AI-Generated deep fakes on the rise A serious threat to the reliability of identity verification and authentication systems is the emergence of AI-generated deepfakes that attack face biometric systems. The prediction by Gartner, Inc. that by 2026, 30% of businesses…
Category: CySecurity News – Latest Information Security and Hacking Incidents
‘Leaky Vessels’ Cloud Flaws Enable Container Escapes Worldwide
Researchers discovered a collection of four vulnerabilities in container engine components dubbed “Leaky Vessels,” three of which allow the perpetrators to escape out of containers and perform malicious operations on the host system. One of the vulnerabilities, CVE-2024-21626, affects…
Northern Light Health Ensures Patient Record Security Following Weekend Cyberattack
After some of Northern Light Health’s computer servers were compromised over the weekend, electronic health records for patients have been restored online. As a result of detecting abnormalities on a few servers, the healthcare network took off some of…
Facebook’s Two Decades: Four Transformative Impacts on the World
As Facebook celebrates its 20th anniversary, it’s a moment to reflect on the profound impact the platform has had on society. From revolutionizing social media to sparking privacy debates and reshaping political landscapes, Facebook, now under the umbrella of…
Binance Data Breach Sparks Concerns: Dark Web Sale Rumors Surface
In a surprising development, cryptocurrency giant Binance finds itself facing the looming threat of a potential data breach, as claims circulate on the dark web suggesting the sale of sensitive user information. This occurrence has sent shockwaves throughout the…
EU Takes a Leap Forward with Cybersecurity Certification Scheme
What is the EU cybersecurity certification scheme? The EUCC, or EU cybersecurity certification scheme, has an implementing rule that was adopted by the European Commission. The result is consistent with the cybersecurity certification methodology under consideration on EUCC, which was…
Watch Out for Phone Scams
At the extent of people’s gullibility, there is an increasing cybersecurity threat known as “vishing” which has become a cause for concern, impacting unsuspecting individuals and even businesses. Vishing, short for voice phishing, involves scammers attempting to trick people…
Telegram Emerges as Hub for Cybercrime, Phishing Attacks as Cheap as $230
Cybersecurity experts raise alarms as Telegram becomes a hotspot for cybercrime, fueling the rise of phishing attacks. This trend facilitates mass assaults at a shockingly low cost, highlighting the “democratization” of cyber threats. In a recent development, cybersecurity researchers shed…
Elite Supplements: The Latest Aussie Business to Fall Victim to a Cyber Attack
Consumers of a popular Australian supplement brand are being alerted about the possibility that the company’s hack exposed their personal data. In an email obtained by NCA NewsWire, Elite Supplements notified clients that the business had experienced a cyberattack…
US Authorities Identify Iranian Connection in Recent Cybersecurity Breaches
It has been announced that six Iranian officials have been sanctioned by the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC), the Iranian government organization responsible for the series of malicious cyber activities directed against critical infrastructure…
Security Breach at AnyDesk: Production Servers Hacked, Password Reset
AnyDesk, a widely used remote desktop application, is currently grappling with a significant security breach that has raised alarm among its user base. The company recently disclosed that malicious actors successfully infiltrated its production servers, gaining unauthorized access to…
Phone Scam Siphons Over $200,000 from Bank Account Holder
A bank account holder recounts losing over $200,000 due to phone accessibility issues. Heidi Diamond became a victim of a cyber scam known as sim-swapping, resulting in the depletion of her bank account. Sim-swapping involves fraudsters deceiving cell phone companies…
Cybersecurity Crisis on US Healthcare Sector Children Hospital in Alarms
In a recent and alarming development, Lurie Children’s Hospital, a distinguished pediatric care facility in Chicago, has been forced to disconnect its network due to a pressing “cybersecurity matter.” This precautionary step is a response to the escalating cyber…
Leaked Data from Binance Taken Down
One of the biggest cryptocurrency exchanges in the world’s security has come under scrutiny following the recent disclosure of private information from Binance on GitHub. Several documents, including code, internal passwords, and architecture diagrams, were purportedly released by an account…
Interpol’s Operation ‘Synergia’ Secures Numerous Cybercriminal Arrests, Disrupts Global C2s
An international operation aimed at countering the rising threat of phishing, banking malware, and ransomware attacks globally has successfully dismantled command-and-control (C2) servers across Africa and the Middle East. Led by Interpol, the Synergia operation engaged 60 law enforcement…
Cloudflare Faces Cybersecurity Breach in Okta Supply-Chain Attack
Cloudflare, a prominent Internet security and DDoS protection company, recently fell victim to a cyberattack linked to the widespread Okta supply-chain campaign last fall. The breach, affecting Cloudflare’s Atlassian Bitbucket, Confluence, and Jira platforms, commenced on Thanksgiving Day. Cloudflare, in…
RBI Issues Warning Against Scam Via KYC trick
On February 2, 2024, the Reserve Bank of India (RBI) reiterated its prior warning to the public, offering further suggestions in response to a rising tide of scams involving Know Your Customer (KYC) updates. RBI amplified the cautionary tips…
Ex-CIA Developer Faces 40-Year Sentence for Leaking Classified Data to WikiLeaks
In a multi-charged case that involved the disclosure of classified documents to WikiLeaks, Joshua A Schulte, a former CIA software engineer, was sentenced to 40 years for multiple counts of espionage and computer hacking, as well as one count…
Ukraine Faces PurpleFox Malware Crisis: Unraveling the Ongoing Battle and Countermeasures
In a disturbing turn of events, the insidious PurpleFox malware has recently unleashed a wave of cyber havoc in Ukraine, infiltrating and compromising thousands of computers. This highly adaptable and elusive malware variant has sent shockwaves through the cybersecurity…
Novel Crytpojacking Campaign is Targeting Docker APIs Across the Internet
Cado security researchers recently identified a sophisticated cryptojacking campaign that exploits exposed Docker API endpoints over the internet. The campaign, called “Commando Cat”, has been operating since early 2024, the researchers noted, claiming that this was the second such…