Category: CySecurity News – Latest Information Security and Hacking Incidents

Human Error: A Helping Hand for Cyber Criminals

  The use of passwords, a fundamentally faulty strategy that was developed many years ago, has been the primary method for securing an organisation’s internal systems and its customers’ accounts for far too long. Despite efforts to provide better, more…

Yoga Trainer Defrauded of Rs.94,998 in a Paytm Fraud

In a shocking incident of cyber fraud in Lucknow, India, a yoga trainer lost Rs. 94,998 from her bank account within five transactions that she made online. The victim claims to have been approached by the fraudsters impersonating a BSF…

Critical Vulnerabilities in AMI MegaRAC BMC Software

Eclypsium, a cybersecurity company, recently discovered two serious flaws in the AMI MegaRAC Baseboard Management Controller (BMC) software, raising questions about the security of millions of servers throughout the world. If these weaknesses are used against the affected systems, serious…

Beyond Security: The Comprehensive Approach to Tackling Cyberattacks

  In today’s digital landscape, organizations are increasingly facing the harrowing consequences of cyberattacks, particularly ransomware incidents. In these malicious schemes, hackers encrypt vital data, rendering it inaccessible, and then demand exorbitant payments for its restoration.  Unfortunately, such attacks are…

Warcraft Fans Trick AI with Glorbo Hoax

Ambitious Warcraft fans have persuaded an AI article bot into writing about the mythical character Glorbo in an amusing and ingenious turn of events. The incident, which happened on Reddit, demonstrates the creativity of the game industry as well as…

Ransomware Outbreak in Canada: Cybersecurity Meltdown

  Canadians and Canadian organizations are increasingly falling victim to ransomware attacks. There was an emphasis placed on the urgency of addressing the cyber security issue by Sami Khoury, the president of the Canadian Centre for Cyber Security. The President…

Ransomware Trends: RaaS and Cryptocurrency Impacts

Ransomware attacks have become a pressing concern for individuals, businesses, and governments worldwide. Cybercriminals are constantly evolving their tactics, and two significant trends that demand close monitoring are the rise of Ransomware-as-a-Service (RaaS) and the growing reliance on cryptocurrencies for…

Top Cyber Official Says AI Needs Better Security

  Artificial intelligence (AI) is used by hackers and propagandists to develop malicious software, draft convincing phishing emails to infect computers, and spread false information via the web, according to Canada’s top cybersecurity official, who spoke to Reuters on Thursday.…

Enhancing Security and Observability with Splunk AI

  During Splunk’s .conf23 event, the company announced Splunk AI, a set of AI-driven technologies targeted at strengthening its unified security and observability platform. This new advancement blends automation with human-in-the-loop experiences to enable organisations to improve their detection, investigation,…

ChatGPT’s Reputability is Under Investigation by the FTC

The Federal Trade Commission (FTC) has recently launched an investigation into ChatGPT, the popular language model developed by OpenAI. This move comes as a stark reminder of the growing concerns surrounding the potential pitfalls of artificial intelligence (AI) and the…

Growing Demand for Healthcare Cybersecurity Specialists

The healthcare sector is increasingly depending on technology to better patient care and increase operational efficiency in today’s quickly evolving digital environment. Cybersecurity dangers are a major worry that comes with this digital transition. The demand for qualified cybersecurity specialists…

The Met Police passed victims’ data to Facebook

  Using its website to report crimes, such as sexual offences, domestic violence, and other crimes, the most powerful police force in the country gathered sensitive details about the people using the site. Observer reports that Facebook shared users’ data…

5 AI Tools That may Save Your Team’s Working Hours

In today’s world of ‘everything digital,’ integrating Artificial Intelligence tools in a business is not just a mere trend, but a necessity. AI is altering how we work and interact with technology in the rapidly transforming digital world. AI-powered solutions…

Cybersecurity: Are Viruses Still a Threat?

  Viruses were considered the biggest cybersecurity concern in the world, but is that still the case? How prevalent were viruses in the past, and are they still as deadly today?  Understanding the modern computer viruses Viruses are no longer…

Gay Furry Hackers: Digital Activism Against Anti-Trans Laws

A group of expert hackers known as ‘SiegedSec’ has surfaced in recent months, and they are targeting American state governments that have passed anti-trans legislation. These hackers are members of the furry community, a subculture of people who enjoy anthropomorphic…

Understanding the Drawbacks of Blockchain Smart Contracts

  Blockchain technology has grabbed the attention of companies across the globe. Due to its benefits, such as immutability and transparency, traditional companies outside of banking, like BMW and Bosch, have begun to experiment with smart contracts to produce more…

SolarWinds Hackers Dangle BMWs to Eavesdrop on Diplomats

  The Russia-backed group responsible for the SolarWinds attack, known as Cloaked Ursa or Nobelium/APT29, has shifted its tactics and is now targeting foreign diplomats working at embassies in Ukraine. Instead of using traditional political lures, the group is employing…

Custom Data: A Key to Mitigating AI Risks

Businesses are continuously looking for ways to maximize the advantages while limiting the potential hazards in the quickly developing field of artificial intelligence (AI). One strategy that is gaining traction is using unique data to train AI models, which enables…

Sharp Increase in Malware Attacks via USB Flash Drives

  Instances of cybercriminals employing USB drives for malware attacks have seen a significant rise. According to security researchers from Mandiant, there has been a three-fold increase in malware attacks via USB drives aimed at stealing sensitive information during the…

Unveiling Entrepreneurs’ Hesitations with ChatGPT

ChatGPT has become a significant instrument in the field of cutting-edge technology, utilizing the ability of artificial intelligence to offer conversational experiences. Nevertheless, many business owners are still reluctant to completely adopt this creative solution despite its impressive possibilities. Let’s…

Ransomware Resurgence: A Renewed Wave of Cyber Threats

  Harvard Business Review reports claim that cyberattacks have increased dramatically since the overnight shift from remote to office work in 2020. In 2020, all types of cyberattacks have increased over the previous year, but ransomware is by far the…

ScarletEel Hackers Breach AWS Cloud Infrastructure

  Researchers have discovered that a financially motivated threat actor called ScarletEel has been infiltrating Amazon Web Services (AWS) for various malicious activities. These activities include stealing credentials and intellectual property, deploying crypto mining software, and carrying out distributed denial-of-service…

Ransomware Gangs Exposing Private Files of Students Online

Ransomware groups have lately been dumping private documents acquired from schools online. The stolen content included happens to be raw, intimate and graphic. The confidential ‘data’ leaked online involve content as explicit as describing student sexual assaults, psychiatric hospitalizations, abusive…

Twitter Becomes the Epicentre of FTM Fraud

  Online settings, such as Twitter, are becoming increasingly perilous, rife with fraudulent schemes aimed at naïve victims. Social media giant has recently been the epicentre of deception, with fraudsters deploying innovative ways to abuse its massive user base. One…

This Threat Actor Targeted NATO Summit Attendees

  A Russia-linked threat actor known as RomCom has been targeting entities supporting Ukraine, including guests at the 2023 NATO Summit. The summit is taking place in Vilnius, Lithuania, and will discuss the war in Ukraine and new memberships in…

Critical TootRoot Bug Hijack Mastodon Servers

  Mastodon, the decentralized social networking platform that emphasizes freedom and open-source principles, has recently addressed several vulnerabilities, including a critical one with potentially severe consequences. This particular vulnerability enabled hackers to exploit specially designed media files, allowing them to…

AI: How to guard against privacy invasion by bots

  Since ChatGPT entered our life and launched a conflict in the artificial intelligence area, a new race known as the AI Arms Race 2.0 has started. The same ChatGPT that everyone initially found impressive also raised concerns about copyright…

Pakistan Election Commission Faces Cyber Attack

  The Pakistan Election Commission recently encountered a significant cyber attack, jeopardizing the security and integrity of its electoral processes. This incident has raised concerns regarding the protection of sensitive data and the potential implications for the country’s democratic system.…

Escalating Global Threats Targeting Cloud Infrastructure

  Cloud computing’s quick uptake has fundamentally changed how businesses manage and keep their data. However, as cloud environments become more and more popular, an alarming increase in cyber threats targeting them has also occurred. The sophistication of attacks on…

Can TV and Radio Broadcasts Be Hacked?

In today’s interconnected world, where technology permeates every field, the security of communication channels is paramount. People rely heavily on TV and radio broadcasts for information and entertainment. So, can TV and radio broadcasts be hacked? The answer is yes.…

Are Your Google Docs Safe From AI Training?

  AI systems like Google’s Bard and OpenAI’s ChatGPT are designed to generate content by analyzing a huge amount of data, including human queries and responses. However, these systems have sparked legitimate worries regarding privacy. Google has emphasized that it…

Will Threads be a ‘Threat’ to Twitter?

About Threads Meta, Instagram’s parent company launched Threads, which will be a text-based conversation app, rivaling Twitter. Threads, released on Wednesday evening, a day before its scheduled release, allows users to join up directly from their Instagram accounts; it is…

Industrial Solar Panels Face Critical RCE Bugs

Several critical Remote Code Execution (RCE) vulnerabilities have recently emerged, posing a significant threat to industrial solar panels and potentially endangering grid systems. These vulnerabilities, if exploited, could have severe consequences for energy organizations and their critical infrastructure. Security experts…

Data Leak Affects 425,000 Swiss Addresses

Cyber threat actors have apparently stolen what is the most comprehensive data set on Swiss citizen abroad. The data set first appeared on the darknet in mid-May. It consisted of the subscribers’ information to the Swiss ReviewExternal link. The data…