Some of the most popular websites in the country have received warnings from Britain’s data protection regulator that they could face penalties if they continue to force users to accept advertising cookies. The top websites in the UK were…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Securing Reality: The Role of Strict Laws and Digital Literacy in the Fight Against Deepfakes
The Ministry of Electronics and Information Technology, in response to the growing concern in India regarding deepfakes, which are the manipulation of appearances for deceptive purposes using artificial intelligence, has issued an advisory to social media intermediaries, requesting they…
APT29 Strikes: WinRAR Exploits in Embassy Cyber Attacks
During the latest wave of cyberattacks, foreign embassies have been the target of a malicious group known as APT29. They have employed a highly complex attack method that takes advantage of weaknesses in WinRAR, a widely used file compression software.…
LummaC2 Malware Introduces Innovative Anti-Sandbox Technique Utilizing Trigonometry
The LummaC2 malware, also known as Lumma Stealer, has introduced a novel anti-sandbox technique that utilizes trigonometry to avoid detection and steal valuable information from infected hosts. Outpost24 security researcher Alberto Marín highlighted this method, stating that it aims…
After Qakbot, DarkGate and Pikabot Emerge as the New Notorious Malware
The PikaBot malware has been added to the already complicated phishing campaign that is transmitting the darkGate malware infections, making it the most sophisticated campaign since the Qakbot operation was taken down. The phishing email campaign began in September 2023,…
Guarding the Gate: How to Thwart Initial Access Brokers’ Intrusions
The term “Access-as-a-service” (AaaS) refers to a new business model in the underground world of cybercrime in which threat actors sell one-time methods to gain access to networks to infiltrate networks for as little as one dollar. One group…
Russian Hackers Target Ukraine’s Fighter Jet Supplier
A cyberattack on a Ukrainian fighter aircraft supplier has been reported, raising concerns about whether cybersecurity risks in the region are increasing. The incident—attributed to Russian hackers—highlights the need to have robust cyber defense strategies in a world where…
What are Hardware Security Keys, and is it Safe to Use Them?
Have you ever witnessed someone use a tiny device to log in by tapping it or plugging it into a USB port? Have you ever wondered why they require such things? The most reliable form of authentication that is…
Google CEO Warns of Potential Security Risks Associated with Sideloading Apps
In recent years, sideloading apps, the practice of installing apps from sources outside of official app stores, has gained significant traction. While Android has always embraced this openness, Apple is now facing pressure to follow suit. This shift in…
Several K-12 Schools and Colleges Suffers Outage Due to Cyberattack
A number of K-12 schools, colleges and universities are experiencing severe technology failures this week owing to cyberattacks. According to a spokesperson for North Carolina Central University, the school had received a warning of the attack on its systems on…
The Dark Web: A Hidden Menace for Businesses
In recent months, the Indian capital’s remote region of Nuh has garnered unwanted attention for its transformation into a cybercrime hub, mirroring the notorious Jamtara region. With over 28,000 cybercrime cases spearheaded by unemployed social engineers, Nuh has firmly…
FBI Reveals Scattered Spider’s Alliance with Notorious Ransomware Outfit
In an advisory released last weekend, the FBI and the Cybersecurity and Infrastructure Security Agency revealed further details regarding the cybercrime outfit Scattered Spider and its link with the notorious ALPHV/BlackCat ransomware operation. Scattered Spider, who goes by multiple…
Truepill Data Breach: Navigating Healthcare’s Digital Security Crisis
The recent Truepill data breach has generated significant questions regarding the security of sensitive patient data and the vulnerability of digital platforms in the rapidly changing field of digital healthcare. The breach, reported by TechCrunch on November 18, 2023, highlights…
Privacy Act Compliance Staggered, NASSCOM Seeks Collaboration
During its representation to the government, Nasscom, the leading industry body in the sector, suggested that the Ministry of Electronics and Information Technology need to consider different deadlines for compliance with the upcoming rules on data protection and protection…
Microsoft Announces Launch of Customizable AI-Powered Digital Avatar
Microsoft has recently announced the launch of its text-to-speech avatars on its Azure AI platform, which will enable businesses to design customized digital humans driven by natural language AI. With the new avatars, word input may be used to initiate…
Apple Adopts Universal Texting Standard
Apple has made a significant move away from the iMessage exclusivity that has dominated its environment for more than ten years and toward the adoption of a universal texting standard. This action is anticipated to close the messaging gap between…
Maximizing Data Security: Why Simply Factory Resetting Your Android Phone Won’t Suffice Before Selling
In today’s tech landscape, concerns about smartphone data privacy are increasingly prevalent. While many may not possess highly sensitive information, the thought of unauthorized access to personal data remains unsettling. Despite following common safety practices online, uncertainties persist…
Google’s Bard AI Chatbot is now Accessible to Teenagers
Google is making Bard, its conversational AI tool, available to teens in a majority of nations across the globe. Teens who are of legal age to manage their own Google Account will be able to use the chatbot in…
Google Eases Restrictions: Teens Navigate Bard with Guardrails
It has been announced that Google is planning on allowing teens in most countries to use a chatbot called Bard which is based on artificial intelligence and possesses some guardrails. It has been announced that on Thursday, Google will…
AI/ML Tools Uncovered with 12+ Vulnerabilities Open to Exploitation
Since August 2023, individuals on the Huntr bug bounty platform dedicated to artificial intelligence (AI) and machine learning (ML) have exposed more than a dozen vulnerabilities that jeopardize AI/ML models, leading to potential system takeovers and theft of sensitive…