A live map is all set to monitor cyberattacks around the globe as the conflict in Ukraine fuels a ‘significant surge’ in hostile activity. Apparently, the technology utilizes intelligence gathered from a high-end AI-powered system – ThreatCloud AI. The maps…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Ransomware Attacks on the Rise in Manufacturing Industry
The Growing Threat of Ransomware Attacks According to a recent report by Sophos, a global leader in cybersecurity, more than two-thirds (68%) of manufacturing companies hit by ransomware attacks globally had their data encrypted by hackers. This is the highest…
Federal Report Highlights Steps for Enhancing Software Code Pipeline Security Amid App Attacks
In a recent update, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) collaborated on an advisory memorandum with the aim of strengthening security measures within application development software supply chains. The memo, titled “Defending…
User Data Goldmine: Google’s Ambitious Mission to Scrape Everything for AI Advancement
It was announced over the weekend that Google had made a change to its privacy policies. This change explicitly states that the company reserves the right to scrape everything you post online to build its artificial intelligence tools. Considering…
Here’s Why Twitter is Limiting the Number of Tweets You May View
Twitter users who read an excessive number of tweets may eventually run out of something to read. You can thank Elon Musk for it. The Twitter owner said last Saturday that rate constraints, or limitations on the number of tweets…
Risks and Best Practices: Navigating Privacy Concerns When Interacting with AI Chatbots
The use of artificial intelligence chatbots has become increasingly popular. Although these chatbots possess impressive capabilities, it is important to recognize that they are not without flaws. There are inherent risks associated with engaging with AI chatbots, including concerns…
Everything You Need to Know About Cyber hygiene
Cyber hygiene involves the set of practices and actions performed by computer users to preserve the well-being of their systems and enhance online security. Similar to maintaining physical cleanliness, cyber hygiene is a regular routine aimed at safeguarding personal information…
ChatGPT is Only One Beginning point: 10 AI tools that are beating out to OpenAI’s Chatbot
Artificial intelligence (AI) is transforming everyday tasks in unprecedented manners. Since the release of OpenAI’s ChatGPT, the world has seen significant advancements in AI, with several tech titans competing to provide the most essential applications. Hundreds of thousands of AI…
The Safety of VPN Use: A Closer Look
The usage of Virtual Private Networks (VPNs) has experienced an unprecedented surge in recent years, as individuals and organizations seek enhanced online privacy and security. However, amidst this widespread adoption of VPNs, it is crucial to question whether users are…
AIIMS Ransomware Attack Leads to a New Cyber Response Framework
On November 23, 2022, the All India Institute of Medical Science, Delhi (AIIMS), suffered a cyber attack that was labeled by police as “cyber terrorism.” As a result of the cyberattack, offline patient services like appointment booking, billing, and diagnostic…
Realising the Potential of EMR Systems in Indian Healthcare
A hospital electronic medical record (EMR) serves as a tool for managing hospital orders, handling hospital workflows, and securing healthcare information from unauthorized access. It strives to improve the healthcare delivery process by reducing healthcare costs, optimizing profits, and…
Ransomware Makes Up 58% of Malware Families Sold as Services
Ransomware has emerged as the most pervasive Malware-as-a-Service (MaaS) during the past seven years, according to a new study from the Kaspersky Digital Footprint Intelligence team. Based on analysis of 97 malware families that were disseminated via the dark…
Innovative AI System Trained to Identify Recyclable Waste
According to the World Bank, approximately 2.24 billion tonnes of solid waste were generated in 2020, with projections indicating a 73% increase to 3.88 billion tonnes by 2050. Plastic waste is a significant concern, with research from the Universities…
Iranian APT Group Charming Kitten Updates Powerstar Backdoor
According to researchers from cybersecurity firm Volexity, the most recent variant of malware is probably backed by a custom server-side component. This component assists the Powerstar backdoor operator by automating basic tasks. The latest version of the malware utilizes a…
Companies Appeal for Relief From Biometric Privacy Act
Later this June, in a Public Radio talk show hosted by Brian Mackey, Senate President Don Harmon said that some of the most flourishing business association leaders have “punched us in the nose” after the Senate Democrats came up with…
Surge in ‘Call Center Gangs’ Linked to Organized Crime and Human Trafficking
Online, robocall, and other call scams are well-coordinated and often operated by criminal organizations based overseas. These scams primarily target older Americans. Biocatch, a biometric company, conducted a recent study revealing a significant surge of 200% in call scams…
Decoding the Buzz Around AI Corpora
Discussions about “corpus” in the context of artificial intelligence (AI) have become increasingly popular recently. The importance of comprehending the concept of a corpus has grown as AI becomes more sophisticated and pervasive in a variety of fields. The purpose…
Cyberattack on Suncor Energy Affects Petro-Canada Gas Stations
Customers have been reporting issues with Petro-Canada’s loyalty and payment programmes for almost a week now, but the company maintains it is working to find solutions. Around a week ago, reports that the parent company Suncor had been hacked…
Hackers for Hire Going After Law Firms, Alert French and UK Watchdogs
According to French and British authorities, law firms are increasingly targeted by mercenary hackers hired to steal data that could affect legal disputes. Reports from the UK’s National Cyber Security Centre (NCSC) and France’s cyber watchdog agency ANSSI emphasize the different…
EarlyRat Malware From Andariel Strikes North Korea
Andariel, a North Korea-aligned threat actor, recently used malware known as EarlyRat in phishing attacks. This adds to the wide range of tools the group uses to perpetrate attacks against its targets. An analyst has uncovered a previously unknown…
AI Scams: When Your Child’s Voice Isn’t Their Own
A fresh species of fraud has recently surfaced, preying on unwary victims by utilizing cutting-edge artificial intelligence technologies. A particularly alarming development is the use of AI-generated voice calls, in which con artists imitate children’s voices to trick parents…
Russians Hackers May Have Breached NHS Trust With 2.5 Million Patients
Intelligence authorities are currently engaged in an investigation into a suspected cyber attack targeting a prominent NHS trust, which serves a vast patient population of 2.5 million individuals. This incident involves a notorious group specializing in ransomware attacks, who…
TSMC Cyberattack: LockBit Demands a Ransom of $70m
Taiwan Semiconductor Manufacturing Company (TSMC) accused one of its equipment suppliers for its LockBit breach that, that has emerged in the on the gang’s dark web victim blog. Apparently, the ransomware has demanded a whopping $70 million ransom demand./ Without…
OpenAI, the Maker of ChatGPT, Sued for Allegedly Exploiting “Stolen Private Information”
Northern District of California files lawsuit OpenAI, the artificial intelligence company behind ChatGPT, is being sued for allegedly collecting millions of customers’ data to train its algorithms. The Northern District of California lawsuit claims that OpenAI used “stolen private information,…
CERT-In Publishes Security Norms for Government Data Safety
The usage of remote desktop applications like Anydesk and Teamviewer in government departments is now prohibited under new security rules issued last week by the Indian cyber security body CERTin. According to the regulations, government agencies must enable multi-factor…
Hacktivists With a Pro-Russian Agenda Increase Membership by 2,400% in DDoSia
‘DDoSia’, a crowd-sourced DDoS (distributed denial of service) project that features over ten thousand people to help conduct offensive attacks on Western organizations, has seen massive 2,400% growth in less than a year with more than 10,000 people contributing…
CISA Warns of DDoS Attacks on US Organizations Following Multiple Incidents
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a warning about ongoing distributed denial-of-service (DDoS) attacks affecting multiple industry sectors in the United States. To counter these attacks, all U.S. organizations are advised to proactively prepare their security…
Kick: The New Streaming Platform Making Headlines
Have you heard of Kick, the new streaming platform that recently made headlines? Kick, which will be officially launched in January 2023, gained attention after acquiring Amouranth and xQc, two of the biggest names on the Amazon-owned platform Twitch. In…
Canadian Government Hit by Hackers 2,300,000,000,000 Times Last Year
In the past fiscal year, Canada’s electronic intelligence organization revealed that it successfully thwarted an astonishing 2.3 trillion “malicious actions” targeting the federal government. This translates to an average of an astounding 6.3 billion disruptions per day. In its most…
Operation Cookie Monster: FBI Seizes Genesis Market Involved in Identity Theft
More than 100 individuals have been detained by the FBI and European law enforcement agencies for being involved in a global cybercrime forum, that apparently aided in some large-scale identity thefts. According to the US Justice Department, the operation was…
Google’s 6 Essential Steps to Mitigate Risks in Your A.I. System
Generative A.I. has the potential to bring about a revolutionary transformation in businesses of all sizes and types. However, the implementation of this technology also carries significant risks. It is crucial to ensure the reliability of the A.I. system…
Elevated Cybercrime Risks in Metro Cities: Understanding Urban Vulnerabilities
In metropolitan cities, cyber fraudsters understand how people think. It is not surprising that they provide certain services so quickly and efficiently to people with busy lives. Experts have found that this puts them at a higher risk of…
Millions Impacted by the MOVEit Mass Hacks, and the Toll is Rising
A security flaw in the MOVEit file transfer application has allowed hackers to steal the personal information of more than 15.5 million people, and the number of impacted companies keeps rising. A vulnerability in Progress Software’s enterprise file transfer…
Wagner Hackers Disrupt Russian Satellite Internet Provider
In an unexpected turn of events, a hacker group claiming to be connected to Wagner, a Russian paramilitary outfit, has taken credit for taking down a significant Russian satellite internet provider. Critical satellite communication systems’ security and stability have…
Generative AI Projects Can Lead to Major Security Threats for Businesses
Generative AI Projects’ Potential Cybersecurity Risks Have you heard anything about the potential cybersecurity dangers of generative AI projects to businesses? It’s a topic that’s recently made the news. You may be curious if technology and its impact on enterprises…
House GOP Considers Robot Dogs for Border Patrol
The deployment of modern robotic technology to improve border security was the focus of a recent House GOP meeting. The discussions centered on the prospective use of robot canines to patrol US borders, which would be a significant advancement…
Wagner’ Ransomware Targets Computers in Russia
A recent ransomware attack has been uncovered by security researchers, revealing a peculiar motive. The attackers behind this ransomware campaign are seemingly attempting to promote recruitment for the Russian mercenary group known as Wagner. Notably, Wagner had a brief period…
Granules India in Huge Loss After Cyber Attack Erodes Top Line
Granules India (GRAN.NS) issued a warning on Thursday regarding a huge loss in revenue and profitability as a result of a cyber security incident the pharmaceutical firm experienced in the latter part of May. The IT security breach caused…
8Base Ransomware: Researchers Raise Concerns Over its Increased Activities
The 8Base ransomware has well maintained its covert presence, avoiding detection for over a year. Although, a recent investigation into the ransomware revealed a significant rise in its operation during the period of May and June. It has been made…
ESXi Servers are Targeted by Linux-Based Akira Ransomware
As part of a ransomware operation called Akira, VMware ESXi virtual machines have been encrypted using a Linux encryption tool. This is to block access to the virtual machines. The attack comes after the company targeted Windows systems for…
EU Makes Progress in Regulating User Data, Limiting Big Tech Control
The European Parliament and the Council of the EU have reached a provisional agreement on a new Data Act, aiming to regulate the usage and accessibility of consumer and corporate data within the European Union. EU industry chief Thierry…
Hackers Hit Microsoft For Sudan Experts Says Its Russia
In recent events, Microsoft experienced a series of outages earlier this month, which have been attributed to a hacking group. This group had been engaged in a string of attacks on various targets, including Israel, Sweden, and several other…
ThirdEye: New Infostealer is Targeting Open System Information
FortiGuard Labs recently noted some suspicious-looking files during their cursory review. An investigation of the issue revealed the files were in fact malicious. This infostealer has been labeled as the “ThirdEye”. While not particularly sophisticated, this malware is made to…
Philippines Police Rescues 2,700 Individuals from Cybercrime Syndicate
More than 2,700 workers from China, the Philippines, Vietnam, Indonesia, and over a dozen other countries were reportedly lured into working for shady online gaming sites and other cybercrime organisations, according to Philippine police who claimed they rescued them…
Cyber Spying Seems to be the Predominant Goal of North Korean Hackers
According to a new study, an increasingly sophisticated North Korean cyber-espionage unit is using its skills to carry out spying operations on the aerospace and defense industries. As per an updated report released by a cyber-intelligence company, North Korean…
3 Key Reasons SaaS Security is Essential for Secure AI Adoption
The adoption of AI tools is revolutionizing organizational operations, providing numerous advantages such as increased productivity and better decision-making. OpenAI’s ChatGPT, along with other generative AI tools like DALL·E and Bard, has gained significant popularity, attracting approximately 100 million…
JavaScript Registry npm at Risk
The JavaScript registry npm, a vital resource for developers worldwide, has recently come under scrutiny due to a significant vulnerability known as manifest confusion. This flaw allows attackers to exploit the npm ecosystem, potentially compromising the integrity and security…
CryptosLabs Scam Ring Preys on French-Speaking Investors, Amasses €480 Million
A group of cybersecurity researchers has uncovered the inner workings of a fraudulent organization known as CryptosLabs. This scam ring has allegedly generated illegal profits amounting to €480 million by specifically targeting individuals who speak French in France, Belgium,…
The Power of a 5-Minute Phone Switch Off Against Hacking
The possibility of hacking is greater than ever in our increasingly digital society, where technology permeates every aspect of our lives. People and businesses are growing more vulnerable to cyberattacks as cybercriminals’ techniques become more sophisticated. However, turning off your…
Things CISOs Need to Know About Identity and Access Management
These days, threat actors are utilizing Generative AI to steal victims’ identities and profiting through deepfakes and pretext based cyberattacks. With the most recent Verizon 2023 Data Breach Investigations Report (DBIR) indicating that pretexting has doubled in only a year,…
Here’s Why Multiple Top Firms are Banning ChatGPT
Several major companies are preventing their staff from using ChatGPT despite its exceptional capabilities. ChatGPT and other generative AI technologies were outlawed by Samsung in May 2023. The Commonwealth Bank of Australia then followed suit in June 2023, along…
Surveillance on the Dark Side: A Technical Flaw Allows Hackers to Take Over Cameras
Digital infrastructure security is even more important in the age of high technology and dependency on it. Panorama, the BBC news program, reported a worrying security vulnerability recently uncovered by a BBC investigation into surveillance cameras. A new study…
New PindOS JavaScript Dropper Deploys Bumblebee, IcedID Malware
A newly identified malicious tool dubbed PindOS has been uncovered by security researchers. This particular tool functions as a JavaScript-based malware dropper, specifically designed to retrieve subsequent-stage payloads responsible for delivering the final payload utilized by attackers. The delivered payloads…
Phishers Luring Users to Install Malware With Fake OnlyFans Content
An investigation has been conducted into a malicious campaign that targeted smartphone users. The OnlyFans content being distributed is a fake version of OnlyFans’ content. This is used in this campaign to infect victims’ devices with malware called DcRAT. This…
Apple Issues Security Updates for Actively Exploited Vulnerabilities in iOS
Apple announced a series of patches this week for several of iOS zero-day flaws that have already been used by malicious parties to sneakily install malware and steal user data. Therefore, it is important that you update your phone…
How has AI Been Helpful in Developing Better Software?
Artificial Intelligence has largely been a reason why designing, developing, and deploying software has turned into a better and cheaper process for programmers. It is not the case that is being feared by many – AI replaying the developers –…
The Robotic Falcon Manufacturer Falls Victim to Cyber Criminals, Lost £100,000
John Donald, an entrepreneur who sells robotic falcons worldwide, has become a victim of cybercrime during the pandemic, despite his tech-savvy background. Donald, a 72-year-old grandfather, revealed that fraudsters targeted his family business when it faced a drastic 95%…
Rise of Cybercrime as a Service Will be Worse
The proliferation of cybercrime-as-a-service has created an expansive digital gateway for individuals seeking fast and unlawful gains on the internet. Alongside attacks-as-a-service, malware-as-a-service, and fraud-as-a-service, this phenomenon has granted easy access to various illicit opportunities in the online realm. …
Shockbyte Assures Users of Data Safety Amid Git Leak Incident
Minecraft enthusiasts were taken aback by recent reports of a security breach at Shockbyte, one of the leading Minecraft server hosting providers. However, the company has come forward to assure its users that there is no cause for concern…
A Major Public Pension Fund Suffered a Massive Data Breach
It was reported Wednesday that hackers stole the names and social security numbers of around 769,000 retirees and beneficiaries of the California Public Employees’ Retirement System. In addition, hackers stole their birth dates and other personal information. During the…
American and Southwest Airlines Witness Data Breach
This Friday, two of the world’s largest airlines, American Airlines and Southwest Airlines confirmed a data breach where their Pilot Credentials, a third-party software that controls the pilot recruitment and application for numerous airlines, were compromised. Apparently, the incident took…
Is ChatGPT Capable of Substituting IT Network Engineers? Here’s All You Need to Know
Companies are increasingly adopting chatGPT, a creation by OpenAI, to enhance productivity for both the company and its employees. This innovative tool has gained significant popularity worldwide, with various sectors and companies utilizing it for tasks such as writing,…
‘Muddled Libra’ Targets BPO Sector with Advanced Social Engineering
The BPO industry is facing a persistent threat from a malicious actor called Muddled Libra. This threat actor employs advanced social engineering tactics to launch repeated attacks and gain unauthorized entry into BPO systems. Business process outsourcing (BPO) is…
AI ‘Kidnapping’ Scams: A Growing Threat
Cybercriminals have started using artificial intelligence (AI) technology to carry out virtual abduction schemes, which is a worrying trend. These scams, which use chatbots and AI voice cloning techniques, have become much more prevalent recently and pose a serious threat…
Seeing is No Longer Believing as Deepfakes Become Better and More Dangerous
Numerous industries are being transformed by artificial intelligence (AI), yet with every benefit comes a drawback. Deepfake detection is becoming more and more challenging as AI image generators become more advanced. The impact of AI-generated deepfakes on social media…
Know Quantum Threats Before Using AI Language Models Like ChatGPT
By this point, ChatGPT has become a household name as the pioneering example of a novel form of artificial intelligence known as generative AI, or large language models (LLMs). Since its launch in November 2022, ChatGPT has experienced exceptional…
Here’s all you Need to Know About Crypto Poisoning Attack
In today’s digital landscape, advanced persistent threats have become a prevalent and ongoing challenge. The financial sector, particularly the realm of cryptocurrencies, faces even greater risks from these evolving cyber threats. Such threats not only endanger our sensitive data and…
Why are Western Cyber Attacks Less Heard of?
Camaro Dragon, Fancy Bear, Static Kitten and Stardust Chollima – these are some of the most notorious hacking group around the world. These cyber teams have been under the radar for hacking, stealing information and causing trouble allegedly on the…
Four Red Flags Warning You of a Hacked Wi-Fi Router
Wi-Fi has become a necessary component of our daily lives in today’s hyperconnected society. Everything from watching movies online to doing our banking online depends on it. But this convenience also raises the possibility of cyberthreats, such as the…
AI Amplifies Crypto Scam Threat, Warns Web3 Expert
hThe utilization of artificial intelligence (AI) by cybercriminals in crypto scams has taken a concerning turn, introducing more sophisticated tactics. Jamie Burke, the founder of Outlier Ventures, a prominent Web3 accelerator, highlighted this worrisome development in an interview with…
FBI Seized BreachForums Three Months After Administrator Arrest
It’s been more than three months since the alleged administrator of the English-language cybercrime marketplace BreachForums was arrested in the United States for striking against the site’s domain name. On March 20, the FBI arrested Conor Brian Fitzpatrick, 21,…
Phishing and Ransomware Attacks Continues to Hurt Singapore Businesses
Phishing efforts and ransomware remained a significant threat to organisations and individuals in Singapore in 2022, despite indicators that cyber hygiene is improving in the city-state, according to a new report from the country’s Cyber Security Agency (CSA). In…
Cl0p Ransomware Targets Sony, EY, and PwC in MOVEit Transfer Cyberattack
The recent attack, which commenced earlier this month, has the potential to become one of the largest cyberattacks in history. Its victims include various entities from the public and private sectors in the United States, United Kingdom, and other…
Microsoft’s Response to “Privacy-Concerns” of ChatGPT in Business
As a response to concerns over using individuals’ data to train artificial intelligence models, Microsoft is considering launching a privacy-centric version of ChatGPT. There is a possibility that the decision will be attractive to industries such as healthcare, finance,…
NHS: Hackers have Complete Access to Millions of Medical Devices in UK Hospitals
In England’s NHS Trust hospitals, millions of medical devices are now entirely vulnerable to ransomware attacks by cybercriminal groups. These ostensibly safe online gadgets, such surveillance cameras and blood pressure monitors, are either unable to run security software or…
Azure AD ‘Log in With Microsoft’ Authentication Bypass at Risk
Organizations that have adopted the “Log in with Microsoft” feature to their Microsoft Azure Active Directory setups may be exposed to an authentication bypass, which might lead to account takeovers of online and cloud-based accounts. Descope researchers have labeled the…
Android Users Beware: Glitch in 999 Call Feature Raises Concerns
Users of Android phones have been alerted by the UK police about a potentially hazardous bug in the 999 emergency call feature. Authorities are worried that some Android devices could unintentionally mute emergency calls, endangering lives. Law enforcement organizations…
Remote Work and the Cloud Create Various Endpoint Security Challenges
At the recent Syxsense Synergy event, cybersecurity experts delved into the ever-evolving challenges faced by security and endpoint management. With the increasing complexity of cloud technologies, advancements in the Internet of Things, and the widespread adoption of remote work, the…
Gen Digital Falls Prey to MOVEit Data Breach Attack
Gen Digital, the parent company of renowned cybersecurity firms like Avast and Norton, has acknowledged that its employees’ personal data has been compromised in another attack by the Cl0p ransomware group. The company confirmed the cyberattack on June 20…
Here’s Why Cybercriminals are Shifting Their Base from Tor to Telegram
Cybercrime is a rapidly evolving field. Threat actors, ransomware gangs, malware authors, and others are quickly leaving the “traditional” dark web (Tor sites) and relocating to shady Telegram channels that are dedicated to crimes. This article will look at…
All You Need to Know About the ‘Vehicle Privacy Report’
You might already know that your car knows a lot about you, be it the recent location you have checked in to, your phone contacts, and with today’s modern designs, even your emails and texts. Cars could record your travel…
Amazon Faces Lawsuit for Deceptive Prime Practices
Amazon, the e-commerce giant known for its convenience and customer-centric approach, is currently under fire as it faces allegations of tricking Prime customers. The company, which boasts millions of loyal subscribers to its Prime membership program, is now being sued…
Passport Forgery Suspect Do Kwon Jailed in South Korea
A disgraced former cryptocurrency boss, Kwon Do-hyeong, who was responsible for the collapse of the TerraUSD and Luna tokens in 2008, which involved a $40 billion (£31.3 billion) collapse in the value of the token, has been sentenced to…
Russia-Aligned Hackers Trying to Disrupt Canada’s Energy Sector
The most recent threat assessment from Canada’s Communications Security Establishment (CSE) reveals that non-state threat actors aligned with Russia are expected to persist in their efforts to infiltrate the country’s oil and gas sector. The CSE warns that these…
100K+ ChatGPT Login Credentials Leaked to the Dark Web
A Singaporean cybersecurity company discovered that over the last few year, login credentials of more than 100,000 online users using chatbot like ChatGPT has been leaked and traded in the Dark Web. According to the security researchers, infostealers illicitly acquire…
Report: U.S. Intelligence Gathers ‘Sensitive and Intimate’ Data From ‘Nearly Everyone’
Nowadays, nearly everything we depend on has the ability to collect information about us, including our smartphones, computers, cars, and even household appliances. Whether we like it or not, this data often ends up in the hands of marketing…
Digital Espionage: German Intelligence Agency’s NFT Collection Sets New Recruitment Standards
Using non-fungible tokens (NFTs), the German Federal Intelligence Service Bundesnachrichtendienst (BND) has begun attracting cyber and blockchain talent. To help recruit qualified employees, the BND has posted nearly 1,000 NFTs with a dog motif on the Ethereum blockchain alongside…
The Rate of Rorschach Ransomware is Increasing; Here’s How to Safeguard Yourself
Staying ahead of threat actors is a game of cat and mouse, with hackers frequently having the upper hand. LockBit was the most widely used ransomware strain in 2023. In the previous year, LockBit was recognised to be the…
PwC Caught in the Crossfire: Australian Fallout from Major Cyber Breach Deepens
There has been a severe scandal going on at the accounting firm PwC over the past few weeks involving a tax scam and the company was dealt another blow as Russian hackers have just managed to steal sensitive information. …
Data Collection: What are Some ‘Unlikable’ Traits in This Growing Trend?
One of the consequences of the pandemic in the many B2B2C manufacturers was the changes in interactions with their clients. Numerous manufacturing brands in consumer packaged goods (CPG), fashion, equipment, etc. understood the advantages of implementing a direct-to-consumer approach even…
Critical WordPress Plugin Vulnerabilities
WordPress, the popular content management system (CMS), is no stranger to security vulnerabilities. In recent news, critical vulnerabilities have been discovered in certain WordPress plugins, putting thousands of websites at risk. These vulnerabilities have the potential to allow unauthorized…
Crimeware-as-a-Service on the Rise; Here’s How to Protect Yourself
The global rate of cybercrime is rising. Cybercriminals exhibit no indications of slowing down, as evidenced by the recent rise in harmful web extensions (especially in the US) and the persistence of risky phishing and malware attacks—in part because…
Massive Data Breach: Over 100,000 ChatGPT Accounts Stolen via Info-Stealing Malware
Over 100,000 user accounts on the well-known ChatGPT platform have reportedly been hacked by attackers using sophisticated information-stealing malware in a startling occurrence. The disclosure has shocked the AI community and sparked worries about the privacy and security of…
EU Now Wants Smartphones to Feature Replaceable Batteries
In a noteworthy development, the European Union (EU) is making strides to reintroduce a long-lost and highly sought-after element that has gradually vanished from the smartphone market. An upcoming regulation is currently being advocated, aiming to reinstate user-replaceable batteries…
New Exploit Unleashed for Cisco AnyConnect Bug Granting SYSTEM Privileges
⁶ Proof-of-concept (PoC) exploit code has been released for a significant vulnerability found in Cisco Secure Client Software for Windows, previously known as AnyConnect Secure Mobility Client. This flaw allows attackers to elevate their privileges to the SYSTEM level. Cisco…
Government Agencies are Compromised by Russian Ransomware
Several federal agencies, including the Department of Energy and several others, have been hacked by a Russian cyber-extortion gang. However, Homeland Security officials warned Thursday that the impact would not be very significant. The hack of a popular file-transfer…
Delhi Police, FBI & Interpol in a Joint Operation Expose a Cybercrime Syndicate, Arrested Four
In a joint operation, Delhi Police, the Federal Bureau of Investigation (FBI), and Interpol have exposed an international syndicate involved in cybercrime, arresting four individuals involved in the cybercrime gang. The four members, including the kingpin, were detained for allegedly…
School Kids are Stealing NFTs Worth Millions of Dollars to Purchase Roblox Skins
Being wary of journalists can be a good thing at times. Take the case of Orbiter Finance. A claimed journalist from a crypto news website contacted one of its Discord moderators last month and requested that they complete out…
How Generative AI is Creating New Classes of Security Threats
AI technology is booming, and industries are in a rush to adopt it as quickly as they can. OpenAI’s ChatGPT has seen an unprecedented surge in user adoption, quickly becoming one of the most widely used AI platforms. This…
Reddit Braces for Data Leak as Hackers Threaten to Expose Stolen Information
A new wave of cybersecurity threats looms over Reddit as hackers, known as BlackCat, have recently surfaced with a dire warning. The group claims to have obtained confidential data during a breach that occurred back in February. Reddit, the…