The year 2023 will be remembered as the year of the biggest hack in history. A cyberattack that exploited a vulnerability in a popular file transfer software called MOVEit affected millions of people and hundreds of organizations around the world,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Learn How Blockchain Technology Will Revolutionize Passport System in the World
In this era of advanced technology, passports are undergoing a significant transformation. The integration of blockchain technology into passport systems represents a major upgrade. This innovation can potentially enhance safety and efficiency, benefiting travelers and governmental authorities alike. It…
Russian Exiled Journalist Says EU Should Ban Spyware
The editor-in-chief of the independent Russian news site Meduza has urged the European Union to enact a comprehensive ban on spyware, given that spyware has been frequently used to violate human rights. According to Ivan Kolpakov, Meduza’s editor-in-chief based in…
Data Theft Surge: How IT Admins Are Fighting Back
A survey conducted by the company between the 9th and 14th of August 2023 revealed that 55% of IT security decision-makers ranked data theft as their top concern among all IT security concerns they face. There is an interesting…
Unmasking the Surge of Malicious NPM and PyPI Packages
Cyberattacks originating from malicious packages on widely used software repositories like NPM and PyPI have increased significantly recently, as seen in the cybersecurity landscape. Due to the abundance of libraries and modules that they host, these platforms are essential tools…
Navigating AI Anxiety: Balancing Creativity with Technology
In recent years, artificial intelligence (AI) has made remarkable progress, often surpassing human performance in various tasks. A recent study published in Scientific Reports demonstrated that AI programs outperformed the average human in tasks requiring originality, as assessed by…
‘Gay Furry Hackers’ Claim to Have Stolen Nearly 3000 NATO Files
NATO is “actively addressing” various IT security breaches after a hacktivist group claimed it accessed some of the military alliance’s websites once more, this time acquiring over 3,000 files and 9GB of data. When questioned about the suspected intrusion,…
Royal Family’s Official Website Suffers Cyberattack, Following Remarks on Russia
The British Royal Family’s official website is suffering a cyberattack, following UK’s support for Ukraine that went public. A DoS attack, which is brought on by an influx of unnecessary traffic, caused the Royal Family website to be unavailable for…
Top 5 Ways to Encrypt Your Internet Traffic for Enhanced Securit
Encryption involves converting data into a format that is unreadable without the corresponding decryption key, thereby bolstering security and preventing unauthorized access. Securing your internet connection with encryption is indeed possible, but it necessitates a multi-pronged strategy. Here are…
Here’s How You Can Prevent Google Bard From Breaching Your Data Privacy
Impressive new features have been added to Google Bard in its most recent update, enabling the AI chatbot to search through YouTube videos, delve into your Google Docs, and find old Gmail messages. Despite how amazing these developments are,…
Argentina’s Blockchain-based IDs are Transforming Governance
Argentina’s capital, Buenos Aires, is making waves in the realm of digital governance. The city has taken a bold step forward by implementing blockchain technology to issue government IDs. This move represents a significant leap towards secure, efficient, and transparent…
After Attack on Sony, PLAYSATION Released Advisory With 5 Essential Steps
In the aftermath of the reported cyberattack by the hacker group Ransomed.vc on Sony, PLAYSTATION has issued a crucial advisory to its users. Back in 2011, the PlayStation Network experienced a hack that resulted in the compromise of personal information…
MetaEncryptor Rebranded: LostTrust Ransomware Looms as a Fresh Cyber Threat
According to the latest reports, LostTrust is thought to be the rebranding of MetaEncryptor, which is using almost identical data leak sites and encryption methods as MetaEncryptor had used in the past. There was a cyber attack by the…
Seure Messaging Apps: A Safer Alternative to SMS for Enhanced Privacy and Cybersecurity
The Short Messaging Service (SMS) has been a fundamental part of mobile communication since the 1990s when it was introduced on cellular networks globally. Despite the rise of Internet Protocol-based messaging services with the advent of smartphones, SMS continues…
Mobile Privacy Milestone: Gmail Introduces Client-Side Encryption for Android and iOS
Encryption is one of the most important mechanisms for protecting data exchanged between individuals, especially when the information exchange occurs over e-mail and is quite sensitive. As a result, it can be complicated for users to be able to…
Auckland Transport Suffers Another Ransomware Attack, Mobile App and Website Affected
Official website of Auckland Transport has suffered another cyberattack where their mobile app and live departure displays have been compromised. The spokesperson for Auckland Transport (AT) said they believed this attack was is in fact linked to the most recent…
Sony is Hacked, Who is Behind It?
The Ransomed.vc hacking group claimed yesterday that they successfully breached Sony’s servers. They stated they now have a substantial trove of sensitive information covering every aspect of the Japanese corporation’s operations. Nevertheless, several malicious groups are asserting responsibility for this…
The Power and Pitfalls of AI-Driven Retail Security Systems
Theft is a major concern for retailers, and the pandemic has only made it worse. With U.S. merchants bracing for an estimated $100 billion in losses this year, innovative solutions are taking center stage. One such solution is the integration…
Michigan’s Largest Healthcare Facility Confirms Ransomware Attack
One of Michigan’s top healthcare systems acknowledged that it is dealing with a ransomware attack after a notorious hacking group boasted about the incident. A McLaren HealthCare representative stated that the organisation had discovered unusual behaviour on its computer…
FBI Warns of Rising Dual Ransomware Attacks
Dual ransomware attacks have become a new, alarming trend in a digital environment replete with cyber threats. Using this smart strategy, criminals target an institution twice, multiplying the potential harm and raising the ransom demands. The FBI’s most recent findings…
Lawmaker Warns: Meta Chatbots Could Influence Users by ‘Manipulative’ Advertising
Senator Ed Markey has urged Meta to postpone the launch of its new chatbots since they could lead to increased data collection and confuse young users by blurring the line between content and advertisements. The warning letter was issued the…
Smartphone Cameras Can Now Eavesdrop on Conversations: Researchers Extract Sounds From Still Images
A recent study by a group of academic researchers highlights the development of a new method of acoustic eavesdropping using still images captured with smartphone cameras. Acoustic eavesdropping The researchers were able to extract sounds from the images by analyzing…
Cybersecurity Nightmare: A Bank’s Dilemma – To Pay or Risk It All
Schools, hospitals, and other institutions need to take more precautions to prevent cybercrimes from disrupting operations and putting people’s data and safety at risk. As part of a congressional hearing held on Wednesday in Washington, DC, a familiar face…
Johnson Controls Breach Allegedly Leaked Sensitive DHS Data
A king-sized ransomware attack that targeted Johnson Controls forced certain parts of its IT systems to go offline and disrupted some of its operations. The attack on the renowned manufacturer of industrial control systems is reportedly the work of…
AWS Employs MadPot Decoy System to Thwart APTs and Botnets
Amazon Web Services (AWS), a prominent player in cloud computing, has unveiled its internal defense system, MadPot, which has proven effective in luring and trapping malicious activities, including those orchestrated by nation-state-backed Advanced Persistent Threats (APTs) such as Volt…
ChatGPT: Security and Privacy Risks
ChatGPT is a large language model (LLM) from OpenAI that can generate text, translate languages, write different kinds of creative content, and answer your questions in an informative way. It is still under development, but it has already been used…
DDoS Attacks and Its Preventive Measures Organizations Should Adopt
The proliferation of Internet of Things (IoT) devices, now in the billions, coupled with the advancements in network infrastructure and the swift deployment of 5G, necessitates heightened agility from network operators and IT managers in pinpointing and rectifying security flaws. …
Automation Giant Johnson Controls Hit by Ransomware Attack
A big cyber attack hit Johnson Controls International. It locked up a bunch of their computer stuff, including VMware ESXi servers. This caused problems for This has led to disruptions in operations for both the company and its affiliated…
FBI Warns Energy Sectors: Chinese and Russian Hackers may Actively Target Energy Sector
According to a recent notification sent by the FBI to the energy industry changes in the global energy supply will most probably result in an increase in the number of Chinese and Russian hackers attacking significant energy infrastructure. The…
The UK Government Warns Against Using Excel Spreadsheets Due to Multiple Data Breaches
The UK government has issued a warning to people to stop using spreadsheet software such as Microsoft Excel due to multiple data breaches. The Information Commissioner’s Office (ICO) has identified spreadsheets as a major cause for concern in the safety…
Volkswagen Faces Production Standstill in Germany Due to IT Problem
There was a major IT outage at several of Volkswagen Group’s German plants on Thursday, which halted production at most of them and caused the global production network to become unresponsive. This incident has affected VW’s entire group, which…
Cybercriminals Exploit Curiosity in Criminal ChatGPT Variant to Deceive Fellow Crooks
A variant of ChatGPT, originally crafted to aid cybercriminals, has backfired by duping potential buyers seeking access to its services. Earlier in July, PC Mag wrote about WormGPT, a chatbot developed from publicly available source code, which claimed to…
Iranian APT34 Employs Menorah Malware for Covert Operations
In a recent cyber espionage operation, suspected Iranian hackers infected their targets with the newly discovered Menorah Malware, according to a report released on Friday. APT34, also known as OilRig, Cobalt Gypsy, IRN2, and Helix Kitten, is believed to…
AI in Healthcare: Ethical Concerns for a Sustainable Era
Artificial intelligence (AI) is rapidly transforming healthcare, with the potential to revolutionize the way we diagnose, treat, and manage diseases. However, as with any emerging technology, there are also ethical concerns that need to be addressed. AI systems are often…
Darkbeam Data Breach: Billions of Usernames and Credentials Exposed Online
In a massive security breach, digital risk protection company ‘DarkBeam’ has lost billions of its users’ usernames and passwords that are now at high risk of getting leaked online. Apparently, the breach was first discovered on September 18 by Bob…
Russian Zero-Day Vendor Proposes $20 Million for Hacking Android and iPhones
A company specializing in acquiring and trading undisclosed software vulnerabilities, known as zero-day exploits, has announced a substantial increase in payouts to researchers. Operation Zero, based in Russia and established in 2021, revealed on both its Telegram and X…
With ChatGPT, Users Can Now Access Updated Information on The Internet
According to OpenAI Inc., the company that created ChatGPT, a chatbot that provides users with information tailored to their specific needs, the chatbot can now browse the internet for up-to-date information. It has previously been learned with the help…
Here’s Why The New U.S. National Cybersecurity Policy Need Some Minor Tweaks
The majority of Americans who stay up to date on cybersecurity news are aware that the Biden-Harris Administration announced its new “National Cybersecurity Strategy” early this year. Immediately after taking office, this administration had to cope with the consequences…
CIA’s AI Chatbot: A New Tool for Intelligence Gathering
The Central Intelligence Agency (CIA) is building its own AI chatbot, similar to ChatGPT. The program, which is still under development, is designed to help US spies more easily sift through ever-growing troves of information. The chatbot will be trained…
From Text to Multisensory AI: ChatGPT’s Latest Evolution
The OpenAI generative AI bot, ChatGPT, has been updated to enable it to take on a whole new level of capabilities. Artificial intelligence (AI) is a fast, dynamic field that is constantly evolving and moving forward. A newly launched…
ChatGPT Enterprise can Boost AI Adoption by Addressing Business Concerns
With the introduction of ChatGPT in November 2022, interest in AI has seen a massive lift. While it has made people envision the revolutionary potential for enterprises, it has also raised several concerns. Security concerns in regard to adopting AI…
Reddit to Pay Users for Popular Posts
Reddit, the popular social media platform, has announced that it will begin paying users for their posts. The new system, which is still in its early stages, will see users rewarded with cash for posts that are awarded “gold” by…
Reddit to Pay Users for Popular Posts
Reddit, the popular social media platform, has announced that it will begin paying users for their posts. The new system, which is still in its early stages, will see users rewarded with cash for posts that are awarded “gold” by…
Modern GPUs Susceptible to Latest GPU.zip Side-Channel Assault
Researchers from numerous American universities have discovered that nearly every contemporary graphics processing units (GPUs) are vulnerable to a brand-new kind of side-channel attack that could be employed to steal sensitive information. GPU.zip is a novel attack method discovered…
High Security Alert Issued for Apple Devices by India’s CERT-In
The Computer Emergency Response Team (CERT-In), a branch of India’s Ministry of Electronics and Information Technology, has issued a “high” security alert for users of Apple devices. CERT-In’s official website has raised concerns about several vulnerabilities that, if not…
Wi-Fi Eavesdropping: Risks and How to Stay Secure
Imagine finding out that a stranger has been eavesdropping on your private conversations or sensitive information shared with friends or professionals. Therfefore, in the digital realm, Wi-Fi eavesdropping poses a similar threat. To safeguard your online privacy, it’s crucial…
AI Boom: Cybercriminals Winning Early
Artificial intelligence (AI) is ushering in a transformative era across various industries, including the cybersecurity sector. AI is driving innovation in the realm of cyber threats, enabling the creation of increasingly sophisticated attack methods and bolstering the efficiency of existing…
RansomedVC Ransomware Group Claims to Have Breached Sony Network
A Ransomware group called ‘RansomedVC’ claims to have successfully breached the networks of conglomerate and entertainment giant Sony Group Corporation. It is threatening to sell the supposedly stolen data on the dark web. According to a report by Cyber Security…
Demystifying the SEC’s Enhanced Cybersecurity Disclosure Requirements
SEC (Securities and Exchange Commission) issued a regulation recently that imposes a greater level of transparency regarding cybersecurity risk management, governance, and incident reporting and response. There will be compliance requirements for public companies listed on U.S. stock exchanges…
Sony Launches Investigation After Hackers Threaten to Sell Stolen Data on Dark Web
It’s likely that you have seen the prominent headlines about the “Sony data breach 2023” and are wondering whether you are at risk or not. Sony, however, is likewise unaware of what is happening at the moment, but at…
Ethics in the Age of Ransomware: Challenges and Strategies for Negotiation
Recent years have witnessed the rise of ransomware, which has transitioned from mere breaches of sensitive data to sophisticated cyberattacks. In many of these cyberattacks, the target is an organization. The existence of cybercriminals has gone from a speck…
AtlasCross Hackers Target Organizations with Red Cross Phishing Lures
A new hacking group called AtlasCross is targeting organizations with phishing lures impersonating the American Red Cross. The group uses macro-enabled Word documents to deliver backdoor malware to victims’ devices. The phishing emails typically contain a link to a malicious…
RasomedVC: Ransomware Group Claims to Have Breached Sony’s Computer Systems
A newly discovered ransomware group, RansomedVC confirmed to have exploited the computer systems of entertainment giant Sony. Apparently, the announcement was made in a dark web portal. The announcement states that Sony’s data is for sale: “Sony Group Corporation, formerly…
Soaring Cyber Insurance Claims are Hurting firms with Ransomware Attacks and Compromised Emails
Cyber insurance is the world’s fastest-growing insurance market, yet a recent surge in ransomware attacks and business email intrusions has resulted in large losses for cyber insurers and increased premiums. The UK insurance business is under growing scrutiny from…
The Weather Network Faces Ransomware Attack, Faces Data Leak Threat
The Russian hacking group, LockBit, has issued a threat to disclose internal data from Pelmorex, the parent company of The Weather Network, on the dark web. This comes in the wake of a cyberattack that disrupted the operations of…
The Com: Youth Hacking Ring Executing High-profile Cybercrimes
A new threat actor community recently came to light. carrying out some malicious cyberattacks. The online community, labelled as ‘the Com,’ apparently consist of young skilled hackers who are carrying out sophisticated campaigns and high-profile breaches. The hackers, who are…
Gaming Giant Nintendo Embraces Passkeys for Enhanced Security and Convenience
As passkeys continue to be more widely used as authenticators for a variety of sign-in purposes, the path towards a passwordless future is being driven forward. There are reports that this authentication method will be part of Microsoft’s Windows…
Balancing Promise and Pitfalls: Integrating AI into Cybersecurity
In the rapidly evolving digital landscape, the emergence of AI-driven cybersecurity offers a groundbreaking defense against modern cyber threats. However, alongside its celebrated capabilities lies a less-discussed aspect: the hidden costs and challenges associated with Artificial Intelligence (AI). The…
OpenSea Warns API Customers of Third-Party Security Breach
Following a third-party security breach that left them potentially susceptible to malicious actors, OpenSea issued a security warning to specific users, urging them to rotate their API credentials. OpenSea informed impacted customers via email that one of its vendors…
Progressive Holdings Cyberattack: Sensitive Data Stolen
Progressive Holdings, a well-known company that specializes in product leasing, has unexpectedly become the victim of a devastating cyberattack that has resulted in the unauthorized collection of private data. The breach has prompted significant worry among its stakeholders and consumers,…
TA866 Threat Actor: Python Malware Targets Tatar-language Users
Cybersecurity researchers have discovered a new Python malware that has been targeting Tatar language-speaking users. Tatar is a Turkish native language, spoken mostly by Tatars, an ethnic group based in Russia and its neighbouring nations. The Cyble-based Python malware is…
Cyberattack Responses at MGM and Caesars Required Brutal Actions
Twin assaults on MGM Resorts and Caesars Entertainment have offered an unusual perspective at what happens when two comparable organisations, under similar attack by the same threat actor, use divergent incident response techniques. Both parties in this case were…
Accurate Eye Diagnosis, Early Parkinson’s Detection
A revolutionary advancement in the realm of medical diagnostics has seen the emergence of cutting-edge AI tools. This ground-breaking technology identifies a variety of eye disorders with unmatched accuracy and has the potential to transform Parkinson’s disease early detection. According…
Two-Year Chase: FBI Relaunches Search for Cybercriminals
The usage of sophisticated e-mail schemes by hackers to hack into the systems of law firms and public relations companies is on the rise, with hacker groups targeting law firms and public relations companies in an attempt to steal…
Akira Ransomware Adapts to Linux Systems, Incorporates New Tactics and TTPs
Arika ransomware, which initially targeted Windows systems, has evolved significantly since its emergence in March. It has now expanded its scope to include Linux servers, employing a diverse set of tactics, techniques, and procedures (TTPs). A comprehensive report by…
Sandman Hackers: Threat Actors use LuaDream Info-stealing Malware
Threat actors, known as ‘Sandman,’ have recently targeted telecommunication service providers located in the Middle East, Western Europe, and South Asia. Apparently, Sandman has used info-stealing software called ‘LuaDream’ to conduct its operations. The threat actors came to light…
Report: Insider Cybersecurity Threats have Increased 40% Over the Past Four Years
A recent study disclosed that over the past four years, the average cost of an insider cybersecurity attack has increased dramatically by 40%. In addition, the average annual cost of these cyberthreats has increased over the past 12 months,…
Unlocking the Future: Passkeys, the Next Frontier in Online Security
If you’re someone who juggles numerous passwords in your daily life, you’re not alone. Despite the assistance of password managers, the increasing complexity of passwords has become a growing burden for most individuals. Gone are the days of using…
Ransomware Nightmare: FBI and CISA Issue Dire Warning on Menacing New Strain
In a security advisory, the Cybersecurity and Infrastructure Agency (CISA) of the US Department of Homeland Security and the Federal Bureau of Investigation (FBI) have warned organizations about an attack by ransomware called Snatch. A statement from the duo…
India Strengthens Crypto Crime Vigilance with Dark Net Monitor Deployment
India has made a considerable effort to prevent crypto-related criminal activity by establishing a Dark Net monitor. This most recent development demonstrates the government’s dedication to policing the cryptocurrency market and safeguarding individuals from potential risks. India has made a…
DeFi Concerns Rise as Balancer’s Web Front End Battles Ongoing Attack
The Peckshield team said that a frontend compromise of the DeFi protocol by Balancer led to the theft of roughly $240,000 in digital assets. This could indicate that the balancer was involved in the hacking of digital assets. A…
Musk’s Neuralink Seeks People for Human Trials: Brain-Implant Trials may Start Soon
Elon Musk’s startup, Neuralink, that will involve the cutting edge brain-computer interface (BCI) technology has now reached its next stage where they are now recruiting people for the technology’s first ‘human trial.’ The goal will be to link human brains…
TransUnion Refutes Data Breach Reports Amid Hacker’s Claims
Credit reporting firm TransUnion has refuted reports of a security breach after a threat actor known as USDoD purportedly leaked information stolen from the company’s network. Millions of customers and more than 65,000 businesses from 30 countries are served…
T-Mobile App Glitch Exposes Users to Data Breach
A recent T-Mobile app bug has exposed consumers to a severe data breach, which is a disturbing revelation. This security hole gave users access to sensitive information like credit card numbers and addresses as well as personal account information for…
Unveiling Decentralized Websites: Understanding the Inner Workings of the Decentralized Web
Websites, as we know them, rely on a central server to store their files, which are accessed through a specific domain name. However, this centralized system poses certain vulnerabilities, such as the risk of a single point of failure…
Clorox Cyberattack: Operations of the Cleaning-product Company Disrupted
This Monday, in a regulatory filing, cleaning-product firm Clorox (CLX) confirmed that it was hit by a cyberattack in August. The attack apparently resulted in disruption of the company’s operations, such as the production of their cleaning products. The company…
Avoid Using Master Password Across Multiple Accounts, Advises Security Experts
A recent online poll conducted by Security.org indicates that the adoption of password managers in the United States has seen a significant increase. The survey, which involved 1,051 American adults, revealed that one in three Americans now utilize password…
Cybersecurity Alert: HTTPSnoop Malware Infiltrates Telecom Giants
Cyberattacks against telecommunication service providers in the Middle East have been carried out with the use of new malware called HTTPSnoop and PipeSnoop, which allow cybercriminals to remotely control the devices infected with this malware. They have also found…
UK Home Secretary Clashes with Meta Over Data Privacy
Suella Braverman, the UK Home Secretary, wants to “work constructively” with Meta on the company’s plans to implement end-to-end encrypted (E2EE) messaging in Instagram and Facebook by the end of the year, which she thinks will provide a “safe…
Google’s Bard AI Revolutionizes User Experience
Google’s Bard AI has advanced significantly in a recent upgrade by integrating with well-known programs like Google Drive, Gmail, YouTube, Maps, and more. Through the provision of a smooth and intelligent experience, this activity is positioned to change user interactions…
“From Chatbots to Cyberattacks: How AI is Transforming Cybercrime”
Cybersecurity – both on the good side and on the bad side – is becoming increasingly dependent on artificial intelligence. Organizations can maximize the efficiency and protection of their systems and data resources by leveraging the latest AI-based tools…
WormGPT: AI Tool Developed for Cybercrime Actors
Cybersecurity experts have raised concerns against the rapidly emerging malicious AI tool: WormGPT. The AI tool is specifically developed for cybercrime actors, to assist them in their operations and create sophisticated attacks on an unprecedented scale. While AI has made…
Ethical Hackers Uncover 38TB Microsoft Data Breach via Azure Storage
The recent Microsoft data leak, stemming from the inadvertent sharing of open-source training data on GitHub by AI researchers, has been successfully addressed. Microsoft swiftly responded to a vulnerability that exposed a significant 38TB of private data from its…
Navigating the Risks: Is Airport Wi-Fi Safe for Travelers?
Airport Wi-Fi has become a need for travelers in a time when keeping connected is crucial. It acts as a lifeline for anything from last-minute travel adjustments to professional correspondence. However, worries about its security have led some people to…
Here’s Why Twitter Rival Threads Isn’t Accessible in the E.U.
With the introduction of Threads, Meta’s text-based conversation network, across 100 countries in July, Twitter is facing its most formidable rival yet after months of instability under its new owner. The app gained 30 million users in less than…
Is Wave Browser Safe ?
Unless it is an ultimate exception, everyone has a browser installed on their computer and smartphones to surf the web, work, communicate with others and more. However, there are significant differences in browsers. Some browsers prioritize speed and convenience, some…
Investigation Exposes Covert Israeli Spyware Infecting Targets through Advertisements
Insanet, an Israeli software company, has reportedly developed a commercial product named Sherlock, capable of infiltrating devices through online advertisements to conduct surveillance on targets and gather data for its clients. This revelation comes from an investigation by Haaretz,…
Barracuda’s Vigilance: Tackling Cyberattack Sophistication Head-On
Security for web applications has historically been difficult and complex because they are among the primary vectors of attack against your network that criminals use to penetrate. In addition to offering comprehensive protection against all kinds of application-based threats,…
Mozilla Report Calls Modern Cars a ‘Privacy Nightmare’
Modern automotive technology enables some very special and convenient features. They’re essentially four-wheeled smartphone extensions. As fantastic as it is to start a vehicle with a phone app or to have it self-park, there is a downside. The Mozilla…
FTX Reinforces Security Measures After Recent Cyber Breach
A notable cryptocurrency exchange called FTX recently experienced a security compromise that briefly caused its gateway to be unavailable. The event sparked worries about the security of users’ assets on the network among users and the larger crypto community.…
Are Credit Monitoring Services a Valuable Tool for Financial Security?
There are scammers and hackers who prey on the personal data of other people in order to gain access to their credit cards. As a result, one can obtain very sensitive information such as the name and account number…
Security Changes at Australian Supermarket Raise Privacy Concerns
Our daily lives have been infused with technology, yet the ease and advancements it brings are not without drawbacks. A few of them even have effects on privacy. It is difficult to ignore a situation like this, especially in…
Investigating Chainalysis Data Reliability in Cryptocurrency Cases
Chainalysis has been a key player in bitcoin investigations in recent years, giving financial institutions and law enforcement authorities vital information and insights. But as its impact expands, concerns regarding the veracity and reliability of the information it offers…
DoD Claims: China’s ICS Cyber Onslaught Aims at Gaining Strategic Warfare Advantages
According to the US Department of Defense (DoD), China’s relentless cyberattacks on vital infrastructure are likely a precautionary measure intended to obtain a strategic advantage in the event of violent warfare. The Cyber Strategy released earlier this week by DoD…
Rival Cybercrime Groups Offer Conflicting Accounts of Casino Attack
In the latest development, members of the hacking group Scattered Spider have asserted that they were the initial perpetrators of the MGM network breach last week. However, the ransomware gang Alphv, also known as Black Cat, countered this claim…
‘Elon Musk’ Book Reveals: Musk Wanted to use Tesla Cameras to Surveille on Drivers
A recently published biography of Elon Musk by Walter Isaacson has revealed some interesting facts about Tesla, a popular revelation being the company’s approach to privacy and its rather controversial idea regarding an internal monitoring camera installed in their cars. …
TikTok Faces Massive €345 Million Penalty for Mishandling Kids’ Data Privacy
As a result of TikTok’s failure to shield underage users’ content from public view as well as violating EU data laws, the company has been fined €345 million (£296 million) for mishandling children’s accounts and for breaking the laws. …
Another Crypto Exchange Hacked, Following CoinEx Hack by Three Days
In the midst of a challenging year for crypto exchanges, Remitano, a centralized exchange, fell prey to a hack on September 14, 2023, losing nearly $2.7 million in digital currencies. The breach unfolded at around 12:45 PM on Thursday…
Here’s How Supermarket Loyalty Cards are Exploiting Consumers Weakness
Certain supermarket loyalty schemes, according to critics, are taking advantage of the cost of living problem by offering high discounts only to those who sell large amounts of personal data. Customer privacy is becoming a “luxury” for many struggling…
Israeli Cyber Firms Unveil Groundbreaking Spyware Tool
Israeli cybersecurity companies have made an unparalleled spyware tool available, which has shocked the whole world’s computer sector. This new breakthrough has sparked discussions about the ethics of such sophisticated surveillance equipment as well as worries about privacy and security.…