The integration of Artificial Intelligence (AI) in the Information Technology (IT) industry is poised to bring about rapid and profound changes. As businesses seek to stay ahead in an increasingly competitive landscape, the adoption of AI technologies promises to revolutionize…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Meta Extends Ad-Free Facebook and Instagram Premium Access Worldwide
With the introduction of its ad-free subscription service, Meta, the parent company of Facebook and Instagram, offers European users the chance to enjoy their favourite social platforms without being bombarded with advertisements. The recent ruling of the EU’s Court of…
DarkGate Using its New Variant MSI to Harm Your System
In the last month, the Netskope Threat Labs team noticed a big increase in malware being spread through SharePoint. This happened because some cyber attackers used Microsoft Teams and SharePoint to trick people into downloading the malware, called DarkGate.…
Atlassian Warns of Critical Confluence Vulnerability Resulting in Data Loss
Just weeks after state-backed hackers targeted its products, Australian software giant Atlassian has warned of a critical security flaw that could result in “significant data loss” for customers. The company issued an advisory this week urging clients to patch…
American Airlines Pilot Union Hit with Ransomware
On Monday, the Allied Pilots Association (APA), the preeminent labour union representing 15,000 dedicated pilots of American Airlines, revealed that its systems fell victim to a ransomware attack. Established in 1963, the APA stands as the foremost independent trade union…
Phone Scammers Evolve: AI-Powered Voice Mimicry Poses New Threat
In an ever-evolving battle against phone scammers and robocalls, a growing concern is the use of artificial intelligence (AI) to mimic victims’ voices, making these scams even more convincing. While efforts have been made to curb scam calls, it’s…
SEC Sets New Disclosure Rules: Read How It Will Revolutionize Organization Cybersecurity
SEC mandates cybersecurity reporting for companies The Securities and Exchange Commission’s (SEC) latest set of rules on cybersecurity reporting for publicly traded organisation can be understood in two ways. One, as another generic regulatory formality piling on the companies, or…
PUMA Network: Unmasking a Cybercrime Empire
A massive cybercrime URL shortening service known as “Prolific Puma” has been uncovered by security researchers at Infoblox. The service has been used to deliver phishing attacks, scams, and malware for at least four years, and has registered thousands of…
Hacker Threat: Israeli Police Advise Citizens not to Answer Unknown Calls
The Israeli Police and the National Cyber Directorate have advised citizens against answering unexpected WhatsApp calls from abroad. This is because it may be a sign of an attempt to hack a phone. Authorities claim that a high volume…
SEC’s Legal Action Against SolarWinds and CISO Creates Uncertainty in Cybersecurity
In the lawsuit, the plaintiffs allege that CISO Timothy Brown, who was in charge of managing the company’s software supply chain at the time of the massive cyberattack, has failed to disclose critical information regarding the attack. Several government…
The FTC’s new Amendment Requires Financial Institutions to Report Security Breaches Within 30 Days
The Federal Trade Commission has recently enacted an amendment that mandates non-banking entities to notify the Federal Trade Commission of specific data breaches along with other security incidents. This mandate requires the creation, execution, and upkeep of an extensive security…
GM Cruise Halts Driverless Operations
General Motors’ Cruise unit has suspended all driverless operations following a recent ban in California, halting their ambitious plans for a nationwide robotaxi service. The decision comes in response to a regulatory setback in California, a state known for its…
Uber’s Costly Mistake: AUS$412,500 Fine for Spam Emails in Australia
There are many services offered by Uber Technologies, Inc., commonly known as Uber, which is a multinational company that offers a wide array of services, like ride-hailing, food delivery, and freight transportation, to its customers. Founded in California, the…
Prez Biden Signs AI Executive Order for Monitoring AI Policies
On November 2, US President Joe Biden signed a new comprehensive executive order detailing intentions for business control and governmental monitoring of artificial intelligence. The legislation, released on October 30, aims at addressing several widespread issues in regard to privacy…
Citrix Bleed Bug Delivers Sharp Blow: Vulnerability is Now Under “Mass Exploitation”
Citrix Bleed Bug: A Critical Vulnerability in Widespread Use Despite the fact that a patch has been available for three weeks, ransomware hackers are exploiting a vulnerability that allows attackers to bypass multifactor authentication and access enterprise networks using Citrix…
Hackers for Hire: Navigating the Dark Web, Penetration Tests, and More
As the digital landscape undergoes transformation, it is imperative for organizations to remain vigilant in the face of a persistent threat from for-hire hackers. To safeguard their networks, customers, and financial stability, organizations must comprehend the risks associated with…
Caesars Takes Action After Cyberattack on Loyalty Program Data
Caesars Entertainment, a leading resort chain with ownership of more than 50 hotels and casinos worldwide, officially disclosed a cyberattack on their systems. The U.S. Securities and Exchange Commission received notification on Thursday, indicating that the company has experienced…
Five Markers that Your Phone is Being Spied on or Has Been Compromised
A notification stating that “State-sponsored attackers may be targeting your iPhone” was received by a number of leaders of India’s opposition parties, including the Indian National Congress, Trinamool Congress, and Shiv Sena, earlier this week. A commotion and discussion…
North Korean Links: Lazarus Group Strikes Again. This time via Unpatched Software Flaws
North Korean hackers spreading malware through legit software North Korean hackers are spreading malware by exploiting known flaws in genuine software. The Lazarus group targets a version of an undisclosed software product for which vulnerabilities have been documented and solutions…
AI ‘Hypnotizing’ for Rule bypass and LLM Security
In recent years, large language models (LLMs) have risen to prominence in the field, capturing widespread attention. However, this development prompts crucial inquiries regarding their security and susceptibility to response manipulation. This article aims to explore the security vulnerabilities linked…