Israeli cybersecurity companies have made an unparalleled spyware tool available, which has shocked the whole world’s computer sector. This new breakthrough has sparked discussions about the ethics of such sophisticated surveillance equipment as well as worries about privacy and security.…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Espionage Group Suspected of Intruding Asian Nation’s Power Grid
Earlier this year, cyber attackers targeted an undisclosed Asian country’s national power grid using ShadowPad malware, commonly associated with entities linked to the Chinese government, according to cybersecurity experts. While Symantec did not explicitly attribute the incident to China,…
Law Enforcement Faces Unprecedented Cyber Threat as Hackers Swipe Police Officer Data
In a cyber-attack that has struck two of Britain’s most well-known police forces, an expert has warned of a high probability that the personal details of tens of thousands of public sector workers may have been compromised. Last month,…
Cybercriminals are Targeting Schools, They are not Ready
This March, Minneapolis Public Schools district witnessed a major ransomware attack, losing thousands of private information such as students’ mental health records, sexual assault incidents, suspensions and truancy reports, child abuse allegations, special education plans, that were released online. In…
Apple Seeks to Defuse a French iPhone 12 Issue as EU Inquiry Intensifies
In order to resolve a dispute concerning radiation levels, Apple pledged on Friday to upgrade the software on iPhone 12s in France. However, concerns in other European nations suggested Apple might need to take similar steps abroad. France suspended…
OpenAI’s ChatGPT Enterprise Addresses Data Privacy Concerns
OpenAI has advanced significantly with the introduction of ChatGPT Enterprise in a time when data privacy is crucial. Employers’ concerns about data security in AI-powered communication are addressed by this sophisticated language model. OpenAI’s commitment to privacy is evident…
AI in Sounds is Helping Brands Create Their ‘Sonic Identity’
It is now well acknowledged that in the present era, individuals are constantly exposed to fast-moving imagery, be it through social media videos or digital billboards in public places. However, Michele Arnese, an advertising entrepreneur believes there has been a…
MGM Resorts Hit by Cyber Siege: Hackers Brag About Four-Day Outage
In the wake of a cyberattack that forced MGM Resorts to shut down systems across all of its properties, the company continues to suffer from widespread outages. The majority of MGM’s internal networks were shut down for most of…
Ransomware Actors’ Recent Rhysida Attacks Highlight a Rising Threat on HealthCare Institutions
The threat organisation behind for the rapidly expanding Rhysida ransomware-as-a-service operation has claimed responsibility for an Aug. 19 attack that disrupted systems at Singing River Health System, one of Mississippi’s leading healthcare facilities. The attack comes on the heels…
Attack on MGM Resorts Linked to BlackCat Ransomware Group
In an unexpected turn of events, the notorious ALPHV/BlackCat ransomware organization has been blamed for a recent intrusion on MGM Resorts, a major international leisure and entertainment giant. More than 100 MGM ESXi hypervisors were the focus of the attack,…
LockBit Ransomware Falters, Attackers Deploy New ‘3AM’ Malware
In a recent cyberattack targeting a construction company, hackers attempted to deploy the LockBit ransomware on a target network but were thwarted. In an unexpected twist, they resorted to a previously unknown ransomware variant called 3AM, successfully infiltrating the…
Popular Resort and Casino Giant Experiences Cybersecurity Issue
Globally popular hospitality and casino giant, MGM resorts is witnessing a cyber-attack, following which its customers have reported several issues with the proper functioning of slot machines and online room booking systems. While the company has acknowledged this as a…
Ransomware Access Broker Leverages Microsoft Teams Titles for Account Theft
A Microsoft warning has been issued about a new phishing campaign which is being undertaken by one of its first-level access brokers. This campaign uses Teams messages as lures to sneak into corporate networks to collect sensitive data. Under…
MGM Resorts Breached by ‘Scattered Spider’ Hacking Group
MGM Resorts is still dealing with severe outages as a result of a hack that led it to shut down systems across its facilities. MGM, which owns and runs several Las Vegas Strip hotels and casinos, including the Bellagio,…
Tech Enthusiasts Discover New Frontiers in the Age of EVs
Electric vehicle (EV) technology is developing quickly, and a new group of tech aficionados called EV hackers is forming. These people want to investigate the latent possibilities of electric automobiles, not steal cars or undermine security systems. These creative minds…
Europol Warns of a Potent Criminal Economy Fostered by New Technological Tools
Europol’s inaugural report on financial and economic crime highlights the alarming extent to which money laundering techniques employed by ransomware groups and cryptocurrency scammers are now cleaning the cash of nearly 70% of the world’s organized crime networks. Despite…
Overcoming the Escalating Challenge Posed by Session Hijacking
Businesses are increasingly adopting security measures, from passkeys to multifactor authentication (MFA), to safeguard sensitive information and bolster their cybersecurity. However, it’s crucial for security teams to acknowledge that these measures may not provide comprehensive protection for user data.…
Using Generative AI to Revolutionize Your Small Business
Staying ahead of the curve is essential for small businesses seeking to succeed in today’s fast-paced business environment. Generative artificial intelligence (AI) is a cutting-edge tool that has gained popularity. The way small firms operate, innovate and expand could be…
Guarding Against DMARC Evasion: The Google Looker Studio Vulnerability
As a free online tool, Google Looker Studio allows users to create reports that can be customized with charts, graphs, and other data points. Once users have prepared their report, they can share it with anyone they desire. It…
Resort Giant Hacked: MGM Resorts Experiences a “Cybersecurity Issue”
In the recent turn of events, MGM Resorts – known to be one of the mega-entertainment and hospitality venues in the world (operating the largest casino on their Las Vegas strip) — has got hacked. A local news outlet in…
BianLian Ransomware Gang Siphons 6.8TB of Data from Save The Children
One of the biggest and oldest charities in the world, Save the Children, has admitted it was a victim of a ransomware attack by the BianLian operation. The attack first came to light on Monday, September 11, when details…
Online Jobseekers Beware: Strategies to Outsmart Scammers
The number of employment scams is increasing, and the number of job seekers who are targets of cunning scammers is also on the rise. A person who is seeking a new job is advised to be vigilant to these…
MrTonyScam: Python-based Stealers Deployed via Facebook Messenger
A new phishing attack has recently been witnessed in Facebook Messenger where messages are being transferred with malwares attached to them, hailing from a “swarm of fake and hijacked personal accounts” and their aim is accessing targets’ business accounts. The…
Hackers Attack Telegram With DDoS After Targeting Microsoft and X
Anonymous Sudan has launched a distributed denial-of-service (DDoS) attack against Telegram in response to the messaging platform’s decision to deactivate its principal account, according to threat intelligence firm SOCRadar. Anonymous Sudan, claiming to be a hacktivist group motivated by…
Google Chrome Launches ‘Privacy Sandbox’ to Phase Out Tracking Cookies
Google has officially commenced the implementation of Privacy Sandbox within its Chrome web browser for a majority of its users. This move comes nearly four months after the initial announcement of the plan. “We believe it is vital to…
The Cybersecurity Crisis: Dating App “Coffee Meets Bagel (CMB)” Hacked again!
In an increasingly digital world, the threat of cyber-attacks is more prevalent than ever. This article delves into an alarming case of cybersecurity breach involving a popular dating platform, which led to over 620 million user accounts being compromised…
Chrome’s Invasive New Tracking Sparks Need for a New Browser
The importance of privacy issues has increased in the digital era, leading people to look for browsers that prioritize data protection. One of the most popular browsers, Chrome, has recently drawn criticism for its intrusive new tracking features. Users are…
AP Stylebook Data Breach: Associated Press Warns That The Breach Led to Phishing Attacks
The Associated Press has warned of what potentially is a data breach in AP Stylebook servers, impacting their customers. Reportedly, the data has been used by the threat actors in launching their targeted phishing attacks. The AP Stylebook is a…
Behind the Wheel, Under Surveillance: The Privacy Risks of Modern Cars
The auto industry is failing to give drivers control over their data privacy, according to researchers warning that modern cars are “wiretaps on wheels.” An analysis published on Wednesday revealed that in an era when driving is becoming increasingly…
Here’s How Hackers Sell and Trade Your Data in the Metaverse
Your data might be lost in the metaverse, a place where reality takes on new forms and lovely virtual landscapes arise. Imagine yourself in a bustling digital marketplace, surrounded by avatars dressed in the latest digital attire. A secret…
Unveiling the DarkGate Malware Phishing Attack on Microsoft Teams
Cybercriminals have focused on Microsoft Teams, a widely used tool for remote collaboration, in a recent round of cyber assaults. This well-known tool is being used by a crafty phishing campaign to spread the dangerous DarkGate ransomware. This cunning scheme…
Vishing Scams: Here’s How to Spot & Defend Against Them
Vishing (voice or VoIP phishing) is a sort of cyber attack that uses voice and telephony technologies to deceive targeted persons into disclosing sensitive data to unauthorized entities. The information could be personal, such as a Social Security number…
Understanding HTTPS Spoofing: A Deceptive Online Threat
Online security is no longer a luxury but an absolute necessity in today’s digital age. For the average internet user, spotting the reassuring green padlock symbol and the “https://” prefix in their browser’s address bar has become a common…
Cisco: Leadership Awareness Fuels the Booming Identity Market
The latest research conducted by Cisco Investments with venture capital firms reveals that most CISOs believe complexity in tools, number of solutions and technical glossaries are among the many barriers to zero trust. It has been observed that around 85%…
Online Hackers Target Microsoft Teams to Propagate DarkGate Malware
Microsoft Teams conversations are being abused by a new phishing attempt to distribute malicious attachments that install the DarkGate Loader malware. When two external Office 365 accounts were found to be hijacked and were detected sending Microsoft Teams phishing…
Blockchain’s Role in Reinventing ATM Security: A Game-Changer in Banking
Blockchain technology allows for the creation of a structured data structure that is intrinsically secure. A cryptocurrency is based on the principles of cryptography, decentralization, and consensus, which is a mechanism that ensures that transactions can be trusted. Data…
Microsoft and Google’s Approach to Replace Obsolete TLS Protocols
Tech behemoths Microsoft and Google have teamed up to phase out outmoded TLS (Transport Layer Security) protocols in a decisive drive to strengthen online security. TLS protocols are essential for protecting internet connections because they guarantee that data is kept…
New York’s Geofencing Ban: A Game Changer for Advertisers
The New Law on Geofencing New York has recently passed a new provision in its state budget that prohibits advertisers from geofencing healthcare facilities. This law, which was passed in May, has made it increasingly difficult for advertisers who want…
Mirai Botnet Variant ‘Pandora’ Hijacks Android TVs
Pandora, a variant of the Mirai botnet, has been identified targeting budget-friendly Android-based television sets and TV boxes. It utilizes these devices as part of a botnet to execute distributed denial-of-service (DDoS) attacks. Mirai is a type of harmful…
Johnson & Johnson Reveals: IBM Data Breach Compromised Customer Data
Johnson & Johnson Health Care Systems (Janssen) recently informed their CarePath customers of a third-party data breach involving IBM, that has resulted in the compromise of their sensitive information. IBM is a technology service provider for Janssen. In particular, it…
Elon Musk Claims he Withheld Starlink to Deny Attack on Russian Navy Fleet
Elon Musk claimed that he turned down a proposal from the Ukrainian government to turn on his Starlink satellite network near Sevastopol, the port city of Crimea, last year in order to support an assault on the Russian navy…
From Vulnerabilities to Vigilance: Addressing Software Supply Chain Attacks
Cybersecurity experts have long been concerned about the possibility of supply chain attacks mainly due to the chain reaction that can be triggered by just one attack on one supplier, which can lead to a compromise of the entire…
LastPass Security Breach Linked to Series of Crypto Heists, Say Experts
Security experts allege that some of the LastPass password vaults, which were stolen in a security breach towards the end of 2022, have now been successfully breached, leading to a series of substantial cryptocurrency thefts. According to cybersecurity blogger…
The Cybersecurity Crisis: Dating App “Coffee Meets Bagel (CMB)” Hacked, Over 620 Million Accounts Compromised
Photo by kalhh on Pixabay In an increasingly digital world, the threat of cyber-attacks is more prevalent than ever. This article delves into an alarming case of cybersecurity breach involving a popular dating platform, which led to over 620…
Data Privacy Concerns Surround Period Tracking Apps
Period tracking apps have become increasingly popular among women seeking to monitor their menstrual cycles, plan pregnancies, or simply stay informed about their health. However, recent reports have raised serious concerns about the handling of user data by these apps.…
North Korean Threat Actors Stole $41 Million in Online Casino Heist
This week, cyber attackers set their sights on Stake.com, an online casino game and sports betting platform. They successfully made away with around $41 million in cryptocurrencies. The FBI has pinpointed North Korea and its infamous state-supported hacking group,…
Mac Users Under Attack: Malvertising Campaign Distributing Atomic Stealer Malware
An updated version of macOS stealer malware called Atomic Stealer (or AMOS) is being distributed through a new malvertising campaign. The authors of the program appear to be actively maintaining and updating malware. When the creators of AMOS found…
W3LL Store: Unmasking a Covert Phishing Operation Targeting 8,000+ Microsoft 365 Accounts
A hitherto undisclosed “phishing empire” has been identified in a series of cyber attacks targeting Microsoft 365 business email accounts spanning six years. According to a report from cybersecurity firm Group-IB, the threat actor established an underground market called…
Check Point to Acquire Cyber Startup Atmosec to Boost Its SaaS Security Offering
Check Point Software intends to acquire an early-stage SaaS security business founded by former Armis leaders in order to anticipate and combat malicious application threats. According to Vice President of Product Management Eyal Manor, the Silicon Valley-based platform security…
North Korean Hackers Steal Crypto to Fund ‘Nuclear Weapon Program’
North Korea based hackers have reportedly carried out another attack, stealing hundreds of millions in crypto in order to fund their regime’s ‘nuclear weapon program.’ According to blockchain intelligence company TRM Labs, almost 20% of all cryptocurrency stolen this year,…
The Rise of AI-Powered Narcissism: Exploring the Impact of Digital Clones on Our Psychology
Are we entering a new age of AI-powered narcissism? This is a question that has been raised by Dazed in their recent article. The rise of AI-powered clones and their potential impact on our psychology is a topic that has…
Privacy Class Action Targets OpenAI and Microsoft
A new consumer privacy class action lawsuit has targeted OpenAI and Microsoft, which is a significant step. This legal action is a response to alleged privacy violations in how they handled user data, and it could be a turning point…
Apple Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones
On Thursday, Apple urgently issued security patches for iOS, iPadOS, macOS, and watchOS. These updates were released in response to the exploitation of two previously unknown vulnerabilities in the wild. These flaws were utilized to deploy NSO Group’s Pegasus spyware,…
UK Military Data Breach via Outdated Windows 7 System
A Windows 7 machine belonging to a high-security fencing company was the stunning weak link in a shocking cybersecurity incident that exposed vital military data. This hack not only underlines the need for organizations, including those that don’t seem to…
Dallas Ransomware Attack: Hackers Steal 800K City Files
Hackers who targeted the City of Dallas in the alleged ransomware attack have stolen nearly 1.2 terabytes of data, which equals a sum of 819,000 files, reports City officials. City’s Chief Information Officer Bill Zielinski describes that the threat actors…
How to Protect Your Personal Financial Information from Data Brokers
In today’s digital age, personal information is a hot commodity. Data brokers buy and sell this information, often without our knowledge or consent. This can include sensitive financial information, which can be used for identity theft or other fraudulent activities.…
UK’s Nuclear Submarine Base Faces Unprecedented Threats: Russia Implicated in Shocking Incidents
A Russian-linked group of hackers, which has reportedly obtained hundreds of pages of information about critical sites such as HMNB Clyde, which houses the UK’s nuclear weapons arsenal, is believed to have targeted the nuclear weapons arsenal at the…
Automakers can Exploit Your Private Data However They Want
It turns out that the answer to the question of which devices have the worst user privacy policies may be waiting for you outside. The Mozilla Foundation said in a report released on Wednesday that cars are “the official…
Okta: Cyber Attackers Target IT Help Desks to Compromise Super Admin and Disable MFA
Okta, a leading identity and access management firm, has issued a warning regarding a series of social engineering attacks aimed at IT service desk agents of U.S.-based clients. The attackers’ primary objective was to deceive these agents into resetting…
FBI Duck Hunt Operation Against Qakbot Resurgence
Last week, a pernicious and multifunctional malware was silenced as a result of Operation “Duck Hunt,” a collaborative effort led by the FBI. This operation successfully extracted the malicious code from 700,000 compromised systems, forcibly severing their connection to…
Threat Actors Exploits SQL Servers to Deploy FreeWorld Ransomware
Threat actors are exploiting vulnerable Microsoft SQL servers, deploying Cobalt Strike and a ransomware strain named FreeWorld. According to cybersecurity firm Securonix, the campaign is notable for the way its infrastructure and toolkit are used. The firm has named the…
Golfing Community Shaken as Calloway Data Breach Hits One Million Fans
At the start of August, Topgolf Callaway (Callaway) was hacked by hackers, exposing the sensitive account and personal information of over 1 million customers to the dangers of identity theft. There are many manufacturers and retailers of various types…
The Future of Health and Medicine: The Impact of Generative AI
Generative AI is a rapidly growing field that has the potential to revolutionise the way we approach health and medicine. With the ability to generate new data, insights, and predictions, generative AI is inspiring dreams of a health data revolution. …
United Airlines Claims to Have Patched the Technical Glitch That Briefly Held Up Its Flights
United Airlines said Tuesday that it has fixed a technical fault that had led it to suspend worldwide departures, briefly crippling one of America’s largest carriers on a busy travel day. According to federal authorities, United crews were unable…
Electoral Commission Fails Cyber-Security Test Amidst Major Data Breach
The Electoral Commission has acknowledged its failure in a fundamental cyber-security assessment, which coincided with a breach by hackers gaining unauthorized access to the organization’s systems. A whistleblower disclosed that the Commission received an automatic failure during a Cyber…
Russian Cyber-Attacks and the Looming Threat of WW3
Russian cyberattacks have been on the rise alarmingly over the past few years, raising concerns among specialists about the possible repercussions. The threat that these cyberattacks will start a worldwide battle, commonly referred to as World War III, looms menacingly…
SaphhireStealer: New Malware in Town, Possess More Capabilities
A new malware called ‘SapphireStealer’ has been observed by Cisco Talos researchers. The malware came to light in December 2022 in Cisco’s public release, where they witnessed it frequently in public malware repositories, stealing browser credential databases and files containing…
Revolutionizing the Future: How AI is Transforming Healthcare, Cybersecurity, and Communications
Healthcare Artificial intelligence (AI) is transforming the healthcare industry by evaluating combinations of substances and procedures that will improve human health and thwart pandemics. AI was crucial in helping medical personnel respond to the COVID-19 outbreak and in the development…
Taming Your Android: A Step-Step Guide to Restricting Background App Data
It is no secret that Android smartphones are the most popular devices among the young generation because of their ability to give you unlimited possibilities. It is unfortunate that beneath the chic surface of this device lurks an elusive…
China’s Temu App Pose a Security Threat to Online Shoppers
Apps rule the contemporary era. Each aspect of our lives, from communication to e-commerce, appears to be dependent on digital platforms that promise convenience at the push of a button. A newbie among these apps has recently attracted a…
Freecycle Data Breach: Urgent Password Update Required
Freecycle, a well-known website for recycling and giving away unwanted stuff, recently announced a huge data breach that has affected millions of its users. This news has shocked the internet world. Concerns over the security of personal information on the…
Fortifying Cybersecurity for Schools as New Academic Year Begins
School administrators have received a cautionary alert regarding the imperative need to fortify their defenses against potential cyberattacks as the commencement of the new academic year looms. The National Cyber Security Centre has emphasized the necessity of implementing “appropriate…
The Rise of Chaes Malware: A Threat to Financial and Logistics Industries
The world of cybersecurity is constantly evolving, with new threats emerging on a regular basis. One such threat is the Chaes malware, which has recently undergone major overhauls, making it even more dangerous to the financial and logistics industries. What…
AI Development May Take a Toll on Tech Giant’s Environment Image
The Reputation of tech giants as a safe investment for investors interested in the environment, social issues, and governance as well as consumers who value sustainability is clashing with a new reality – the development and deployment of AI capabilities. …
How to Identify and Overcome Blockchain Fatigue
With its plethora of uses and potential for transformation, the blockchain ecosystem has unquestionably changed how current technology and business processes are planned. Blockchain technology promised dramatic changes in data integrity, transparency, and peer-to-peer interactions because it was based…
Tech Giants Grapple Russian Propaganda: EU’s Call to Action
In a recent study published by the European Commission, it was found that after Elon Musk changed X’s safety policies, Russian propaganda was able to reach a much wider audience, thanks to the changes made by Musk. After an…
Vietnamese Cybercriminals Exploit Malvertising to Target Facebook Business Accounts
Cybercriminals associated with the Vietnamese cybercrime ecosystem are exploiting social media platforms, including Meta-owned Facebook, as a means to distribute malware. According to Mohammad Kazem Hassan Nejad, a researcher from WithSecure, malicious actors have been utilizing deceptive ads to target…
BitBrowser Hackers Launder 70.6% of Stolen Funds
Hackers were able to transfer a remarkable 70.6% of the stolen BitBrowser cash through the eXch crypto mixer in a recent cyber robbery that startled the cryptocurrency world. Concerns regarding the security of digital assets and the increasing sophistication of…
Defending Against Snake Ransomware: Here’s All You Need to Know
A snake is not just a carnivorous reptile that poses a physical threat; it can also refer to a malicious software known as ransomware, capable of causing significant harm to your computer system. Similar to its namesake, this ransomware…
Russian Military Hackers Take Aim at Ukrainian Soldiers’ Battle Plans
On Thursday, the United States and its allies issued a warning, revealing that Russian military hackers have been actively pursuing Ukrainian soldiers’ mobile devices. Their objective is to pilfer critical battlefield data, which could potentially bolster the Kremlin’s efforts…
FBI Operation: Quakbot Botnet Dismantled, Preventing Severe Ransomware Attacks
A global law enforcement operation executed by US investigators reportedly took down and dismantled the Qakbot botnet, preventing the severe blow of a ransomware scourge. On August 29, the Justice Department and FBI confirmed to had taken down Qakbot by…
Google’s Quest for AI Dominance: Challenges and Opportunities
Google’s Diversification and Investment in AI In its early days, Google was primarily known as a search engine, but it has since diversified into many areas of tech and dominates some of them to an extent that sometimes troubles anti-competition…
Chastity Device Designer Exposes Customers’ Private Data Due to Server Vulnerabilities
A security researcher found that users of a company’s chastity device ran the risk of having their private information exposed. The researcher was able to access over 10,000 users’ email addresses, plaintext passwords, home locations, IP addresses, and GPS…
The Race to Train AI: Who’s Leading the Pack in Social Media?
A growing number of computer systems and data sets consisting of large, complex information have enabled the rise of artificial intelligence over the last few years. AI has the potential to be practical and profitable by being used in…
Sea Sides Conference: Interviewing Prashant Kv and Parveen
1) Could you please start by telling us a bit about yourself and your background? Prashant: Hi, my name is Prashant KV. I have been working in information security for more than 15 years. I started my career as…
Key Group Ransomware: Free Decryptor Released
A free decryptor to tackle the infamous Key Group ransomware has been launched, making a huge contribution to the fight against cybercrime. This finding represents a win for cybersecurity professionals and victims alike, offering some hope to those who have…
Default Passwords Lead to Hacking Incidents Among LogicMonitor Customers
Some customers of LogicMonitor, a network security firm, have been compromised by hacking attacks due to their use of default passwords. A spokesperson representing LogicMonitor has officially confirmed the existence of a “security incident” that is affecting a segment…
New Privacy Policy: X Plans on Collecting Users’ Biometric Data
According to a new privacy policy introduced by X (formerly known as Twitter), it will soon be collecting its users’ biometric data. The policy says that the company intends to compile individuals’ employment and educational histories. According to the policy…
Rare Technique Deployed by Android Malware to Illicitly Harvest Banking Data
Trend Micro, a cybersecurity research firm, has recently unveiled a novel mobile Trojan that employs an innovative communication technique. This method, known as protobuf data serialization, enhances its ability to pilfer sensitive data from compromised devices. Initially detected by…
Loan App Executive Asks BJP Legislator to Repay Loan That He Never Borrowed
Even prominent politicians fall prey to scammers in the world of cybercrime, which is a tremendous leveller. A person who is still unknown repeatedly called and texted the BJP legislator Ashish Shelar, requesting that he pay back a debt…
Threat of Fake Signal and Telegram Apps: Protecting Your Privacy and Security
In today’s digital age, the use of messaging apps has become an integral part of our daily lives. Apps like Signal and Telegram have gained immense popularity due to their focus on privacy and security. However, with the rise in…
3 Vital Cybersecurity Threats for Employees
Cybersecurity is no longer just the IT department’s job in today’s digitally connected society. Protecting confidential firm information is the responsibility of every employee, from the CEO to the newest intern. Cybercriminals are growing more skilled, and their methods are…
Chinese Chipmaker Accelerates Tool Replacement Amidst Sanctions
To counter U.S. sanctions that have slowed sales of semiconductors in China, a top executive at Huawei said Friday that the country’s semiconductor industry will be “reborn” following U.S. sanctions. In reaction to Washington’s tech export restrictions on China,…
VMConnect Supply Chain Attack Persists
During the initial weeks of August, the ReversingLabs research team uncovered a malicious supply chain operation, code-named “VMConnect.” This nefarious campaign involved the distribution of approximately twenty-four malevolent Python packages through the Python Package Index (PyPI), a widely used…
UN Reports: Hundreds of Thousands Coerced into Working in Online Scams
A latest UN investigation reports that hundreds of thousands of people have been trafficked to Southeast Asia to operate online scams. Apparently, at least 12,000 individuals from Myanmar and another 100,000 Cambodian nationals have been coerced into working on these…
Why Sharing Boarding Pass Pictures on Social Media Is a Privacy Risk, Warns Expert
Individuals flying for the first time are aware that an airline boarding pass includes certain details about a traveler, such as their name, flight number, and seat assignment. However, what might not be common knowledge is that these tickets,…
Why Next-Generation Firewalls are Essential for Modern Network Security
Firewalls have long been considered the first line of defense in network security. They monitor and control incoming and outgoing network traffic based on predetermined security rules. However, as technology evolves and cyber threats become more sophisticated, traditional firewalls are…
Meta Publishes FACET Dataset to Assess AI Fairness
FACET, a benchmark dataset designed to aid researchers in testing computer vision models for bias, was released by Meta Platforms Inc. earlier this week. FACET is being launched alongside an update to the open-source DINOv2 toolbox. DINOv2, which was…
Generative AI: A Catalyst for Enterprise IT & Security Challenges
Every day, new applications of artificial intelligence and machine learning are being explored and there is much to learn from them. Information and opinions are pouring out like a firehose, which is both inspiring and terrifying at the same…
When Will Robots Take Over Your Household Chores?
Researchers at MIT’s Computer Science and Artificial Intelligence Laboratory are striving to create a future where robots take on tasks like brewing coffee and arranging dining tables. The scientists at MIT are using simulations to teach robots how to handle…