Anonymous Sudan has launched a distributed denial-of-service (DDoS) attack against Telegram in response to the messaging platform’s decision to deactivate its principal account, according to threat intelligence firm SOCRadar. Anonymous Sudan, claiming to be a hacktivist group motivated by…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Google Chrome Launches ‘Privacy Sandbox’ to Phase Out Tracking Cookies
Google has officially commenced the implementation of Privacy Sandbox within its Chrome web browser for a majority of its users. This move comes nearly four months after the initial announcement of the plan. “We believe it is vital to…
The Cybersecurity Crisis: Dating App “Coffee Meets Bagel (CMB)” Hacked again!
In an increasingly digital world, the threat of cyber-attacks is more prevalent than ever. This article delves into an alarming case of cybersecurity breach involving a popular dating platform, which led to over 620 million user accounts being compromised…
Chrome’s Invasive New Tracking Sparks Need for a New Browser
The importance of privacy issues has increased in the digital era, leading people to look for browsers that prioritize data protection. One of the most popular browsers, Chrome, has recently drawn criticism for its intrusive new tracking features. Users are…
AP Stylebook Data Breach: Associated Press Warns That The Breach Led to Phishing Attacks
The Associated Press has warned of what potentially is a data breach in AP Stylebook servers, impacting their customers. Reportedly, the data has been used by the threat actors in launching their targeted phishing attacks. The AP Stylebook is a…
Behind the Wheel, Under Surveillance: The Privacy Risks of Modern Cars
The auto industry is failing to give drivers control over their data privacy, according to researchers warning that modern cars are “wiretaps on wheels.” An analysis published on Wednesday revealed that in an era when driving is becoming increasingly…
Here’s How Hackers Sell and Trade Your Data in the Metaverse
Your data might be lost in the metaverse, a place where reality takes on new forms and lovely virtual landscapes arise. Imagine yourself in a bustling digital marketplace, surrounded by avatars dressed in the latest digital attire. A secret…
Unveiling the DarkGate Malware Phishing Attack on Microsoft Teams
Cybercriminals have focused on Microsoft Teams, a widely used tool for remote collaboration, in a recent round of cyber assaults. This well-known tool is being used by a crafty phishing campaign to spread the dangerous DarkGate ransomware. This cunning scheme…
Vishing Scams: Here’s How to Spot & Defend Against Them
Vishing (voice or VoIP phishing) is a sort of cyber attack that uses voice and telephony technologies to deceive targeted persons into disclosing sensitive data to unauthorized entities. The information could be personal, such as a Social Security number…
Understanding HTTPS Spoofing: A Deceptive Online Threat
Online security is no longer a luxury but an absolute necessity in today’s digital age. For the average internet user, spotting the reassuring green padlock symbol and the “https://” prefix in their browser’s address bar has become a common…
Cisco: Leadership Awareness Fuels the Booming Identity Market
The latest research conducted by Cisco Investments with venture capital firms reveals that most CISOs believe complexity in tools, number of solutions and technical glossaries are among the many barriers to zero trust. It has been observed that around 85%…
Online Hackers Target Microsoft Teams to Propagate DarkGate Malware
Microsoft Teams conversations are being abused by a new phishing attempt to distribute malicious attachments that install the DarkGate Loader malware. When two external Office 365 accounts were found to be hijacked and were detected sending Microsoft Teams phishing…
Blockchain’s Role in Reinventing ATM Security: A Game-Changer in Banking
Blockchain technology allows for the creation of a structured data structure that is intrinsically secure. A cryptocurrency is based on the principles of cryptography, decentralization, and consensus, which is a mechanism that ensures that transactions can be trusted. Data…
Microsoft and Google’s Approach to Replace Obsolete TLS Protocols
Tech behemoths Microsoft and Google have teamed up to phase out outmoded TLS (Transport Layer Security) protocols in a decisive drive to strengthen online security. TLS protocols are essential for protecting internet connections because they guarantee that data is kept…
New York’s Geofencing Ban: A Game Changer for Advertisers
The New Law on Geofencing New York has recently passed a new provision in its state budget that prohibits advertisers from geofencing healthcare facilities. This law, which was passed in May, has made it increasingly difficult for advertisers who want…
Mirai Botnet Variant ‘Pandora’ Hijacks Android TVs
Pandora, a variant of the Mirai botnet, has been identified targeting budget-friendly Android-based television sets and TV boxes. It utilizes these devices as part of a botnet to execute distributed denial-of-service (DDoS) attacks. Mirai is a type of harmful…
Johnson & Johnson Reveals: IBM Data Breach Compromised Customer Data
Johnson & Johnson Health Care Systems (Janssen) recently informed their CarePath customers of a third-party data breach involving IBM, that has resulted in the compromise of their sensitive information. IBM is a technology service provider for Janssen. In particular, it…
Elon Musk Claims he Withheld Starlink to Deny Attack on Russian Navy Fleet
Elon Musk claimed that he turned down a proposal from the Ukrainian government to turn on his Starlink satellite network near Sevastopol, the port city of Crimea, last year in order to support an assault on the Russian navy…
From Vulnerabilities to Vigilance: Addressing Software Supply Chain Attacks
Cybersecurity experts have long been concerned about the possibility of supply chain attacks mainly due to the chain reaction that can be triggered by just one attack on one supplier, which can lead to a compromise of the entire…
LastPass Security Breach Linked to Series of Crypto Heists, Say Experts
Security experts allege that some of the LastPass password vaults, which were stolen in a security breach towards the end of 2022, have now been successfully breached, leading to a series of substantial cryptocurrency thefts. According to cybersecurity blogger…