The Toronto District School Board (TDSB) has issued a warning following a ransomware attack on its software testing environment and is currently investigating whether any personal data was compromised. TDSB is Canada’s largest school board and the fourth largest…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Dutch Intelligence Warns of Extensive Chinese Cyber-Espionage Campaign
The Dutch Military Intelligence and Security Service (MIVD) has issued a warning about the far-reaching consequences of a Chinese cyber-espionage operation disclosed earlier this year. According to the MIVD, the scale of this campaign is “much larger than previously…
AI vs. Developers: A Modern-Day Conundrum
According to many experts, large language models and artificial intelligence are dramatically simplifying the process of creating quality software, and this is a perspective that is being touted a lot. It has even been predicted that this trend could…
AI Could Turn the Next Recession into a Major Economic Crisis, Warns IMF
In a recent speech at an AI summit in Switzerland, IMF First Deputy Managing Director Gita Gopinath cautioned that while artificial intelligence (AI) offers numerous benefits, it also poses grave risks that could exacerbate economic downturns. Gopinath emphasised that…
Here’s How to Solve Top Challenges in Data Storage
Data volumes are not only expanding, but also accelerating and diversifying. According to recent IDG research, data professionals state that data volumes are rising by 63 percent every month on average in their organisations. The majority of these organisations…
How Fear Tactics Led to a Pune Woman’s Financial Ruin: Insights into Cyber Fraud
A 67-year-old Pune woman lost Rs 1.6 crore of her life savings to cyber crooks after receiving a call claiming that her phone number was used to send vulgar texts and that Mumbai police had arrested her. She was issued…
From Civilians to Cyber Warriors: China’s MCF Program Ignites a Western Typhoon
Cyber offensives by China against foreign targets are of concern to the international community because its military and civilian technological institutions work together to achieve greater effectiveness thanks to the combination of civilian and military technology services. In democratic…
Signs Your Home Network Has Been Hacked and How to Protect Yourself
While many are aware of the risks associated with public Wi-Fi, fewer realize that home networks are also vulnerable to cyberattacks. Hackers can infiltrate home networks to access sensitive information like bank details, private conversations, and personal photos. Here…
Tech Giants Aid Rural Hospitals in Cybersecurity Battle
Microsoft and Google have announced initiatives to offer free or discounted cybersecurity services to rural hospitals across the United States, aiming to reduce their vulnerability to cyberattacks that have disrupted patient care and threatened lives, according to a joint…
Israeli Researchers Expose Security Flaws in Visual Studio Code Marketplace
A team of Israeli researchers investigated the security of the Visual Studio Code (VSCode) marketplace and managed to “infect” over 100 organizations by embedding risky code into a popular theme, revealing significant vulnerabilities in the system. VSCode, a source code…
Couple’s ₹47.7 Lakh Loss Amid Two-Week Digital Harassment and Arrest
A long time has gone by since Apple announced several new AI-based features at its WWDC developer conference on Monday, as well as partnering with an upstart in generative artificial intelligence called OpenAI to create generative AI. Even though…
Stay Secure: How to Prevent Zero-Click Attacks on Social Platforms
While we have all learned to avoid clicking on suspicious links and be wary of scammers, this week we were reminded that there are some silent threats out there that we should be aware of zero-click assaults. Recent Incidents As…
Building Cyber Resilience in Manufacturing: Key Strategies for Success
In today’s digital landscape, manufacturers face increasing cyber threats that can disrupt operations and compromise sensitive data. Building a culture of cyber resilience is essential to safeguard against these risks. Here are three key strategies manufacturers can implement to…
Chinese Threat Actors Leveraging ‘Noodle RAT’ Backdoor
A backdoor in Executable and Linkable Format (ELF) files used by Chinese hackers has been misidentified as a version of existing malware for years, Trend Micro claimed in a recent analysis. In Noodle RAT: Reviewing the New Backdoor utilised by…
AI Brings A New Era of Cyber Threats – Are We Ready?
Cyberattacks are becoming alarmingly frequent, with a new attack occurring approximately every 39 seconds. These attacks, ranging from phishing schemes to ransomware, have devastating impacts on businesses worldwide. The cost of cybercrime is projected to hit $9.5 trillion in…
Tech Giant Apple Launches Its Own Password Manager App
People with knowledge of the matter claim that Apple Inc. launched a new homegrown app this week called Passwords, with the goal of making it simpler for users to log in to websites and apps. The company introduced the…
Ransomware Attack on Pathology Services Vendor Disrupts NHS Care in London
A ransomware attack on a pathology services vendor earlier this week continues to disrupt patient care, including transplants, blood testing, and other services, at multiple NHS hospitals and primary care facilities in London. The vendor, Synnovis, is struggling to…
Enhancing Home Security with Advanced Technology
With global tensions on the rise, ensuring your home security system is up to par is a wise decision. Advances in science and technology have provided a variety of effective options, with even more innovations on the horizon. Smart…
Apple’s AI Features Demand More Power: Not All iPhones Make the Cut
A large portion of Apple’s developer conference on Monday was devoted to infusing artificial intelligence (AI) technology into its software. Some of the features Apple has rumoured to incorporate are not expected to work on all iPhones. If you…
New Extortion Scheme Targets GitHub Repositories
A new wave of cyberattacks is targeting GitHub repositories, wiping their contents, and demanding ransom from victims. This alarming campaign, first identified on Wednesday by Germán Fernández, a security researcher at Chilean cybersecurity firm CronUp, is being orchestrated by…