The emergence of ‘Bossware’ or staff surveillance software in recent years has been a troubling trend in offices all around the world. Bossware refers to a collection of devices and software that give employers the ability to track, keep…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Stay Vigilant: Google Docs Phishing Scams Spreading Rapidly
Phishing scam sophistication is increasing every day, making them more difficult to detect and avoid at the same time. A wide variety of file-sync and share platforms are now available for users, making scammers impute these services and try…
Human Error: A Helping Hand for Cyber Criminals
The use of passwords, a fundamentally faulty strategy that was developed many years ago, has been the primary method for securing an organisation’s internal systems and its customers’ accounts for far too long. Despite efforts to provide better, more…
Yoga Trainer Defrauded of Rs.94,998 in a Paytm Fraud
In a shocking incident of cyber fraud in Lucknow, India, a yoga trainer lost Rs. 94,998 from her bank account within five transactions that she made online. The victim claims to have been approached by the fraudsters impersonating a BSF…
Critical Vulnerabilities in AMI MegaRAC BMC Software
Eclypsium, a cybersecurity company, recently discovered two serious flaws in the AMI MegaRAC Baseboard Management Controller (BMC) software, raising questions about the security of millions of servers throughout the world. If these weaknesses are used against the affected systems, serious…
Canadian Cybersecurity Head Warns of Surging AI-Powered Hacking and Disinformation
Sami Khoury, the Head of the Canadian Centre for Cyber Security, has issued a warning about the alarming use of Artificial Intelligence (AI) by hackers and propagandists. According to Khoury, AI is now being utilized to create malicious software,…
Beyond Security: The Comprehensive Approach to Tackling Cyberattacks
In today’s digital landscape, organizations are increasingly facing the harrowing consequences of cyberattacks, particularly ransomware incidents. In these malicious schemes, hackers encrypt vital data, rendering it inaccessible, and then demand exorbitant payments for its restoration. Unfortunately, such attacks are…
Movie Scam: Fraudsters Take Advantage of the Popularity of Barbie and Oppenheimer
The films Barbie and Oppenheimer quickly rose to the top of the list of the year’s most anticipated films. Unfortunately, scammers seized the opportunity to use Barbie and Oppenheimer’s enormous popularity for their own nefarious purposes right away, as…
Storm-0558 Breach: Microsoft Breach Risks Millions of Azure AD Apps
Storm-0558 breach, that enabled the China-based advanced persistent threat (APT) group to access emails of at least 25 US agencies seems to be more notorious than anticipated, since the breach may put significant risk on Microsoft cloud services than one…
Warcraft Fans Trick AI with Glorbo Hoax
Ambitious Warcraft fans have persuaded an AI article bot into writing about the mythical character Glorbo in an amusing and ingenious turn of events. The incident, which happened on Reddit, demonstrates the creativity of the game industry as well as…
GitHub Issues Alert on Lazarus Group’s Social Engineering Attack on Developers
According to a security alert issued by GitHub, this social engineering campaign is designed to compromise developers’ accounts in the blockchain, cryptocurrency, online gambling, and cybersecurity industries. This is done through social engineering techniques. The campaign was reportedly linked…
Web Development Revolution: Chrome’s Cookie-Free Tools
It has become increasingly common for browsers to use third-party cookies as part of their browsing process, which makes it possible for advertisers and bad actors to spy on large chunks of your browsing history to provide more relevant…
North Korea-Backed Hackers Breach US Tech Company to Target Crypto Firms
A North Korean state-sponsored hacking group has recently breached a US IT management company, in a bid to further target several cryptocurrency companies, cybersecurity experts confirmed on Thursday. The software company – JumpCloud – based in Louisville, Colorado reported its…
Nigel Farage Controversy Results in Hundreds of NatWest Private Data Requests
Numerous requests for copies of personal data have been made to NatWest Bank under the provisions of data protection regulations. It unfolded after an argument between the group and Nigel Farage, a pro-Brexit advocate. According to the former UKIP…
Microsoft Offers Free Security Features Amid Recent Hacks
Microsoft has taken a big step to strengthen the security of its products in response to the growing cybersecurity threats and a number of recent high-profile attacks. The business has declared that it will offer all users essential security features…
As More MOVEit Hack Victims Emerge, Ofcom Declares Non-Payment of Ransom
As the mass-hacking incidents continue to affect users of the widely used file-transfer application MOVEit Transfer, an increasing number of victims are emerging, with nearly 400 organizations now known to be impacted. In a recent statement, Estée Lauder, a…
Ransomware Outbreak in Canada: Cybersecurity Meltdown
Canadians and Canadian organizations are increasingly falling victim to ransomware attacks. There was an emphasis placed on the urgency of addressing the cyber security issue by Sami Khoury, the president of the Canadian Centre for Cyber Security. The President…
Estée Lauder: Cosmetic Brand Amongst the new Victims of Ransomware Attack
On Tuesday, U.S.-based cosmetic brand Estée Lauder Cos. Inc. confirmed to have witnessed a ransomware attack, following which it compromised some of its data and took down some of its systems. Apparently, ransomware gangs ALPHV/BlackCat claim to have executed the…
AI Will Result in Greater Game Development and Job Growth
Artificial intelligence will increase employment in the video game business, one of the bodies representing games developers stated. The head of TIGA, Dr. Richard Wilson, claims that AI will “reduce the cost of making games and speed up the…
Inside the World of Ransomware Negotiations: From Colonial Pipeline to JBS
In January 2021, JBS, the world’s largest meat-processing company, revealed that it paid a ransom of $11 million in Bitcoin to cyber attackers. Similarly, in May of the same year, Colonial Pipeline, the largest refined-products pipeline in the U.S.,…
Cybercriminals Masquerade as Cybersecurity Company to Hijack Entire PCs
In the latest cyber threat, hackers have devised a new approach to deceive unsuspecting victims, even using reputable names as a cover. A ransom-as-a-service (RaaS) attack called “SophosEncrypt” has emerged, masquerading as the cybersecurity vendor Sophos. The operation of…
Ransomware Trends: RaaS and Cryptocurrency Impacts
Ransomware attacks have become a pressing concern for individuals, businesses, and governments worldwide. Cybercriminals are constantly evolving their tactics, and two significant trends that demand close monitoring are the rise of Ransomware-as-a-Service (RaaS) and the growing reliance on cryptocurrencies for…
Top Cyber Official Says AI Needs Better Security
Artificial intelligence (AI) is used by hackers and propagandists to develop malicious software, draft convincing phishing emails to infect computers, and spread false information via the web, according to Canada’s top cybersecurity official, who spoke to Reuters on Thursday.…
Security Professionals Propose Guidelines for AI Development in an Open Letter
A new voluntary framework for designing artificial intelligence products ethically has been revealed by a global consortium of AI experts and data scientists. There are 25,000 members of the World Ethical Data Foundation, including employees of several digital behemoths…
Growing Surveillance Threat for Abortions and Gender-Affirming Care
Experts have expressed alarm about a worrying trend in the surveillance of people seeking abortions and gender-affirming medical care in a recent paper that has received a lot of attention. The research, released by eminent healthcare groups and publicized by…
Cyber Trust Mark: U.S. Administration Introduces Program to Boost Home Security
This Tuesday, Joe Biden’s government announced a ‘U.S. Cyber Trust Mark’ program that will focus on cybersecurity certification and product labels of smart home tech, as a step to help consumers choose products that provide better protection against cyber activities.…
With More Jobs Turning Automated, Protecting Jobs Turn Challenging
With the rapid trend of artificial intelligence being incorporated in almost all the jobs, protecting jobs in Britain now seems like a challenge, as analyzed by the new head of the state-authorized AI taskforce. According to Ian Hogarth, a tech…
Enhancing Security and Observability with Splunk AI
During Splunk’s .conf23 event, the company announced Splunk AI, a set of AI-driven technologies targeted at strengthening its unified security and observability platform. This new advancement blends automation with human-in-the-loop experiences to enable organisations to improve their detection, investigation,…
ChatGPT’s Reputability is Under Investigation by the FTC
The Federal Trade Commission (FTC) has recently launched an investigation into ChatGPT, the popular language model developed by OpenAI. This move comes as a stark reminder of the growing concerns surrounding the potential pitfalls of artificial intelligence (AI) and the…
Evil Unleashed: Meet WormGPT Chat’s Wicked Twin
Over 100 million users have signed up for ChatGPT since it launched last year, making it one of the top ten most popular apps in the world. Artificial intelligence has taken the world by storm in recent years with…
Sophisticated Cloud Credential Theft Campaign Targets AWS, Expands to Azure and Google Cloud
A cybercriminal group behind a sophisticated cloud-credential stealing and cryptomining campaign has recently expanded its targets beyond Amazon Web Services (AWS) to include Microsoft Azure and Google Cloud Platform (GCP). Researchers from SentinelOne and Permiso have been tracking the…
macOS Sonoma’s Latest Update Brings Significant Enhancements to Apple’s Password Manager
Password manager applications like 1Password and Proton Pass play a crucial role when setting up a new device. These apps securely store login credentials, credit card information, and notes, with an emphasis on login data security. Not all password managers…
Growing Demand for Healthcare Cybersecurity Specialists
The healthcare sector is increasingly depending on technology to better patient care and increase operational efficiency in today’s quickly evolving digital environment. Cybersecurity dangers are a major worry that comes with this digital transition. The demand for qualified cybersecurity specialists…
Typo Delivers Millions of US Military Emails to Russia’s Ally Mali
Due to a small typing error, millions of emails from the US military were unintentionally forwarded to Mali, a Russian ally. For years, emails meant for the US military’s “.mil” domain have been transmitted to the west African nation…
The Met Police passed victims’ data to Facebook
Using its website to report crimes, such as sexual offences, domestic violence, and other crimes, the most powerful police force in the country gathered sensitive details about the people using the site. Observer reports that Facebook shared users’ data…
AI-Based Deepfake Fraud: Police Retrieves Money Worth ₹40,000 Defrauded From Kozhikode Victim
Kozhikode, India: In a ‘deepfake’ incident, a man from Kozhikode, Kerala lost ₹40,000 after he fell prey to an AI-based scam. According to police officials, the victim, identified as Radhakrishnan received a video call on WhatsApp from an unknown number.…
5 AI Tools That may Save Your Team’s Working Hours
In today’s world of ‘everything digital,’ integrating Artificial Intelligence tools in a business is not just a mere trend, but a necessity. AI is altering how we work and interact with technology in the rapidly transforming digital world. AI-powered solutions…
Cybersecurity: Are Viruses Still a Threat?
Viruses were considered the biggest cybersecurity concern in the world, but is that still the case? How prevalent were viruses in the past, and are they still as deadly today? Understanding the modern computer viruses Viruses are no longer…
A Few Cybercriminals Account for All Email Extortion Attacks, New Research Reveals
New research conducted by Barracuda Networks, in collaboration with Columbia University, has revealed that a surprisingly small group of cybercriminals is responsible for the majority of email extortion attempts worldwide. The study examined over 300,000 flagged emails, identified as…
Urgent Action Required: Delete Apps with Privacy Breach Potential
Whenever your phone is running low on storage, it’s always an excellent idea to remove apps that could be taking up a lot of space – especially if you think they could spy on you. For some apps, however,…
Gay Furry Hackers: Digital Activism Against Anti-Trans Laws
A group of expert hackers known as ‘SiegedSec’ has surfaced in recent months, and they are targeting American state governments that have passed anti-trans legislation. These hackers are members of the furry community, a subculture of people who enjoy anthropomorphic…
Understanding the Drawbacks of Blockchain Smart Contracts
Blockchain technology has grabbed the attention of companies across the globe. Due to its benefits, such as immutability and transparency, traditional companies outside of banking, like BMW and Bosch, have begun to experiment with smart contracts to produce more…
Forget ChatGPT, Google Bard may Possess Some Serious Security Flaws
A latest research claims that Google’s AI chatbot, Google Bard may let its users to use it for creating phishing emails and other malicious content, unlike ChatGPT. At one such instances, cybersecurity researchers Check Point were able to produce phishing…
Privacy Breach Shockwaves: Colorado State University Students and Staff Impacted by Data Breach
According to CBS News, a Colorado university is at risk of exposing 30,000 current and former students’ data to hackers. As reported by the University of Colorado Boulder, the incident is the result of a cyber-attack perpetrated against a…
Understanding Internet Identity: Exploring its Functionality and Operation
Passwords have long been a hassle for daily online logins, even with the help of password managers. However, the DFINITY Foundation’s Web3 experts are developing a promising alternative called Internet Identity (II), which has the potential to transform online…
SolarWinds Hackers Dangle BMWs to Eavesdrop on Diplomats
The Russia-backed group responsible for the SolarWinds attack, known as Cloaked Ursa or Nobelium/APT29, has shifted its tactics and is now targeting foreign diplomats working at embassies in Ukraine. Instead of using traditional political lures, the group is employing…
Fear Grip Users as Popular Diabetes App Faces Technical Breakdown
A widely used diabetes management software recently experienced a serious technical failure, stunning the users and leaving them feeling angry and scared. The software, which is essential for assisting people with diabetes to monitor and manage their blood sugar levels,…
Hollywood vs. AI: Strike Highlights the Emerging Use of Cutting-Edge Technology
The prospects of generative artificial intelligence in Hollywood — and the way it can be used as an alternative labour — has become a critical holding point for actors on strike. In a news conference earlier this week, Screen…
Custom Data: A Key to Mitigating AI Risks
Businesses are continuously looking for ways to maximize the advantages while limiting the potential hazards in the quickly developing field of artificial intelligence (AI). One strategy that is gaining traction is using unique data to train AI models, which enables…
Killnet Attempts to Build Clout Among Russian Hackers With Media Stunts
As a result of Killnet and Killmilk’s leadership over the past several months, ragtag hacker groups from Russia have been consolidated under their leadership. This has formed one group called Killnet. Even though Killnet has made a concerted effort…
Microsoft Confirms Zero Day Exploits, Prompts Users to Update
This week Microsoft confirmed around 132 security vulnerabilities in its product lines, including a total of six zero-day flaws that are currently being actively exploited. Because of this, security professionals advise Windows users to upgrade right away. One of these…
AI Malware vs. AI Defences: WormGPT Cybercrime Tool Predicts a New Era
Business email compromise (BEC) attacks are being launched by cybercriminals with the assistance of generative AI technology, and one such tool used is WormGPT, a black-hat alternative to GPT models that has been designed for malicious goals. SlashNext said…
Sharp Increase in Malware Attacks via USB Flash Drives
Instances of cybercriminals employing USB drives for malware attacks have seen a significant rise. According to security researchers from Mandiant, there has been a three-fold increase in malware attacks via USB drives aimed at stealing sensitive information during the…
Unveiling Entrepreneurs’ Hesitations with ChatGPT
ChatGPT has become a significant instrument in the field of cutting-edge technology, utilizing the ability of artificial intelligence to offer conversational experiences. Nevertheless, many business owners are still reluctant to completely adopt this creative solution despite its impressive possibilities. Let’s…
Ransomware Resurgence: A Renewed Wave of Cyber Threats
Harvard Business Review reports claim that cyberattacks have increased dramatically since the overnight shift from remote to office work in 2020. In 2020, all types of cyberattacks have increased over the previous year, but ransomware is by far the…
Former Amazon Security Engineer Charged of Defrauding a Crypto Exchange
A prominent cybersecurity pro for Amazon is apparently facing a problem. The U.S. Department of Justice has detained security engineer, Shakeeb Ahmed, with charges of defrauding and money laundering from an unnamed decentralized cryptocurrency exchange, both charged carrying a maximum…
Clop Attacks: More Organizations Confirm to have Fallen Prey to MOVEit Mass-hack
As the ongoing MOVEit hack is getting exposed, their seems to be some new names that have fallen prey to the attack. These organizations involve hotel chain Radisson, U.S. based 1st Source Bank, real estate giant Jones Lang LaSalle and…
BlackRock’s Bitcoin ETF Reveals the Future of Cryptocurrency Surveillance
Surveillance is about to reach a new level as Blackrock awaits the SEC’s confirmation regarding its Bitcoin ETF launch. An ETF tied to Bitcoin was filed on June 15 by the world’s largest asset manager, reportedly the world’s largest…
Zscaler, Palo Alto Under Pressure from Microsoft’s Rapidly Increasing Cybersecurity Offerings
Microsoft (MSFT) continues to put pressure on cybersecurity stocks with new products aimed at Zscaler (ZS), Palo Alto Networks (PANW), Cloudflare (NET), CrowdStrike Holdings (CRWD), and others. MSFT stock has kept on shining this year, with a 39% increase,…
Major Companies Restrict Employee Use of ChatGPT: Amazon, Apple, and More
Several major companies, including Amazon and Apple, have recently implemented restrictions on the use of ChatGPT, an advanced language model developed by OpenAI. These restrictions aim to address potential concerns surrounding data privacy, security, and the potential misuse of the…
Massive Data Breach at HCA Healthcare: 11 Million Patients’ Information Compromised by Hackers
Hospital and clinic operator HCA Healthcare has announced that it experienced a significant cyberattack, posing a risk to the data of at least 11 million patients. The breach affects patients in 20 states, including California, Florida, Georgia, and Texas.…
ScarletEel Hackers Breach AWS Cloud Infrastructure
Researchers have discovered that a financially motivated threat actor called ScarletEel has been infiltrating Amazon Web Services (AWS) for various malicious activities. These activities include stealing credentials and intellectual property, deploying crypto mining software, and carrying out distributed denial-of-service…
Genesis Market: Formerly a Popular Dark Web Marketplace Now up for Sale
If one wishes to own a defunct darknet business, they could try reaching out to the backers of Genesis Market, the formerly high-and-mighty seller of stolen data. Today, they appear to be desperate to sell their formerly valued asset for…
Private Data of 12,000 SBI Employees Exposed on Telegram Channels
Over 12,000 employees of the State Bank of India (SBI) had their personal information compromised in a significant data breach, which was later published on Telegram channels. Employees’ names, residences, contact information, PAN numbers, and personal data from their…
Meta Responds to User Complaints by Introducing Feeds for Threads
Meta, the parent company of social media giant Facebook, has recently revealed its plans to introduce feeds for Threads, a messaging app designed for close friends. This move comes in response to user complaints about the lack of a central…
Ransomware Gangs Exposing Private Files of Students Online
Ransomware groups have lately been dumping private documents acquired from schools online. The stolen content included happens to be raw, intimate and graphic. The confidential ‘data’ leaked online involve content as explicit as describing student sexual assaults, psychiatric hospitalizations, abusive…
Twitter Becomes the Epicentre of FTM Fraud
Online settings, such as Twitter, are becoming increasingly perilous, rife with fraudulent schemes aimed at naïve victims. Social media giant has recently been the epicentre of deception, with fraudsters deploying innovative ways to abuse its massive user base. One…
Critical Ransomware Threat: Disguised as Windows Update, Beware!
Ransomware is a form of malware that allows hackers to encrypt non-transferable files on a computer so that they cannot be released. Cyberattackers encrypt the files that they want to access and then demand a ransom payment for the…
Hackers Steal 25 Crore From Thane Company’s Escrow Account
Hackers took 25 crores from a Thane-based company’s escrow bank account during a significant cyberattack. The construction company had placed the funds in the escrow account as a condition of a contract with another business. The money was transferred to…
This Threat Actor Targeted NATO Summit Attendees
A Russia-linked threat actor known as RomCom has been targeting entities supporting Ukraine, including guests at the 2023 NATO Summit. The summit is taking place in Vilnius, Lithuania, and will discuss the war in Ukraine and new memberships in…
Over $30 Billion Stolen from Crypto Sector, Reveals SlowMist’s
A recent report by cybersecurity firm SlowMist has uncovered a shocking revelation regarding the vulnerability of the crypto sector. According to the report, blockchain hacks have resulted in the theft of over $30 billion from the cryptocurrency industry since 2012.…
India’s Finance Ministry Tell State-run Banks to Adopt Emerging Technologies to Increase Operational Efficiency
The Indian finance ministry has ordered state-run banks to collaborate and take use of emerging technology to improve operational effectiveness and customer experience. In a meeting, headed by Finance Minister Nirmala Sitharaman to assess the activities and performance of public…
SCARLETEEL Hackers Target AWS Fargate in Latest Cryptojacking Campaign
An continuing sophisticated attack effort known as SCARLETEEL continues to target cloud settings, with threat actors currently focusing on Amazon Web Services (AWS) Fargate. According to a new report from Sysdig security researcher Alessandro Brucato, “Cloud environments are still…
Users’ Data is Stolen Through 1.5 million Android Apps
As part of an effort to help users gain a better understanding of what data an app collects before downloading it, Google Play introduced “nutrition labels” with a privacy-focused focus last year. However, researchers have found a way to work…
Cybercrime to Cost Global Economy $10.5 trillion By 2025
A report from Cybersecurity Ventures estimates that by 2025, cybercrime will have cost the global economy up to $10.5 trillion. According to a recent Gartner survey, by then, more than half of all cybersecurity assaults will be attributable to…
Critical TootRoot Bug Hijack Mastodon Servers
Mastodon, the decentralized social networking platform that emphasizes freedom and open-source principles, has recently addressed several vulnerabilities, including a critical one with potentially severe consequences. This particular vulnerability enabled hackers to exploit specially designed media files, allowing them to…
Ransomware Attack on Pro Bono California Law Firm Affects More Than 42,000
Recently, a ransomware attack on the Law Foundation of Silicon Valley, a California law firm that provides free services to those in need, resulted in the exposure of information of more than 42,000 people. Hackers use ransomware to make money…
AI: How to guard against privacy invasion by bots
Since ChatGPT entered our life and launched a conflict in the artificial intelligence area, a new race known as the AI Arms Race 2.0 has started. The same ChatGPT that everyone initially found impressive also raised concerns about copyright…
DeFi Clients Lost $228 Million to Hackers in Past 3 Months
In the recent past, there has been a dramatic rise in the number of cyber incidents, where cyber threat actors have tried to exploit many cryptocurrency projects. It is interesting to note that hackers have significantly targeted DeFi, according to…
‘Meduza Stealer’ Malware is Preying on Windows Users For Data Theft
If you are reading this on a Windows device, be on alert for potentially harmful new malware that has been affecting web browsers, password managers, and even cryptocurrency wallets. A team of Uptycs cybersecurity professionals found this infostealer, naming…
Patch Now or Peril: MOVEit Transfer Customers Urged to Address Critical Vulnerability
MOVEit Transfer software has been identified as vulnerable to a critical vulnerability. This prompts customers to patch their systems urgently to prevent vulnerability spread. The flaw, identified as CVE-2023-36934, allows an attacker to gain elevated privileges without the user…
French Government Allows Remote Access to Suspects’ Devices: Privacy Concerns Arise
The French Government has recently introduced a new policy allowing the police to remotely access and control suspects’ devices, including their cameras, microphones, and GPS data. Although this news has sparked controversy, similar practices have been in place in…
ChatGPT Loses Its Spark: Google A.I. Researcher Identifies Children as the Key Challenge
The number of ChatGPT users is declining for the first time, and those users are not those you thought they would be. According to estimates from Similarweb, a web analytics firm, a 9.7% drop in traffic to ChatGPT’s website…
Ransomware Affiliates, Triple Extortion, and the Dark Web Ecosystem
While the dark web is often associated with drugs, crime, and leaked information, there has been a rise in a sophisticated cybercrime ecosystem that operates through platforms like Tor and illicit channels on Telegram. One aspect of this trend…
Shell Confirms MOVEit-based Hack After the Threat Group Leaks Data
The CIOp ransomware gang has targeted a zero-day vulnerability in the MOVEit managed file transfer (MFT) product, acquiring data of at least 130 companies that had been utilizing the solution. At least 15 million people are thought to have been…
Pakistan Election Commission Faces Cyber Attack
The Pakistan Election Commission recently encountered a significant cyber attack, jeopardizing the security and integrity of its electoral processes. This incident has raised concerns regarding the protection of sensitive data and the potential implications for the country’s democratic system.…
Escalating Global Threats Targeting Cloud Infrastructure
Cloud computing’s quick uptake has fundamentally changed how businesses manage and keep their data. However, as cloud environments become more and more popular, an alarming increase in cyber threats targeting them has also occurred. The sophistication of attacks on…
Can TV and Radio Broadcasts Be Hacked?
In today’s interconnected world, where technology permeates every field, the security of communication channels is paramount. People rely heavily on TV and radio broadcasts for information and entertainment. So, can TV and radio broadcasts be hacked? The answer is yes.…
Netwrix Auditor RCE Bug Abused in Truebot Malware Campaign
A severe remote code execution (RCE) vulnerability in the Netwrix Auditor software was used in attacks against organisations across the United States and Canada, according to a warning issued today by CISA and the FBI. These assaults targeted organisations…
Are Your Google Docs Safe From AI Training?
AI systems like Google’s Bard and OpenAI’s ChatGPT are designed to generate content by analyzing a huge amount of data, including human queries and responses. However, these systems have sparked legitimate worries regarding privacy. Google has emphasized that it…
Pentagon Concludes Review Following Discord Leak, Tightens Controls on Classified Info
The Pentagon has completed a comprehensive assessment lasting 45 days to evaluate the military’s protocols regarding classified information, following a case where a National Guardsman leaked unnecessary classified information on Discord despite having a top-secret clearance. The individual involved,…
Will Threads be a ‘Threat’ to Twitter?
About Threads Meta, Instagram’s parent company launched Threads, which will be a text-based conversation app, rivaling Twitter. Threads, released on Wednesday evening, a day before its scheduled release, allows users to join up directly from their Instagram accounts; it is…
E2E Encryption Under Scrutiny: Debating Big Tech’s Role in Reading Messages
A recurring conflict between Silicon Valley and several governments is primarily about “end-to-end encryption,” “backdoors,” and “client-side scanning,” which appear to be complex issues. However, in its simplest form, this issue boils down to the question: should technology companies…
Protecting Yourself from ATM Scams: Understanding and Preventing Shoulder Surfing
What is Shoulder Surfing? ATM card scams are a growing concern in many countries, including India. Criminals use a variety of techniques to gain unauthorized access to individuals’ ATM cards and withdraw money from their accounts. One such technique is…
Ransomware Attack Forces Major Japanese Port to Halt its Operation
A ransomware attack was launched against Japan’s biggest and busiest trading port by a cybercriminal outfit believed to be based in Russia. Following the incident, the Port of Nagoya paused all cargo operations, including the loading and unloading of…
Industrial Solar Panels Face Critical RCE Bugs
Several critical Remote Code Execution (RCE) vulnerabilities have recently emerged, posing a significant threat to industrial solar panels and potentially endangering grid systems. These vulnerabilities, if exploited, could have severe consequences for energy organizations and their critical infrastructure. Security experts…
OpenAI Faces Lawsuit for Exploiting User Data to Train ChatGPT, DALL-E
OpenAI, an acclaimed artificial intelligence research business, was recently faced with a class-action lawsuit in the United States for allegedly stealing large amounts of personal data to train its AI chatbot ChatGPT and image generator DALL-E. According to the lawsuit…
Amazon Brushing Scam: What It Is And How To Avoid It
Though it’s one of the most well-liked online shopping sites, did you realise that scammers frequently target Amazon. The brushing scam is one of many scams that prey on Amazon customers, but it is also one of the most…
Educational Institutions Under Attack: Ransomware Criminals Leak Students’ Sensitive Data Online
School documents containing confidential information have been stolen by ransomware gangs and dumped on the Internet for free. Students are described as being sexually assaulted by other students, hospitalized due to mental health problems, abused by their parents, and…
Data Leak Affects 425,000 Swiss Addresses
Cyber threat actors have apparently stolen what is the most comprehensive data set on Swiss citizen abroad. The data set first appeared on the darknet in mid-May. It consisted of the subscribers’ information to the Swiss ReviewExternal link. The data…