Moonlock Lab cybersecurity team discovered a macOS malware strain that can easily evade detection, posing a significant threat to users’ data privacy and security. The infection chain for this malware begins when a Mac user visits a…