Mozilla Firefox, a well-known web browser, has significantly improved the protection of users’ email addresses in an age where internet privacy and security have elevated worries. The addition of additional built-in technologies has made Firefox even more capable of protecting…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Ransomware Gangs are Evolving: Cryptocurrency Flaws Could be Their Next Target
Dallas City Government, in May 2023, faced a ransomware attack which resulted in the temporary halt in their operations which included hearings, trial and jury duty and the closure of the Dallas Municipal Court Building. The attack further impacted police…
Rackspace has Spent $11 Million on Ransomware Cleanup So Far
Cloud computing behemoth Rackspace reported in an earnings presentation issued earlier this month that it has already spent $10.8 million responding to a Play ransomware group attack that started late last November against its hosted Exchange environment. 30,000 Rackspace…
Emerging Phishing Campaigns Aim FTX Users After Kroll Data Breach
In a recent turn of events that has reverberated across the cryptocurrency community, Changpeng ‘CZ’ Zhao, the Chief Executive Officer of Binance, a globally renowned cryptocurrency exchange, has issued a stern caution to users who were formerly associated with…
Boosting Business Efficiency: OpenAI Launches ChatGPT for Enterprises
Known for its ChatGPT chatbot, OpenAI has announced the launch of ChatGPT Enterprise, the chatbot product that is the most powerful one available for businesses. Earlier this week, OpenAI introduced ChatGPT Enterprise, an AI assistant that provides unlimited access…
Beware: Government’s Alert on Smishing Scam Threat
The Indian government has now urgently warned its citizens about the threat posed by smishing scams. Smishing, a combination of the words ‘SMS’ and ‘phishing,’ is the practice of hackers sending false text messages to people in an effort to…
Why Web3 Penetration Testing is Vital for Protecting Decentralized Systems
Web3, the transformative evolution of the internet, has introduced a new era of decentralization, opening up exciting opportunities for applications, transactions, and interactions. With a strong focus on user control, data integrity, and transparency, Web3 technologies are reshaping the…
Ransomware Vendetta: Rhysida Group Strikes Prospect Medical, Warns of Auctioning Stolen Data
It has been claimed that Rhysida, an ever-evolving ransomware group, is responsible for the recent cyberattack on Prospect Medical Holdings during which hospitals and medical facilities in four states have been attacked. As a result, Prospect Medical Holdings was…
Duolingo Data Breach: Hackers Posts Scrapped Data on Hacking Forum
After Discord’s data breach that resulted in its temporary halt in operations, the popular language learning app – Duolingo is facing a data breach. An X post (previously tweeted) by user @vx-underground stated that a threat actor scraped data of…
Ransomware Actor Linked to Attacks Against Citrix NetScaler System
Unpatched Citrix NetScaler systems are compromised in domain-wide attacks by a threat actor believed to be linked with the FIN8 hacker organisation exploiting the CVE-2023-3519 remote code execution vulnerability. Sophos has been keeping an eye on this campaign since…
Google Urges Gmail Users Set Up 2FA for Enhanced Security
Google recently issued a stern recommendation to its Gmail users asking them to use Two-Factor Authentication (2FA) as a crucial step to safeguard their accounts in an effort to strengthen user security. The new security alert system from the IT…
In an Attack on WebDetective’s Servers, Hackers Deleted Victim Data
There has been an attack on the makers of a tool that is widely used to track mobile devices, which destroyed all the data that was gathered on the victims and exposed those who were paying for the spyware…
Worldcoin: Ldcoin’s Token Value Falls by More Than 50% as Privacy Concerns Grow
Several regularity concerns have been raised since the launch of Worldcoin’s (WLD) mainnet, resulting in a decline of more than 50% in the value of its token. Trading at $1.27 at press time, the price per WLD token has dropped…
Police Federation: Metropolitan IT System Breach Could Have Serious Consequences
The Metropolitan Police has been made aware of unauthorized access to the IT system of one of its suppliers. The police is working with the company to determine if any Metropolitan Police data has been compromised. A spokesperson for…
Quid Pro Quo Attacks: Cyber Threat to Watch Out For
A threatening message appears out of nowhere. You owe money, or a loved one is in jeopardy, according to the sender’s unknown claims. They threaten consequences unless you cough up the cash or disclose personal information. To say the…
Met Police Investigates Alleged Data Breach of Officer Information
The Metropolitan Police in London has launched an investigation into a suspected data breach that reportedly involves the leakage of sensitive information related to officers. The breach has raised concerns over the security of law enforcement personnel’s data and the…
How can Small Businesses Protect Themselves From Cyber Threats?
In today’s world where businesses of kinds and shapes are developing into a digitalized body, it has also increased chances of cybercrime in their cyber spaces significantly. Newbie business personnel who are looking forward to set a business in bakeries,…
NightOwl App is Targeting Older Macs to Siphon User Data
The NightOwl app, which was once a popular option for automatically transitioning between dark and light modes on macOS Mojave, has been identified to secretly store user data. NightOwl was initially introduced in 2018 as a third-party software to…
Scarab Ransomware Toolkit: Unveiling the Ingenious Weaponry
In a recent report, cybersecurity researchers from the ESET cybersecurity company highlighted that malware of the Scarab ransomware family has been deployed to spread its variants across global victim organizations using a malicious toolset named Spacecolon. ESET has issued…
Cryptocurrency Giants FTX, BlockFi, and Genesis Hit by Kroll Hack
Customers of prominent cryptocurrency companies FTX, BlockFi, and Genesis had their financial and personal information exposed in a recent cybersecurity breach. Concerns have been expressed about the security of private information in the cryptocurrency sector as a result of the…
Rhysida Ransomware Group: Social Security Numbers, Passport Data Compromised in Recent Hospital Attack
On Thursday, the Rhysida ransomware gang confirmed to have been behind the recent cyberattack on Prospect Medical Holdings, as reported by a dark web listing reviewed by Axios. Apparently, the ransomware gang stole more than 500,000 Social Security numbers and…
Introducing China’s First Blockchain-Based Data Exchange, Revolutionizing Web3 Data Trading
On August 23, 2023, in Hangzhou, China unveiled the first-ever blockchain-powered data exchange that brings the country’s innovative prowess to the fore at the world’s largest gathering of global leaders. With the inception of this technological wonder, data trading…
Here’s How AI Can Revolutionize the Law Practice
Artificial intelligence (AI) has gained enormous pace in the legal profession in recent years, as law firms throughout the world have recognised the potential value that AI can bring to their practises. Law companies realise significant efficiencies that increase…
Rapid Ransomware Dwell Time and Persistent RDP Vulnerabilities
The dwell period of ransomware hackers has decreased to just 5 days, a noteworthy trend in the constantly changing world of cyber dangers that demands prompt response. The urgent necessity for stronger cybersecurity measures is highlighted by the quick infiltration…
Recovered Stolen Mercedes Offers Glimpse into Hijackers’ Tactics
A recently recovered Mercedes-Benz, which had been stolen and then found equipped with counterfeit license plates and a forged license disc, has shed light on the operational tactics of hijacking syndicates and their ability to exploit technological advancements to…
Agriculture Industry Should be Prepared: Cyberattacks May Put Food Supply Chain at Risk
Technological advancement in the agriculture sector has really improved the lives of farmers in recent years. Along with improved crop yields and cutting input costs, farmers can keep an eye on their crops from anywhere in the world. Now, farmers…
Surge in Ransomware Attacks: Hackers Set Sights on Schools
With the growing dependence of educational districts on technology for their operations, the occurrence of cyberattacks on K-12 schools is on the rise. In the year 2023, there have been ransomware attacks on at least 48 districts, surpassing the…
Ransomware’s Alarming Surge and Active Adversaries
Ransomware attacks have increased dramatically recently, worrying the cybersecurity community and heralding a new era of cyber threats. The convergence of sophisticated tactics used by hostile actors, as described in numerous reports, highlights the necessity of increased attention and proactive…
North Korean Hacker Linked to Tornado Cash Laundering
After authorities banned the Russian-founded cryptocurrency platform Tornado Cash over its alleged support for North Korean hackers a year ago, it has been announced that two co-founders of the cryptocurrency mixer have been charged with money laundering and other…
Lazarus Employs Public ManageEngine Exploit to Breach Internet Firms
The North Korean state-backed hacking group Lazarus has been compromising an internet backbone infrastructure provider and healthcare organisations by exploiting a major flaw (CVE-2022-47966) in Zoho’s ManageEngine ServiceDesk. The attacks kicked off earlier this year with the goal of…
Call of Duty Bid: Microsoft Makes New Bid to Acquire Call of Duty Giant
In the newest turn of events, Microsoft has made an offer to acquire Activision Blizzard, the company behind the Call of Duty video game. Its original bid of $69bn is however blocked by UK regulators. According to Brad Smith, Microsoft’s…
Akira Ransomware Unleashes a New Wave of Attacks via Compromised Cisco VPNs
The Cisco Network Security Division is aware of reports suggesting that malicious individuals are infiltrating organizations through Cisco VPNs that are not configured for multi-factor authentication with the Akira ransomware threat. In some instances, threat actors are targeting organizations…
Google Workspace Unveils AI-Powered Security
Google LLC announced today a set of new artificial intelligence-powered cyber defence controls, the majority of which will be deployed to its Workspace cloud platform later this year. Data loss prevention, often known as DLP, and data privacy controls…
Decentralized Network Friend.tech Faces Controversy After Data Breach
In the dynamic landscape of cryptocurrency and decentralized networks, Friend.tech emerged as a promising contender; however, it has faced significant backlash following a recent data breach. This event has sparked concerns regarding the platform’s security protocols and the broader…
Friend.Tech Hit by Cyber Attack
Protecting sensitive information is now a top priority for both individuals and businesses in the digital age when data is king. The recent data breach at Friend.tech, regrettably, has once more highlighted how vulnerable our globally networked world is.…
Recent Vulnerability Puts 3,000 Openfire Servers at Risk of Attack
More than 3,000 instances of Openfire servers have not undergone patching to address a recent vulnerability, leaving them susceptible to potential attacks exploiting a newly discovered exploit, according to a report by VulnCheck, a firm specializing in vulnerability intelligence. Openfire,…
MOVEit Attacks Makes Clop the Most-active Ransomware Threat Actor This Summer
According to numerous threat intelligence reports, this July, Clop had been the reason for about one-third, executing financially-motivated, placing the financially driven threat actor to emerge as the most active ransomware threat actor this summer. The ransomware gang’s mass exploit…
Location Leak: Christie’s Mistakenly Exposes Whereabouts of Consigned Artworks
A university professor living in a large town in western Germany was busy on a recent Wednesday evening preparing several paintings for sale through the British auction house Christie’s, an auction house that conducts auctions around the world. By…
Role of Artificial Intelligence in Preventing Cyberattacks at K-12 Schools
Artificial intelligence (AI), according to cybersecurity professionals, might be a key component in averting ransomware attacks at K–12 institutions. There were roughly 1,619 ransomware assaults on school systems between 2016 and 2022, K12 Security Information Exchange (K12 SIX) stated.…
Microsoft’s Rise as a Cybersecurity Powerhouse
Tech titan Microsoft has emerged as an unexpected yet potent competitor in the cybersecurity industry in a time of rapid digital transformation and rising cyber threats. The company has quickly evolved from its conventional position to become a cybersecurity juggernaut,…
The Role of Cryptography in Data Safety
By using codes, the information security strategy of cryptography shields business data and communications from online threats. Security professionals describe it as the art of concealing information to guard against unauthorised access to your data. This technique employs mathematical…
Google Removes 22 Malicious Android Apps Exposed by McAfee
Google recently took action against 22 apps that are available on the Google Play Store, which has alarmed Android users. These apps, which have been downloaded over 2.5 million times in total, have been discovered to engage in harmful behavior…
U.S. Intelligence Reports: Spies and Hackers are Targeting US Space Industry
U.S. intelligence agencies have recently issued a warning against foreign spies who are targeting the American space industry and executing cyberattacks against the country’s satellite infrastructure. The U.S. Office of the Director of National Intelligence’s National Counterintelligence and Security Center…
Tesla Data Breach: 75,000 Users Affected Due to Insider Wrongdoing
There has been an investigation into a data breach that affected the car manufacturer Tesla earlier this year, which has ended up being the result of “insider wrongdoing”, a data breach notification filed by Tesla has revealed. A notice…
Cyberattack Strikes Australian Energy Software Company Energy One
Energy One, an Australian company specializing in software solutions and services for the energy industry, has fallen victim to a cyber assault. In an announcement made on Monday, the company revealed that the breach was identified on August 18…
SA may Surpass the ‘Nigerian Prince,’ Becoming Africa’s New Cybercrime Capital
A surge in cybercrime activities can be witnessed in South Africa, which poses a threat to surpass the notorious “Nigerian Prince” scams and make SA the continent of Africa’s epicenter of this crime. Notably, the rise is despite the passing…
Cuba Ransomware Targets U.S. Organizations via Veeam Exploit
The notorious Cuba ransomware group has leveraged a vulnerability in the popular Veeam software to launch attacks on critical organizations within the United States. This breach underscores the escalating sophistication of cybercriminals and the pressing need for robust cybersecurity measures.…
Cybersecurity Concerns: When Mental Health Queries Become Malware Magnets
‘Beyond Identity’ recently published a study that showed that certain mental health search terms can open users up to the possibility of meeting malware as a result of their search. Using searches related to mental health that were high…
XLoader macOS Malware Variant Disguised as ‘OfficeNote’ Productivity App
A fresh variant of the Apple macOS malware known as XLoader has emerged, disguising its malicious intent through an office productivity app named “OfficeNote,” according to cybersecurity experts from SentinelOne. In an analysis released on Monday, researchers Dinesh Devadoss…
Thousands of Malicious Android Apps are Employing Covert APKs to Bypass Security
To avoid malware detection, threat actors are employing Android Package (APK) files with unknown or unsupported compression algorithms. That’s according to findings from Zimperium, which discovered 3,300 artefacts using such compression algorithms in the wild. 71 of the discovered…
Interpol Operation: 14 Arrested, Allegedly Involved in Scamming Victims of $40 Million
Another Interpol operation detained 14 suspects and identified 20,674 suspected networks spread across 25 African nations that international law enforcement has connected to more than $40 million in losses due to cybercrime. Operation Africa Cyber Surge II The police operation,…
Secure Your Wi-Fi: Spot Hacking Signs and Preventive Tips
The discussion around being cautious regarding security while utilizing public Wi-Fi networks is well-known due to the susceptibility of these networks to compromise by criminals. Yet, it’s essential to recognize that private Wi-Fi networks are also vulnerable to hacking.…
Tesla Begins Notifying Individuals Impacted in a Data Breach Incident
Tesla has acknowledged a data breach affecting around 75,000 individuals, but the incident is the result of a whistleblower leak rather than a malicious attack. The company informed US authorities that a data breach found in May exposed the…
North Korean Hackers Swipe $200M in 2023 Crypto Heists
North Korean hackers had been effective in fleeing with an incredible $200 million in various cryptocurrencies in the year 2023 in a series of clever cyber heists. North Korea’s alarming increase in crypto thefts has not only put the whole…
Behind Closed Cyber Doors: 50 Ransomware Negotiations’ Unexpected Insights
A cybersecurity expert will usually recommend that negotiators should be avoided when trying to resolve the issue of ransomware hackers. A victim recently defied conventional wisdom and attempted to negotiate with their attackers on December 30, 2020, despite their…
Understanding Blagging in Cybersecurity: Tactics and Implications
Blagging might sound intricate, resembling an elaborate hacking maneuver, yet it is remarkably simpler. Despite its less “high-tech” nature compared to other cybercrimes, blagging can inflict significant harm if businesses are unprepared. Blagging involves crafty fraudsters attempting to deceive…
Microsoft Discovers BlackCat’s Sphynx Ransomware Exploiting Impacket & RemCom
A new strain of ransomware known as BlackCat’s Sphynx has recently been discovered by cybersecurity researchers at Microsoft. It has gained notice because it incorporates advanced hacking tools like Impacket and RemCom. This finding highlights the increasing sophistication and power…
Datafication: What is it and Why is it Important ?
While the word ‘datafication’ will sound like an irrelevant word, being forgotten as years went by, it actually hold much importance and impacts individual on a significant basis. And, it is not the same as ‘digitization.’ But, before this conclusive…
Top Five Cybersecurity Challenges in the AI Era
The cybersecurity industry is fascinated by artificial intelligence (AI), which has the ability to completely change how security and IT teams respond to cyber crises, breaches, and ransomware assaults. However, it’s important to have a realistic knowledge of the…
Satellite Security Breached: Hackers Pocket $50K for Exploiting US Air Force Defenses
An impressive security exercise was conducted during the annual “Hack-A-Sat” competition within the US Air Force during which hackers managed to successfully compromise a satellite in orbit. MHACKeroni, an Italian team that emerged as the winner of the competition,…
Responsibilities of an HR to Strengthen Their Company’s Cyber Defenses
Suppose a company is hit by a ransomware attack today, who will the company personnel call or rely on, to remediate their issue. Most probably, a cybersecurity expert. However, companies nowadays go numb in the initial hours of the incident,…
Here’s How to Prevent AI From Cracking Your Password
The world has begun to explore the powers of artificial intelligence and what it can accomplish with a little help. While some individuals are worried about AI, others are eager to discover novel techniques that they can benefit from. …
Guarding Your Finances: The Art of Phishing Attacks and Social Engineering
Malware, hacking techniques, botnets, and other types of technologies are becoming increasingly sophisticated as cyber crimes become more sophisticated. Nevertheless, online criminality exploits tactics that have been refined over decades by criminals long before the internet existed. A cybercriminal…
ChatGPT Joins Data Clean Rooms for Enhanced Analysis
ChatGPT has now entered data clean rooms, marking a big step toward improved data analysis. It is expected to alter the way corporations handle sensitive data. This integration, which provides fresh perspectives while following strict privacy guidelines, is a turning…
Boost Cybersecurity: HR’s Key Role in Guarding Your Business
If your company were to fall victim to ransomware today, whom would you contact? Or perhaps a more pertinent question: How would you go about contacting them? This scenario might appear ludicrous, there are instances where organizations have been…
Ransomware Attack Disrupts Real Estate Property Listing Services in US
One of the functions of real estate agents – their ability to list and update property information – has recently been taken away in a cyberattack. The attack transpired in a California-based data service company – Rapattoni – a multiple…
Rising Concerns as Discord.io Data Breach Compromises 760,000 Users
Although digital companies have multiple data protections in place to safeguard their customers’ information, hackers continue to find ways to circumvent them and gain access to sensitive data even though they have multiple data protections in place to safeguard…
Decoding Cybercriminals’ Motives for Crafting Fake Data Leaks
Companies worldwide are facing an increasingly daunting challenge posed by data leaks, particularly due to the rise in ransomware and sophisticated cyberattacks. This predicament is further complicated by the emergence of fabricated data leaks. Instead of genuine breaches, threat…
Monti Ransomware Strikes Government Systems Again
The notorious Monti ransomware has made an ominous comeback and is now targeting government organizations. Recent reports from cybersecurity professionals indicate that this malware version has reappeared with a new and powerful encryptor, specifically targeting Linux-powered devices. The cybersecurity community…
Infostealer Malware Exposes Over 100K Accounts From Hacking Forums
Security experts identified over 140,000 compromised passwords linked to accounts on hacker forums after their owners were infected with data-stealing malware. Hudson Rock searched its cybercrime intelligence database for infected computers with credentials connected with the top 100 cybercrime…
Grooming Cases Reach Unprecedented Heights Amidst Regulatory Delays
Campaigners are calling for no more delays in the online safety bill, which is being pushed by the Government, as thousands of crimes related to online grooming have been reported during the wait for updated online safety laws. There…
Zen 1 Vulnerability AMD Patchwork Proved Weak, Second Pass Issued
While AMD engineers have already patched their Zen 1 “Division by Zero” bug, it was not the end of their problems, as the company may have released a patch quickly, but perhaps a little too quickly: claims Borislav Petkov, an…
Multiple Severe Flaws Uncovered in CyberPower and Dataprobe Products
Alarm bells are ringing for the security of critical data centre operations after a number of security flaws were uncovered in Dataprobe’s iBoot power distribution unit (PDU) and CyberPower’s PowerPanel Enterprise Data Centre Infrastructure Management (DCIM) platform. The consequences…
Stay Informed: A Guide to ‘Juice Jacking’ Risks Before Your Next Airport Journey
While it might be amusing to imagine “juice jacking” as a playful term for enjoying complimentary beverages at your hotel’s juice bar, the reality is far from lighthearted. The FBI has recently released a travel advisory alerting passengers to…
Scammers Exploit Kids with Fake Fortnite and Roblox Offers
Children are increasingly the targets of sophisticated internet fraud in an era where digital connections predominate. Recent studies point to a concerning pattern where con artists leverage children’s love of well-known video games like Fortnite and Roblox to commit marketing…
Election Security: Lawmakers Will Introduce New Machines Against Defcon Hackers
August is marked as a busy month for computer hackers, since they attempt to break into the election equipment of the Las Vegas conference hall with their USB sticks, screwdrivers or bare fingertips, with one goal: discovering new and more…
Discord.io Acknowledges Data Breach: Hacker Exposes Information of 760K Users
The Discord.io custom invitation service has temporarily ceased its operations due to a data breach that has exposed the personal details of approximately 760,000 members. Discord.io, while not an official Discord platform, functions as a third-party service that enables…
New Indian Data Protection Framework: Data Usage and Ground Rules
The DPDP (Digital Personal Data Protection) Act that was passed by Parliament during the just-passed monsoon session of the Indian Parliament is now in force with the President giving assent to it. With the passing of this law, individuals…
IBM MOVEit Hack Exposes Data of 4 Million US Citizens
Millions of Americans had their private medical and health information stolen after attackers hacked into systems operated by tech giant IBM and exploited a zero-day flaw in the widely used MOVEit file transfer software. The MOVEit major hacks exposed…
Preserving Consumer Trust Through Data Privacy
Data privacy emerges as a crucial cornerstone in preserving consumer trust in today’s digitally driven environment when connected devices and seamless online experiences have become the standard. As data-driven technologies proliferate quickly, strict security controls are required to protect sensitive…
QWIXXRAT: A Fresh Windows RAT Emerges in the Threat Landscape
In early August 2023, the Uptycs Threat Research team uncovered the presence of a newly identified threat, the QwixxRAT, also referred to as the Telegram RAT. This malicious software was being promoted and distributed via platforms such as Telegram…
Avada Theme and Plugin Witnesses Critical Vulnerabilities
Several vulnerabilities have been discovered in the popular Avada theme and its companion Avada Builder plugin by security researcher Rafie Muhammad from Patchstack, who revealed that many WordPress websites are vulnerable to these flaws. Avada Theme and Plugin Avada theme…
Tech Giants Threaten UK Exit Over Privacy Bill Concerns
As US tech giants threaten to sever their links with the UK, a significant fear has emerged among the technology sector in recent days. This upheaval is a result of the UK’s proposed privacy bill, which has shocked the IT…
New Cyber Threat: North Korean Hackers Exploit npm for Malicious Intent
There has been an updated threat warning from GitHub regarding a new North Korean attack campaign that uses malicious dependencies on npm packages to compromise victims. An earlier blog post published by the development platform earlier this week claimed…
Five Reasons Why Network Security Is Paramount
Governments, organisations, and individuals who own computers all require exceptional network security.What is it exactly? It’s a preventative strategy to keep your network and data safe from malware, unauthorised users, and other risks. Numerous hardware components and tools, including…
Defend Against Phishing with Multi-Factor Authentication
Phishing has been a favored attack vector for threat actors for nearly three decades, and its utilization persists until it loses its effectiveness. The success of phishing largely hinges on exploiting the weakest link in an organization’s cybersecurity chain—human…
Security Concerns Surrounding Microsoft OneDrive for Businesses
Microsoft OneDrive has undoubtedly revolutionized the way businesses store and access their data, offering a convenient cloud storage solution. However, recent developments suggest that this widely used platform could inadvertently become a significant security threat to businesses, potentially compromising sensitive…
MasterClass: Online Learning Platform Accused of Violating Customer Privacy by Sharing Info to Meta
Online learning platform MasterClass has been charged for using trackers, transmitting certain customer data to Meta for advertisement purposes without users’ consent. In regards to the case, the law firm Milberg Coleman Bryson Phillips Grossman, PLLC has been gathering the…
Here’s Why You Need to Read Privacy Policy Before Giving Consent
Over the last quarter-century, privacy policies—the lengthy, complex legal language you quickly scan through before mindlessly clicking “agree”—have grown both longer and denser. The average length of a privacy policy quadrupled between 1996 and 2021, according to a study…
EvilProxy Phishing Campaign Targets Microsoft 365 Executives Worldwide
Cybercriminals have launched an EvilProxy phishing campaign with the aim of infiltrating thousands of Microsoft 365 user accounts across the globe. Over a span of three months from March to June, the attackers distributed a barrage of 120,000 phishing…
Operation Jackal: INTERPOL Shuts Down African Cybercrime Gang
A recent operation by INTERPOL on the West African cybercrime organization led to several bank accounts being frozen, with suspects detained and a series of financial investigations organized worldwide. Operation Jackal, conducted between May 15 and 29, apparently mobilized police…
Here’s How You Can Remove Private Info From Google Search Results
Have you ever come across something about yourself that was private or secret in a search engine result? That would not only be embarrassing, but it might also raise security risks like identity theft. Google is trying to make…
Innovative ‘Brain-Like’ Chip Could Transform AI Landscape with Eco-Friendly Promise
Using a prototype chip that looks like a brain, IBM, one of the world’s most respected technology giants, says it may be possible to increase the efficiency of artificial intelligence (AI) by enhancing energy efficiency. The advancement addresses the…
Emerging Technology Facilitating Increased Vehicle Thefts and Accidents by Criminals
The automotive industry is abuzz with discussions about the “Internet of vehicles” (IoV), which envisions a network of interconnected cars and other vehicles capable of sharing data via the Internet. The goal is to revolutionize transportation by enhancing its…
DBS Bank Reveals Big ‘Data Challenges’ With AI Use
In a bid to adopt Artificial Intelligence (AI) to its operations, DBS Bank had to face several challenges. While doing the same, however, the company realized that doing so goes beyond just figuring out the training models. Data turned out to…
Defending Against Stealer Log Cyber Threats
Cyber attacks are a serious concern in a digital environment that is becoming more linked. Silent cyber threats have become more common among the many different types of cyberattacks because of their covert nature and potentially disastrous outcomes. The stealer…
Safeguarding Personal Data in the Wake of Hacks and Leaks
The security of personal data has become a top priority in the current digital era. With recent events like the Northern Ireland data breach, people are understandably concerned about the security of their personal data after a hack or leak.…
CISA Advises Firms to Adopt Passwordless Security in LAPSUS$ Report
A series of high-profile cyber attacks carried out by teenage hackers in 2021 and 2022 reveals systemic flaws in the telecommunications industry and security practices employed by a number of businesses, according to a Department of Homeland Security investigation. …
Notorious Global Phishing Platform Neutralized in Cross-Border Operation
There were arrests made of two alleged operators of the phishing-as-a-service platform “16shop” by INTERPOL in Indonesia and Japan after the agency carried out a successful investigation into the scheme, which was outsourced. A research project that investigated cyber…
Revolutionizing Everyday Life: The Transformative Potential of AI and Blockchain
Artificial intelligence (AI) and blockchain technology have emerged as two pivotal forces of innovation over the past decade, leaving a significant impact on diverse sectors like finance and supply chain management. The prospect of merging these technologies holds tremendous…