Category: CySecurity News – Latest Information Security and Hacking Incidents

Israeli Cyber Firms Unveil Groundbreaking Spyware Tool

Israeli cybersecurity companies have made an unparalleled spyware tool available, which has shocked the whole world’s computer sector. This new breakthrough has sparked discussions about the ethics of such sophisticated surveillance equipment as well as worries about privacy and security.…

Espionage Group Suspected of Intruding Asian Nation’s Power Grid

  Earlier this year, cyber attackers targeted an undisclosed Asian country’s national power grid using ShadowPad malware, commonly associated with entities linked to the Chinese government, according to cybersecurity experts.  While Symantec did not explicitly attribute the incident to China,…

Law Enforcement Faces Unprecedented Cyber Threat as Hackers Swipe Police Officer Data

  In a cyber-attack that has struck two of Britain’s most well-known police forces, an expert has warned of a high probability that the personal details of tens of thousands of public sector workers may have been compromised.  Last month,…

Cybercriminals are Targeting Schools, They are not Ready

This March, Minneapolis Public Schools district witnessed a major ransomware attack, losing thousands of private information such as students’ mental health records, sexual assault incidents, suspensions and truancy reports, child abuse allegations, special education plans, that were released online.  In…

Apple Seeks to Defuse a French iPhone 12 Issue as EU Inquiry Intensifies

  In order to resolve a dispute concerning radiation levels, Apple pledged on Friday to upgrade the software on iPhone 12s in France. However, concerns in other European nations suggested Apple might need to take similar steps abroad.  France suspended…

OpenAI’s ChatGPT Enterprise Addresses Data Privacy Concerns

  OpenAI has advanced significantly with the introduction of ChatGPT Enterprise in a time when data privacy is crucial. Employers’ concerns about data security in AI-powered communication are addressed by this sophisticated language model. OpenAI’s commitment to privacy is evident…

AI in Sounds is Helping Brands Create Their ‘Sonic Identity’

It is now well acknowledged that in the present era, individuals are constantly exposed to fast-moving imagery, be it through social media videos or digital billboards in public places.  However, Michele Arnese, an advertising entrepreneur believes there has been a…

Ransomware Actors’ Recent Rhysida Attacks Highlight a Rising Threat on HealthCare Institutions

  The threat organisation behind for the rapidly expanding Rhysida ransomware-as-a-service operation has claimed responsibility for an Aug. 19 attack that disrupted systems at Singing River Health System, one of Mississippi’s leading healthcare facilities.  The attack comes on the heels…

Attack on MGM Resorts Linked to BlackCat Ransomware Group

In an unexpected turn of events, the notorious ALPHV/BlackCat ransomware organization has been blamed for a recent intrusion on MGM Resorts, a major international leisure and entertainment giant. More than 100 MGM ESXi hypervisors were the focus of the attack,…

LockBit Ransomware Falters, Attackers Deploy New ‘3AM’ Malware

  In a recent cyberattack targeting a construction company, hackers attempted to deploy the LockBit ransomware on a target network but were thwarted. In an unexpected twist, they resorted to a previously unknown ransomware variant called 3AM, successfully infiltrating the…

Popular Resort and Casino Giant Experiences Cybersecurity Issue

Globally popular hospitality and casino giant, MGM resorts is witnessing a cyber-attack, following which its customers have reported several issues with the proper functioning of slot machines and online room booking systems. While the company has acknowledged this as a…

Ransomware Access Broker Leverages Microsoft Teams Titles for Account Theft

  A Microsoft warning has been issued about a new phishing campaign which is being undertaken by one of its first-level access brokers. This campaign uses Teams messages as lures to sneak into corporate networks to collect sensitive data.  Under…

Tech Enthusiasts Discover New Frontiers in the Age of EVs

Electric vehicle (EV) technology is developing quickly, and a new group of tech aficionados called EV hackers is forming. These people want to investigate the latent possibilities of electric automobiles, not steal cars or undermine security systems. These creative minds…

Europol Warns of a Potent Criminal Economy Fostered by New Technological Tools

  Europol’s inaugural report on financial and economic crime highlights the alarming extent to which money laundering techniques employed by ransomware groups and cryptocurrency scammers are now cleaning the cash of nearly 70% of the world’s organized crime networks.  Despite…

Overcoming the Escalating Challenge Posed by Session Hijacking

  Businesses are increasingly adopting security measures, from passkeys to multifactor authentication (MFA), to safeguard sensitive information and bolster their cybersecurity. However, it’s crucial for security teams to acknowledge that these measures may not provide comprehensive protection for user data.…

Using Generative AI to Revolutionize Your Small Business

Staying ahead of the curve is essential for small businesses seeking to succeed in today’s fast-paced business environment. Generative artificial intelligence (AI) is a cutting-edge tool that has gained popularity. The way small firms operate, innovate and expand could be…

MrTonyScam: Python-based Stealers Deployed via Facebook Messenger

A new phishing attack has recently been witnessed in Facebook Messenger where messages are being transferred with malwares attached to them, hailing from a “swarm of fake and hijacked personal accounts” and their aim is accessing targets’ business accounts.  The…

Hackers Attack Telegram With DDoS After Targeting Microsoft and X

  Anonymous Sudan has launched a distributed denial-of-service (DDoS) attack against Telegram in response to the messaging platform’s decision to deactivate its principal account, according to threat intelligence firm SOCRadar.  Anonymous Sudan, claiming to be a hacktivist group motivated by…

Google Chrome Launches ‘Privacy Sandbox’ to Phase Out Tracking Cookies

  Google has officially commenced the implementation of Privacy Sandbox within its Chrome web browser for a majority of its users. This move comes nearly four months after the initial announcement of the plan. “We believe it is vital to…

The Cybersecurity Crisis: Dating App “Coffee Meets Bagel (CMB)” Hacked again!

  In an increasingly digital world, the threat of cyber-attacks is more prevalent than ever. This article delves into an alarming case of cybersecurity breach involving a popular dating platform, which led to over 620 million user accounts being compromised…

Chrome’s Invasive New Tracking Sparks Need for a New Browser

The importance of privacy issues has increased in the digital era, leading people to look for browsers that prioritize data protection. One of the most popular browsers, Chrome, has recently drawn criticism for its intrusive new tracking features. Users are…

AP Stylebook Data Breach: Associated Press Warns That The Breach Led to Phishing Attacks

The Associated Press has warned of what potentially is a data breach in AP Stylebook servers, impacting their customers. Reportedly, the data has been used by the threat actors in launching their targeted phishing attacks.  The AP Stylebook is a…

Behind the Wheel, Under Surveillance: The Privacy Risks of Modern Cars

  The auto industry is failing to give drivers control over their data privacy, according to researchers warning that modern cars are “wiretaps on wheels.” An analysis published on Wednesday revealed that in an era when driving is becoming increasingly…

Here’s How Hackers Sell and Trade Your Data in the Metaverse

  Your data might be lost in the metaverse, a place where reality takes on new forms and lovely virtual landscapes arise.  Imagine yourself in a bustling digital marketplace, surrounded by avatars dressed in the latest digital attire. A secret…

Unveiling the DarkGate Malware Phishing Attack on Microsoft Teams

Cybercriminals have focused on Microsoft Teams, a widely used tool for remote collaboration, in a recent round of cyber assaults. This well-known tool is being used by a crafty phishing campaign to spread the dangerous DarkGate ransomware. This cunning scheme…

Vishing Scams: Here’s How to Spot & Defend Against Them

  Vishing (voice or VoIP phishing) is a sort of cyber attack that uses voice and telephony technologies to deceive targeted persons into disclosing sensitive data to unauthorized entities.  The information could be personal, such as a Social Security number…

Understanding HTTPS Spoofing: A Deceptive Online Threat

  Online security is no longer a luxury but an absolute necessity in today’s digital age. For the average internet user, spotting the reassuring green padlock symbol and the “https://” prefix in their browser’s address bar has become a common…

Cisco: Leadership Awareness Fuels the Booming Identity Market

The latest research conducted by Cisco Investments with venture capital firms reveals that most CISOs believe complexity in tools, number of solutions and technical glossaries are among the many barriers to zero trust.  It has been observed that around 85%…

Online Hackers Target Microsoft Teams to Propagate DarkGate Malware

  Microsoft Teams conversations are being abused by a new phishing attempt to distribute malicious attachments that install the DarkGate Loader malware. When two external Office 365 accounts were found to be hijacked and were detected sending Microsoft Teams phishing…

Blockchain’s Role in Reinventing ATM Security: A Game-Changer in Banking

  Blockchain technology allows for the creation of a structured data structure that is intrinsically secure. A cryptocurrency is based on the principles of cryptography, decentralization, and consensus, which is a mechanism that ensures that transactions can be trusted.  Data…

Microsoft and Google’s Approach to Replace Obsolete TLS Protocols

Tech behemoths Microsoft and Google have teamed up to phase out outmoded TLS (Transport Layer Security) protocols in a decisive drive to strengthen online security. TLS protocols are essential for protecting internet connections because they guarantee that data is kept…

New York’s Geofencing Ban: A Game Changer for Advertisers

The New Law on Geofencing New York has recently passed a new provision in its state budget that prohibits advertisers from geofencing healthcare facilities. This law, which was passed in May, has made it increasingly difficult for advertisers who want…

Mirai Botnet Variant ‘Pandora’ Hijacks Android TVs

  Pandora, a variant of the Mirai botnet, has been identified targeting budget-friendly Android-based television sets and TV boxes. It utilizes these devices as part of a botnet to execute distributed denial-of-service (DDoS) attacks. Mirai is a type of harmful…

Johnson & Johnson Reveals: IBM Data Breach Compromised Customer Data

Johnson & Johnson Health Care Systems (Janssen) recently informed their CarePath customers of a third-party data breach involving IBM, that has resulted in the compromise of their sensitive information. IBM is a technology service provider for Janssen. In particular, it…

From Vulnerabilities to Vigilance: Addressing Software Supply Chain Attacks

  Cybersecurity experts have long been concerned about the possibility of supply chain attacks mainly due to the chain reaction that can be triggered by just one attack on one supplier, which can lead to a compromise of the entire…

LastPass Security Breach Linked to Series of Crypto Heists, Say Experts

  Security experts allege that some of the LastPass password vaults, which were stolen in a security breach towards the end of 2022, have now been successfully breached, leading to a series of substantial cryptocurrency thefts.  According to cybersecurity blogger…

The Cybersecurity Crisis: Dating App “Coffee Meets Bagel (CMB)” Hacked, Over 620 Million Accounts Compromised

‍Photo by kalhh on Pixabay ‍ In an increasingly digital world, the threat of cyber-attacks is more prevalent than ever. This article delves into an alarming case of cybersecurity breach involving a popular dating platform, which led to over 620…

Data Privacy Concerns Surround Period Tracking Apps

Period tracking apps have become increasingly popular among women seeking to monitor their menstrual cycles, plan pregnancies, or simply stay informed about their health. However, recent reports have raised serious concerns about the handling of user data by these apps.…

North Korean Threat Actors Stole $41 Million in Online Casino Heist

  This week, cyber attackers set their sights on Stake.com, an online casino game and sports betting platform. They successfully made away with around $41 million in cryptocurrencies. The FBI has pinpointed North Korea and its infamous state-supported hacking group,…

Mac Users Under Attack: Malvertising Campaign Distributing Atomic Stealer Malware

  An updated version of macOS stealer malware called Atomic Stealer (or AMOS) is being distributed through a new malvertising campaign. The authors of the program appear to be actively maintaining and updating malware.  When the creators of AMOS found…

W3LL Store: Unmasking a Covert Phishing Operation Targeting 8,000+ Microsoft 365 Accounts

  A hitherto undisclosed “phishing empire” has been identified in a series of cyber attacks targeting Microsoft 365 business email accounts spanning six years.  According to a report from cybersecurity firm Group-IB, the threat actor established an underground market called…

Check Point to Acquire Cyber Startup Atmosec to Boost Its SaaS Security Offering

  Check Point Software intends to acquire an early-stage SaaS security business founded by former Armis leaders in order to anticipate and combat malicious application threats.  According to Vice President of Product Management Eyal Manor, the Silicon Valley-based platform security…

North Korean Hackers Steal Crypto to Fund ‘Nuclear Weapon Program’

North Korea based hackers have reportedly carried out another attack, stealing hundreds of millions in crypto in order to fund their regime’s ‘nuclear weapon program.’ According to blockchain intelligence company TRM Labs, almost 20% of all cryptocurrency stolen this year,…

The Rise of AI-Powered Narcissism: Exploring the Impact of Digital Clones on Our Psychology

Are we entering a new age of AI-powered narcissism? This is a question that has been raised by Dazed in their recent article. The rise of AI-powered clones and their potential impact on our psychology is a topic that has…

Apple Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones

On Thursday, Apple urgently issued security patches for iOS, iPadOS, macOS, and watchOS. These updates were released in response to the exploitation of two previously unknown vulnerabilities in the wild. These flaws were utilized to deploy NSO Group’s Pegasus spyware,…

UK Military Data Breach via Outdated Windows 7 System

A Windows 7 machine belonging to a high-security fencing company was the stunning weak link in a shocking cybersecurity incident that exposed vital military data. This hack not only underlines the need for organizations, including those that don’t seem to…

Dallas Ransomware Attack: Hackers Steal 800K City Files

Hackers who targeted the City of Dallas in the alleged ransomware attack have stolen nearly 1.2 terabytes of data, which equals a sum of 819,000 files, reports City officials.  City’s Chief Information Officer Bill Zielinski describes that the threat actors…

How to Protect Your Personal Financial Information from Data Brokers

In today’s digital age, personal information is a hot commodity. Data brokers buy and sell this information, often without our knowledge or consent. This can include sensitive financial information, which can be used for identity theft or other fraudulent activities.…

UK’s Nuclear Submarine Base Faces Unprecedented Threats: Russia Implicated in Shocking Incidents

  A Russian-linked group of hackers, which has reportedly obtained hundreds of pages of information about critical sites such as HMNB Clyde, which houses the UK’s nuclear weapons arsenal, is believed to have targeted the nuclear weapons arsenal at the…

Okta: Cyber Attackers Target IT Help Desks to Compromise Super Admin and Disable MFA

  Okta, a leading identity and access management firm, has issued a warning regarding a series of social engineering attacks aimed at IT service desk agents of U.S.-based clients.  The attackers’ primary objective was to deceive these agents into resetting…

FBI Duck Hunt Operation Against Qakbot Resurgence

  Last week, a pernicious and multifunctional malware was silenced as a result of Operation “Duck Hunt,” a collaborative effort led by the FBI. This operation successfully extracted the malicious code from 700,000 compromised systems, forcibly severing their connection to…

Threat Actors Exploits SQL Servers to Deploy FreeWorld Ransomware

Threat actors are exploiting vulnerable Microsoft SQL servers, deploying Cobalt Strike and a ransomware strain named FreeWorld.  According to cybersecurity firm Securonix, the campaign is notable for the way its infrastructure and toolkit are used. The firm has named the…

Golfing Community Shaken as Calloway Data Breach Hits One Million Fans

  At the start of August, Topgolf Callaway (Callaway) was hacked by hackers, exposing the sensitive account and personal information of over 1 million customers to the dangers of identity theft. There are many manufacturers and retailers of various types…

The Future of Health and Medicine: The Impact of Generative AI

Generative AI is a rapidly growing field that has the potential to revolutionise the way we approach health and medicine. With the ability to generate new data, insights, and predictions, generative AI is inspiring dreams of a health data revolution. …

United Airlines Claims to Have Patched the Technical Glitch That Briefly Held Up Its Flights

  United Airlines said Tuesday that it has fixed a technical fault that had led it to suspend worldwide departures, briefly crippling one of America’s largest carriers on a busy travel day.  According to federal authorities, United crews were unable…

Electoral Commission Fails Cyber-Security Test Amidst Major Data Breach

  The Electoral Commission has acknowledged its failure in a fundamental cyber-security assessment, which coincided with a breach by hackers gaining unauthorized access to the organization’s systems.  A whistleblower disclosed that the Commission received an automatic failure during a Cyber…

Russian Cyber-Attacks and the Looming Threat of WW3

Russian cyberattacks have been on the rise alarmingly over the past few years, raising concerns among specialists about the possible repercussions. The threat that these cyberattacks will start a worldwide battle, commonly referred to as World War III, looms menacingly…

SaphhireStealer: New Malware in Town, Possess More Capabilities

A new malware called ‘SapphireStealer’ has been observed by Cisco Talos researchers. The malware came to light in December 2022 in Cisco’s public release, where they witnessed it frequently in public malware repositories, stealing browser credential databases and files containing…

Revolutionizing the Future: How AI is Transforming Healthcare, Cybersecurity, and Communications

Healthcare Artificial intelligence (AI) is transforming the healthcare industry by evaluating combinations of substances and procedures that will improve human health and thwart pandemics. AI was crucial in helping medical personnel respond to the COVID-19 outbreak and in the development…

Taming Your Android: A Step-Step Guide to Restricting Background App Data

  It is no secret that Android smartphones are the most popular devices among the young generation because of their ability to give you unlimited possibilities. It is unfortunate that beneath the chic surface of this device lurks an elusive…

Freecycle Data Breach: Urgent Password Update Required

Freecycle, a well-known website for recycling and giving away unwanted stuff, recently announced a huge data breach that has affected millions of its users. This news has shocked the internet world. Concerns over the security of personal information on the…

Fortifying Cybersecurity for Schools as New Academic Year Begins

  School administrators have received a cautionary alert regarding the imperative need to fortify their defenses against potential cyberattacks as the commencement of the new academic year looms.  The National Cyber Security Centre has emphasized the necessity of implementing “appropriate…

The Rise of Chaes Malware: A Threat to Financial and Logistics Industries

The world of cybersecurity is constantly evolving, with new threats emerging on a regular basis. One such threat is the Chaes malware, which has recently undergone major overhauls, making it even more dangerous to the financial and logistics industries. What…

AI Development May Take a Toll on Tech Giant’s Environment Image

The Reputation of tech giants as a safe investment for investors interested in the environment, social issues, and governance as well as consumers who value sustainability is clashing with a new reality – the development and deployment of AI capabilities. …

How to Identify and Overcome Blockchain Fatigue

  With its plethora of uses and potential for transformation, the blockchain ecosystem has unquestionably changed how current technology and business processes are planned. Blockchain technology promised dramatic changes in data integrity, transparency, and peer-to-peer interactions because it was based…

Vietnamese Cybercriminals Exploit Malvertising to Target Facebook Business Accounts

Cybercriminals associated with the Vietnamese cybercrime ecosystem are exploiting social media platforms, including Meta-owned Facebook, as a means to distribute malware.  According to Mohammad Kazem Hassan Nejad, a researcher from WithSecure, malicious actors have been utilizing deceptive ads to target…

BitBrowser Hackers Launder 70.6% of Stolen Funds

Hackers were able to transfer a remarkable 70.6% of the stolen BitBrowser cash through the eXch crypto mixer in a recent cyber robbery that startled the cryptocurrency world. Concerns regarding the security of digital assets and the increasing sophistication of…

Russian Military Hackers Take Aim at Ukrainian Soldiers’ Battle Plans

  On Thursday, the United States and its allies issued a warning, revealing that Russian military hackers have been actively pursuing Ukrainian soldiers’ mobile devices. Their objective is to pilfer critical battlefield data, which could potentially bolster the Kremlin’s efforts…

FBI Operation: Quakbot Botnet Dismantled, Preventing Severe Ransomware Attacks

A global law enforcement operation executed by US investigators reportedly took down and dismantled the Qakbot botnet, preventing the severe blow of a ransomware scourge.  On August 29, the Justice Department and FBI confirmed to had taken down Qakbot by…

Google’s Quest for AI Dominance: Challenges and Opportunities

Google’s Diversification and Investment in AI In its early days, Google was primarily known as a search engine, but it has since diversified into many areas of tech and dominates some of them to an extent that sometimes troubles anti-competition…

Chastity Device Designer Exposes Customers’ Private Data Due to Server Vulnerabilities

  A security researcher found that users of a company’s chastity device ran the risk of having their private information exposed. The researcher was able to access over 10,000 users’ email addresses, plaintext passwords, home locations, IP addresses, and GPS…

Default Passwords Lead to Hacking Incidents Among LogicMonitor Customers

  Some customers of LogicMonitor, a network security firm, have been compromised by hacking attacks due to their use of default passwords. A spokesperson representing LogicMonitor has officially confirmed the existence of a “security incident” that is affecting a segment…

New Privacy Policy: X Plans on Collecting Users’ Biometric Data

According to a new privacy policy introduced by X (formerly known as Twitter), it will soon be collecting its users’ biometric data.  The policy says that the company intends to compile individuals’ employment and educational histories. According to the policy…

Rare Technique Deployed by Android Malware to Illicitly Harvest Banking Data

  Trend Micro, a cybersecurity research firm, has recently unveiled a novel mobile Trojan that employs an innovative communication technique. This method, known as protobuf data serialization, enhances its ability to pilfer sensitive data from compromised devices. Initially detected by…

Loan App Executive Asks BJP Legislator to Repay Loan That He Never Borrowed

  Even prominent politicians fall prey to scammers in the world of cybercrime, which is a tremendous leveller. A person who is still unknown repeatedly called and texted the BJP legislator Ashish Shelar, requesting that he pay back a debt…

Threat of Fake Signal and Telegram Apps: Protecting Your Privacy and Security

In today’s digital age, the use of messaging apps has become an integral part of our daily lives. Apps like Signal and Telegram have gained immense popularity due to their focus on privacy and security.  However, with the rise in…

3 Vital Cybersecurity Threats for Employees

Cybersecurity is no longer just the IT department’s job in today’s digitally connected society. Protecting confidential firm information is the responsibility of every employee, from the CEO to the newest intern. Cybercriminals are growing more skilled, and their methods are…

Chinese Chipmaker Accelerates Tool Replacement Amidst Sanctions

  To counter U.S. sanctions that have slowed sales of semiconductors in China, a top executive at Huawei said Friday that the country’s semiconductor industry will be “reborn” following U.S. sanctions. In reaction to Washington’s tech export restrictions on China,…

VMConnect Supply Chain Attack Persists

  During the initial weeks of August, the ReversingLabs research team uncovered a malicious supply chain operation, code-named “VMConnect.” This nefarious campaign involved the distribution of approximately twenty-four malevolent Python packages through the Python Package Index (PyPI), a widely used…

UN Reports: Hundreds of Thousands Coerced into Working in Online Scams

A latest UN investigation reports that hundreds of thousands of people have been trafficked to Southeast Asia to operate online scams. Apparently, at least 12,000 individuals from Myanmar and another 100,000 Cambodian nationals have been coerced into working on these…

Why Sharing Boarding Pass Pictures on Social Media Is a Privacy Risk, Warns Expert

  Individuals flying for the first time are aware that an airline boarding pass includes certain details about a traveler, such as their name, flight number, and seat assignment. However, what might not be common knowledge is that these tickets,…

Why Next-Generation Firewalls are Essential for Modern Network Security

Firewalls have long been considered the first line of defense in network security. They monitor and control incoming and outgoing network traffic based on predetermined security rules. However, as technology evolves and cyber threats become more sophisticated, traditional firewalls are…

Meta Publishes FACET Dataset to Assess AI Fairness

  FACET, a benchmark dataset designed to aid researchers in testing computer vision models for bias, was released by Meta Platforms Inc. earlier this week.  FACET is being launched alongside an update to the open-source DINOv2 toolbox. DINOv2, which was…

Generative AI: A Catalyst for Enterprise IT & Security Challenges

  Every day, new applications of artificial intelligence and machine learning are being explored and there is much to learn from them. Information and opinions are pouring out like a firehose, which is both inspiring and terrifying at the same…

When Will Robots Take Over Your Household Chores?

Researchers at MIT’s Computer Science and Artificial Intelligence Laboratory are striving to create a future where robots take on tasks like brewing coffee and arranging dining tables. The scientists at MIT are using simulations to teach robots how to handle…