Described as the biggest data breach ever, a big security mistake has apparently leaked the personal info of millions of people around the world. CloudSEK, an Indian cybersecurity company, brought attention to the breach, exposing extensive sensitive data, including names,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Hundreds of Network Operators’ Credentials Compromised on Dark Web
Leaked creds of RIPE, APNIC, AFRINIC, and LACNIC are available on the Dark Web After doing a comprehensive scan of the Dark Web, Resecurity discovered that info stealer infections had compromised over 1,572 customers of RIPE, the Asia-Pacific Network Information Centre…
AI Poison Pill App Nightshade Received 250K Downloads in Five Days
Shortly after its January release, the AI copyright infringement tool Nightshade exceeded the expectations of its developers at the University of Chicago’s computer science department, with 250,000 downloads. With Nightshade, artists can avert AI models from using their artwork…
Huber Heights Under Siege: Ransomware Attack Hits 5,000+ Residents
It has been reported in the Dayton suburb of Huber Heights, Ohio this week that the city’s computer system was disabled by a ransomware attack last November, and new details have emerged about that attack. The city manager, Rick…
The Dual Landscape of LLMs: Open vs. Closed Source
AI has emerged as a transformative force, reshaping industries, influencing decision-making processes, and fundamentally altering how we interact with the world. The field of natural language processing and artificial intelligence has undergone a groundbreaking shift with the introduction of…
Privacy Watchdog Fines Italy’s Trento City for Privacy Breaches in Use of AI
Italy’s privacy watchdog has recently fined the northern city of Trento since they failed to keep up with the data protection guidelines in how they used artificial intelligence (AI) for street surveillance projects. Trento was the first local administration in…
Cyberattack on Bucks County’s Emergency System
Bucks County is in a compromising position as a digital ambush has transpired. About a week ago, the computer-aided emergency dispatch system, the backbone of quick and efficient emergency responses, fell victim to a cyberattack. Picture it like the…
Mercedes-Benz Accidentally Leaked Private Data, Including Source Code
Mercedes-Benz unintentionally leaked a trove of internal data by leaving an obscure key online that gave “unrestricted access” to the company’s source code, according to the security research team that unearthed it. TechCrunch was notified of the exposure by…
Apple’s Shield Shattered: The Critical Flaw in iPhone Theft Defense
Several weeks ago, Joanna Stern from the Wall Street Journal reported that an increasing number of iPhone thieves have been stealing their devices from restaurants and bars and that one criminal was earning up to $300,000. During these attacks,…
Decrypting the Threat: Telegram’s Dark Markets and the Growing Menace of Phishing Networks
In the last few years social media has gradually become a one stop shop for scammers. With easily available information, scammers as able to hand pick their target and create a customized scam for them. Telegram is one such…
AlphaCodium: Your New Coding Assistant
Meet AlphaCodium, the latest creation from CodiumAI, taking AI code generation to the next level, leaving Google’s AlphaCode in its digital dust. Forget complicated terms; AlphaCodium simply means smarter, more accurate coding. Instead of following a set script, it…
The Role of Biometrics in a Zero Trust Landscape
The illicit trade of biometric data, sourced from manipulated selfies, fraudulent passports, and cyberattacks on data repositories containing fingerprints to DNA information, has been thriving on the dark web. Despite their untraceability, these compromised biometrics empower attackers to access…
Cyber Attacks by North Korean Hackers on Cryptocurrency Platforms Reach $1 Billion in 2023
A recent study by Chainalysis, a blockchain analytics firm, has revealed a surge in cyber attacks on cryptocurrency platforms linked to North Korea. The data, covering the period from 2016 to 2023, indicates that 20 crypto platforms were targeted…
Data Collaboration Platforms Ruling the Charts in Unlocking Sophisticated AI Models
Large Language Models (LLMs) have opened up exciting new possibilities for organisations in the field of artificial intelligence (AI), including enhanced decision-making, streamlined processes, and ground-breaking innovation. Leading companies like Zendesk, Slack, Goldman Sachs, GitHub, and Unilever have used…
Synthetic Data: How Does the ‘Fake’ Data Help Healthcare Sector?
As the health care industry globally continues to collapse from staff-shortage, AI is being hailed as the public and private sector’s salvation. With its capacity to learn and perform jobs like tumor detection from scans, the technology has the potential…
NSA Confession: Unlawful Surveillance on Americans Exposed
Despite attempts to conceal details of arrangements between United States spy agencies and private companies that track the location of Americans using their cell phones, United States officials fought to conceal the details. Normally, law enforcement and intelligence agencies…
23andMe Faces Privacy Breach
Recently, 23andMe, a prominent genetic testing provider, finds itself grappling with a substantial security breach spanning five months, from April 29 to September 27. This breach has exposed the health reports and raw genotype data of affected customers, shedding…
‘Mother of All Breaches’: 26 Billion Personal Records and Passwords Leaked
Even after being significantly vigilant while using online tools, a user’s personal and professional information could still be exposed to a data breach. In certain cases, hackers tend to compile credentials and information stolen in past breaches to make their…
AI Image Generation Breakthrough Predicted to Trigger Surge in Deepfakes
A recent publication by the InstantX team in Beijing introduces a novel AI image generation method named InstantID. This technology boasts the capability to swiftly identify individuals and generate new images based on a single reference image. Despite being…
Pegasus Spyware Targets Two Journalists in Togo: RSF
Reporters Without Borders (RSF) disclosed that two journalists in Togo had spyware on their phones that looked similar to the potent Pegasus surveillance tool used by the NSO group. RSF reports that the journalists are accused of defaming a…