Reuters reported on Tuesday about a North Korea-based elite hacker group that is in a bid to steal technology by covertly breaching the computer networks of a Russian missile developer giant. Apparently, the hackers have been running the campaign for…
Category: CySecurity News – Latest Information Security and Hacking Incidents
OpenAI’s GPTBot: A New Era of Web Crawling
OpenAI, the pioneering artificial intelligence research lab, is gearing up to launch a formidable new web crawler aimed at enhancing its data-gathering capabilities from the vast expanse of the internet. The announcement comes as part of OpenAI’s ongoing efforts to…
Zoom Refutes Claims of AI Training on Calls Without Consent
Zoom has revised its terms of service following concerns that its artificial intelligence (AI) models were being trained on customer calls without consent, leading to a backlash. In response, the company clarified in a blog post that audio, video,…
LockBit Attack: Ransomware Gang Threatens to Leak Cancer Patients’ Medical Data
LockBit ransomware group recently revealed its intent to leak private medical data of cancer patients, stolen in the breach on Varian Medical Systems. Varian, a subsidiary of Siemens Healthineeres, provides software for the oncology department’s applications and specializes in offering…
37% of Third-party Applications have High-risk Permissions
Recent data analysis reveals a significant increase in the integration of third-party apps with email platforms. This trend underscores the rapid expansion of a new avenue of vulnerability that cybercriminals are exploiting, demonstrating their ongoing evolution in attack strategies. The…
Adobe Patches 30 Acrobat, Reader Vulnerabilities
Adobe has recently released a large batch of security updates for its flagship Acrobat and Reader software, patching at least 30 vulnerabilities affecting Windows and MacOS installations. In this blog post, we’ll take a closer look at the details of…
Fines for Facebook Privacy Breaches in Norway Crack Down on Meta
A fine of 1 million crowns ($98,500) will be imposed on the owner of Facebook, Meta Platforms, by the Norwegian Data Protection Authority (Datatilsynet) starting August 14 due to a privacy breach that occurred before that date. A significant…
Zoom Declines Training AI on Calls Without Approval
In response to criticism that it trained its artificial intelligence (AI) models on client calls, Zoom revised its terms of service. The company emphasised that chats, audio, and video were never utilised for AI without permission in a blog…
AI Eavesdrops on Keystrokes with 95% Accuracy
An advanced artificial intelligence (AI) model recently showed a terrifying ability to eavesdrop on keystrokes with an accuracy rate of 95%, which has caused waves in the field of data security. This new threat highlights potential weaknesses in the security…
Dark Web Grows Stronger. And So Does the Value of Monitoring
The Growing Threat of the Dark Web The Dark Web is rapidly growing along with the variety of cybercrime, and so is the value in monitoring it. The cybercrime ecosystem now not only includes private communications platforms like I2P and…
Colorado Department of Higher Education Attacked by Ransomware
The Colorado state government has issued a cautionary message to both students and educators regarding a potential security breach. The incident involves unauthorized access to personal information dating back to 2004. As stated on the official website of the…
Worldwide Tailor-Made Massive Phishing Campaign
The spotlight turned towards a worldwide phishing campaign when an incident unfolded involving an Imperva staff member who was singled out and almost ensnared by a social engineering assault. Imperva, situated in San Mateo, California, operates as a cybersecurity company.…
Experts Alert Travelers Against Sharing Photos of Boarding Passes Online
After giving hours to work – each day, every week, for months – checking in at the airport possibly represents an exciting time, for travelers who have waited long for the much-needed rest and recreation. One may also want to…
Elon Musk’s X Steps Up: Pledges Legal Funds for Workers Dealing with Unfair Bosses
In a recent interview, Elon Musk said that his company X social media platform, formerly known as Twitter, would cover members’ legal bills and sue those whose jobs are unfairly treated by their employers for posting or liking something…
Two-Thirds of UK Websites are at Risk from Malicious Bots
Two thirds (66%) of UK firms are defenceless against straightforward bot assaults, according to the UK Bot Security Report from DataDome. Security experts draw attention to the risky position that this puts UK firms in given the rising threat…
Govt Proposes Rs 250 Cr Fine for Consumer Data Leaks
The Indian government has proposed a fine of up to Rs 250 crore on enterprises found guilty of disclosing customer data, which is a significant step toward bolstering data protection procedures. This action is a component of the Data Protection…
This Ransomware Targets Several English-Speaking Nations
According to findings by Cisco Talos, a group of researchers, a fresh variant of ransomware is suspected to be employed in a series of attacks on entities situated in China, Vietnam, Bulgaria, and a number of English-speaking nations. The…
North Korean Hackers Infiltrate Russian Missile Engineering Firm
A sanctioned Russian missile engineering business was successfully penetrated by North Korean hackers, it has been revealed in an astonishing development, prompting worries about the possible repercussions of this security breach. The event shows how North Korea’s cyberwarfare capabilities…
Stay Safe Online: How to Protect Yourself from Pass-the-Cookie Attacks
What is a Pass-the-Cookie Attack? A pass-the-cookie attack is a way to bypass authentication in a web application using a stolen session cookie. When a user logs in to any application on the Internet, a session cookie is created in…
Multi-State Cyberattack Disrupts Health Care Services in Multiple States
One of the California organizations faced a cyberattack this week which resulted in some services being shut down at affiliated locations and some patients having to rely solely on paper records. The cyberattack disrupted hospital computer systems in several…
With 95% Accuracy, New Acoustic Attack can Steal from Keystrokes
UK universities’ researchers have recently developed a deep learning model, designed to extract information from keyboard keystrokes collected using a microphone, with 95% accuracy. The prediction accuracy decreased to 93% when Zoom was used to train the sound classification algorithm,…
U.S. Hunts Chinese Malware Halting Military Operations
The Biden administration is looking for malware that may jeopardise military and civilian power grids, communications systems, and water supplies, the New York Times reported. The malware, which is believed to have been installed by Chinese hackers linked to…
Clop Ransomware Adopts Torrents for Data Leaks in Effort to Evade Detection
The Clop ransomware group has once again adjusted its tactics for extortion, now employing torrents to disseminate stolen information obtained from MOVEit attacks. Beginning on May 27th, the Clop ransomware syndicate initiated a series of data theft assaults by…
Generative AI Has an Increasing Effect on the Workforce and Productivity
In a recent report published by KPMG, it was revealed that an overwhelming 97% of participants anticipate a significant or exceedingly substantial influence of generative AI on their respective organizations within the upcoming 12 to 18 months. Furthermore, the survey…
Cybersecurity Companies Offer Technology Stack Incorporating Zero Trust Edge
The rapid surge in cyberattacks delivering destructive payloads, including ransomware, is due to organisations’ complacency with legacy IAM, VPN, and perimeter-based network security systems. CISOs tell VentureBeat that hardware-based systems, which were never intended to guard beyond perimeters, are…
A Software Vulnerability in AMD’s Chip Compromises Tesla’s Paid Features
There is an AMD-based infotainment system vulnerability that can be exploited by researchers from the Technical University of Berlin to unlock restricted vehicle features, according to research. As a result, it has become particularly noticeable in vehicles that provide…
Worldcoin’s Verification Process Under Scrutiny After CertiK’s Discovery
Blockchain security company CertiK recently revealed a severe flaw that put the Worldcoin system at serious risk. The system’s security and integrity might have been compromised if the vulnerability allowed Orb operators unrestricted access. Users’ iris information was collected as…
Autonomous-Car Technology May Possess a Threat to Privacy
Self-driving, which was only possible in science fiction has now become something very common, a reality for people in San Francisco. Other places too, in the US, have been testing the technology. However, with new innovation comes its consequences. Here,…
How to Tell if a Company Is Selling Your Email Address
Have you ever signed up for a new website and then all of a sudden started getting emails from businesses and service providers you had never heard of? If so, there is a very good chance that your data…
Hospitals Paralyzed by Cyberattack, Emergency Services Diverted
Several hospitals in Pennsylvania and California were compelled to close their emergency departments and redirect incoming ambulances due to a recent uptick in cyberattacks, which created a frightening situation. The hack, which targeted the healthcare provider Prospect Medical Holdings, has…
Amazon Executive Lacks Data for Return-to-Office Mandate
Amazon employees are expressing discontent over the company’s recent decision to revoke remote work flexibility, and the situation has been exacerbated by comments made by a senior executive. During an internal staff meeting, Mike Hopkins, the SVP of Amazon…
Worldcoin’s Iris-Scanning Technology: A Game-Changer or a Privacy Concern
Worldcoin, a cryptocurrency and digital ID project co-founded by OpenAI CEO Sam Altman, has recently announced its plans to expand globally and offer its iris-scanning and identity-verification technology to other organizations. The company, which launched last week, requires users to…
Tricky Malware Uses Versioning to Outsmart Google Play Store Scanners
In recent developments, threat actors are using a technique known as “versioning” to evade Google Play Store’s malware detection mechanisms, posing a significant risk to Android users. This method allows them to specifically target users and compromise their sensitive information,…
Hackers Have Scored Unlimited Airline Miles, Targeting One Platform
TRAVEL REWARDS PROGRAMS, such as those provided by hotels and airlines, highlight the unique benefits of joining their club over others. However behind the scenes, several of these programs—including Delta SkyMiles, United MileagePlus, Hilton Honors, and Marriott Bonvoy—share the same…
US Senators Propose Privacy Reform to Tame Artificial Intelligence
The US Senate is now debating the necessity for privacy legislation in light of the development of generative artificial intelligence (AI). While AI businesses like OpenAI and Google continue to create and use cutting-edge technologies, lawmakers are wrestling with…
Contemplating Import Restrictions for PCs and Laptops to Secure Digital Infrastructure
Although it is common practice for the government to introduce new policies hurriedly, especially when it comes to the recent licensing requirement for all-in-one personal computers (PCs), laptops, tablets, and servers, it was pushed three months back to 1…
Hacktivists Embrace Cybercrime Tactics for Funding
Hacktivism, the fusion of hacking and activism, has become an increasingly prevalent form of online protest and advocacy. While hacktivists are driven by social or political motivations, it is crucial to understand that some of these individuals or groups fund…
With CISOs’ Evolved Roles, They Must Also Evolve Their Ways
Evolving Role of CISO Before the rapid development and popularity of digitization, the role of CISO (Chief Information Security Officer) was constrained to just being a part of IT teams, directing IT staff and planning cybersecurity defense. Regardless of conducting…
Artificial Intelligence Contributes to Escalating Ransomware Threats
Cybercriminals have always had the advantage in the perpetual battle between defenders and cyber criminals. They have been unchallenged for many years. In many ways, workers at these companies can automate many of their tasks. This is especially pertinent…
Microsoft’s Security Practices Under Fire: Is the Azure Platform Safe
Allegations against Microsoft’s security practices Microsoft has recently come under fire for its security practices, with critics claiming that the Azure platform is “worse than you think.” According to an article on TechSpot, Tenable CEO Amit Yoran has criticized Microsoft…
Unlocking the ChatGPT Plus and Code Interpreter Add-On’s Capabilities
For its popular ChatGPT service, OpenAI initially introduced third-party software application plug-ins back in March. These plug-ins let customers expand ChatGPT’s capability to perform tasks like reading complete PDFs. The business announced this week that all of its ChatGPT…
Safeguard Your Home Against Rising Cyber Threats, Here’s All You Need To Know
Malicious cyber actors have the ability to exploit vulnerable networks within households, potentially compromising personal and private information of family members, including children and elders. In today’s highly connected world, it is crucial to prioritize cybersecurity and take proactive…
Worldcoin Suspended in Kenya as Thousands Queue For Free Money
Kenya’s government recently issued an order to cryptocurrency initiative Worldcoin, directing them to halt the registration of fresh users due to concerns regarding data privacy. During this week, a significant number of Kenyan citizens have been lining up at…
Burger King’s Data Breach Exposes Sensitive Credentials
Burger King, a well-known fast food restaurant famous for its flame-grilled foods, recently experienced a serious data security breach that made private login information public. This occurrence has raised concerns regarding the organization’s cybersecurity procedures and the potential risks connected…
Europe’s AI Regulation Against AI Era
In a momentous UN summit held in Geneva on July 7, 2023, Doreen Bodgan-Martin, the Secretary-General of the International Telecommunications Union, proclaimed the arrival of the AI era. This declaration followed the European Union’s groundbreaking AI regulation, which has…
Security Alert: Google AMP Used in Evasive Phishing Attacks
In recent times, there has been an increase in phishing activity that abuses Google Accelerated Mobile Pages (AMP) to bypass email security measures and get to the inboxes of enterprise employees. This has been a cause of concern for security…
US House Panel Launches Probe Into China’s US Gov Email Hack
The recent email system hacks at the Commerce and State departments, which China may have been engaged in, are the subject of an inquiry, the U.S. House of Representatives Oversight Committee revealed on Wednesday. Representative James Comer, chair of…
New Malware can Allow Control of macOS Without Users Noticing
Cybersecurity company Guardz recently exposed a new malware, used by hackers to take control of unprotected Macs, remotely. Guardz describes how a threat agent has been selling the tool on a Russian cybercrime forum since April 2023 in a blog…
Hidden Camera Invasion Alert: Holiday Rentals Discovered with a Disturbing Surge
Recently, it was found that one out of 10 owners of holiday rental properties install hidden cameras or microphones within their properties. This is when they are rented out on sites such as Airbnb. It is believed that seven…
FBI Alerts: Hackers Exploit AI for Advanced Attacks
The Federal Bureau of Investigation (FBI) has recently warned against the increasing use of artificial intelligence (AI) in cyberattacks. The FBI asserts that hackers are increasingly using AI-powered tools to create sophisticated and more harmful malware, which makes cyber defense…
Schools: Prime Targets for Hackers Amid Poor Cybersecurity and Ransom Payments
New data indicates that school districts have become highly susceptible to online exploitation, emerging as the primary target for hackers. According to a recent global survey conducted by the British cybersecurity company Sophos, a staggering 80% of schools experienced…
Data Leak from Far-Right Forum Poast Reveals Daycare Owner with Nazi Avatar
In May of this year, Poast, a far-right social media forum, experienced a data breach that resulted in the leak of thousands of email addresses, usernames, and direct messages. Poast is a federated social network that functions similarly to Mastodon…
Security Concerns Escalate as Unsafe VPNs Pose Major Threat to Businesses
New research conducted by Zscaler has revealed that an overwhelming majority of organizations worldwide are facing a significant issue with unsafe Virtual Private Networks (VPN). According to the report, a staggering 88% of these organizations expressed deep concerns about the…
Report: Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’
According to a report by The New York Times on Saturday, the Biden administration has raised concerns about China’s alleged implantation of malware into crucial US power and communications networks. The officials fear this could act as a “ticking…
Germany Admits Investigating Worldcoin’s Eye-Scanning Orb
Privacy issues with the Worldcoin cryptocurrency project, a venture by OpenAI CEO Sam Altman has been in talks since the announcement of its official launch. Several countries have now started considering its potential threats and are looking into the issue…
AI Experts Unearth Infinite ways to Bypass Bard and ChatGPT’s Safety Measures
Researchers claim to have discovered potentially infinite ways to circumvent the safety measures on key AI-powered chatbots like OpenAI, Google, and Anthropic. Large language models, such as those used by ChatGPT, Bard, and Anthropic’s Claude, are heavily controlled by…
Unprecedented Data Breach: Millions Impacted by Personal Information Theft via Website Error
Tech support scams have become increasingly popular over the past few years. Scammers use scare tactics to get you to pay for unnecessary technical support services to fix supposedly unproblematic equipment or software. In most cases, scammers try to…
Fake Android App Enables Hackers to Steal Signal and WhatsApp User Data
Cybercriminals have recently developed a highly sophisticated approach to breach the security of both WhatsApp and Signal users, which is concerning. By using a phony Android conversation app, cybercriminals have been able to obtain user information from gullible individuals. There…
CISOs Leading Cyber Risk Engagement with C-Suite & Board
In a significant move to enhance cybersecurity measures, the Securities and Exchange Commission (SEC) has recently approved new regulations. These rules mandate that public companies must promptly disclose any cybersecurity breaches within a strict four-day timeframe. Additionally, the SEC…
White House Panel Recommends Restricting the FBI’s Access to spy Data
A team of national security experts created by the Biden administration has advised that the FBI be restricted from accessing surveillance data that captures communications by Americans. The Presidential Intelligence Advisory Board gave the basis for this proposal as frequent…
Designers Still Have an Opportunity to Get AI Right
As ChatGPT attracts an unprecedented 1.8 billion monthly visitors, the immense potential it offers to shape our future world is undeniable. However, amidst the rush to develop and release new AI technologies, an important question remains largely unaddressed: What…
Here’s How Microsoft Fought Against Ireland’s HSE Attackers
Hackers exploited the victim’s infected computer to access Ireland’s public health system and tunnel across the network for weeks after luring a worker with a phishing email and a spreadsheet that was laced with malware. Infecting thousands of more…
Blocking Access to AI Apps is a Short-term Solution to Mitigate Safety Risk
Another major revelation in regard to ChatGPT recently came to light through research conducted by Netskope. According to their analysis, business organizations are experiencing about 183 occurrences of sensitive data being posted to ChatGPT for every 10,000 corporate users each…
The BleedingPipe RCE Exploit Presents Minecraft With a New Security Challenge
‘BleedingPipe’ is actively exploited by hackers to execute malicious commands on servers and clients running Minecraft mods. This is to take advantage of the remote code execution vulnerability. By doing this, they can gain control over the devices and…
Analyzing Android and iOS Cybersecurity Vulnerabilities
In the ever-evolving landscape of mobile technology, the debate surrounding the security of Android and iOS operating systems continues to captivate the tech community. With cyberattacks becoming increasingly sophisticated, understanding which platform, Android or iOS, is more vulnerable to such…
Stay Safe When Charging Phone in Public: Scammers Steal Money Using USB Ports via “Juice Jacking”
Staying connected is more important than ever in today’s fast-paced society. Our smartphones and other devices keep us connected with friends, family, and work, but their battery life limits their utility. That’s why public charging stations, popular in airports, hotels,…
Following the JumpCloud Incident, Additional Malware was Discovered in the Npm Packages
There has been a supply chain attack against JumpCloud, an IT management company known for cryptocurrency products. This attack targets a small group of its clients. Two weeks after JumpCloud announced that it had been compromised, an investigation by…
Abyss Locker Ransomware Targets VMware ESXi Servers on Linux
The infamous Abyss Locker ransomware has surfaced as a significant threat to Linux users, primarily targeting VMware ESXi servers. This is worrying news for cybersecurity experts and server managers. Security experts are concerned about this ransomware’s potential damage to vital…
FBI Alerts: Cybercriminals Exploiting Open-Source AI Programs with Ease
Unsurprisingly, criminals have been exploiting open-source generative AI programs for various malicious activities, including creating malware and conducting phishing attacks, as stated by the FBI. In a recent call with journalists, the FBI highlighted how generative AI programs, highly…
Data Breach from Accreditation Org Exposes Sensitive Data of Educational Institutions
Jeremiah Fowler, a cybersecurity researcher, has disclosed an extensive data breach that has caused significant worries regarding the safety of sensitive data in the education sector. A staggering 682,438 records concerning educational institutions were found in an unencrypted database…
eCitizen Cyberattack: Kenyan Government Portal’s Services Disrupted
The Kenya government recently confirmed that its eCitizen portal was affected by a cyber-attack. The portal was used by the public to access over 5,000 government services. The attack came to notice after its customers complained of disruption in its…
TARK#MULE Cyber Attack Campaign Tricking Koreans with U.S. Military-Themed Documents
A relentless cyber attack campaign has been launched, specifically targeting Korean-speaking individuals. The attackers are employing deceptive tactics, using U.S. Military-themed document lures to deceive unsuspecting victims into executing malware on their compromised systems. Following the incident, Securonix – a…
Worldcoin Crypto Project Already Under Radar in Europe
This week, Worldcoin is set to start its official global rollout but is already facing a setback from the European data protection authorities. Worldcoin is OpenAI CEO Sam Altman’s attempt to corner the market for humanness verification by persuading enough…
Kenya’s eCitizen Service Faces Downtime: Analyzing the Cyber-Attack
Russian hacking groups have predominantly targeted Western or West-aligned countries and governments, seemingly avoiding any attacks within Russia itself. During the Wagner mutiny in June, a group expressed its support for the Kremlin, stating that they didn’t focus on…
Critical Cybercrime Hub’s Hacked Data Emerges for Sale on Underground Markets
The notorious ‘Breached’ cybercrime forum’s database has been offered for sale and shared with Have I Been Pwned. This is the website that collects information on cybercrime victims. While consumers worry about data breaches, hackers are now likely to…
Multiple Chinese Hacker Outfits are Targeting Organisations Worldwide
Western intelligence services and cybersecurity organisations have lately identified many Chinese hacker outfits. These groups are said to be behind global campaigns of digital espionage that are directed at corporations, media outlets, and institutions of international business and the…
Unleashing FreedomGPT on Windows
FreedomGPT is a game-changer in the field of AI-powered chatbots, offering users a free-form and customized conversational experience. You’re in luck if you use Windows and want to learn more about this intriguing AI technology. This tutorial will walk…
Google’s Earthquake Alert System Failed to Notify Residents of Turkish Earthquake
An investigation by BBC Newsnight on July 27, 2023, revealed that Google’s earthquake warning system failed to reach many residents in southern Turkey before the devastating double earthquake disaster that occurred in February, claiming tens of thousands of lives.…
Here’s How to Safeguard Your Credit Card Info
Sure, you recognise a phishing email (even if your parents don’t). Unfortunately, thieves are constantly coming up with new ways to get unauthorised access to credit card information, leaving you with financial losses and emotional distress. While hackers demonstrate…
Tech Meets Healthcare: GoodRx’s Rewarding ‘Medicine Cabinet’ Promotes Medication Adherence
To help people keep track of the medications they are taking, GoodRx is launching a digital medicine cabinet. As stated earlier, this app has been developed to increase medication adherence, or how well you comply with your doctor’s orders…
Police Van Equipped with AI Can Detect if Drivers are Using Mobile Phones
Law enforcement officers in Hampshire and the Isle of Wight, in collaboration with the Thames Valley Police recently conducted an operation in order to observe commercial vehicles. The said operation was conducted from July 17 to 21 on the A34…
Hackers Infect Call of Duty Players with Self-Spreading Malware
Hackers have recently been discovered abusing Call of Duty players with a self-propagating software attack, raising serious concerns among the gaming community. This malicious activity, which security researchers have uncovered, has aroused concerns since it may compromise user data and…
ChatGPT’s Plug-In Vulnerabilities
ChatGPT, the revolutionary language model developed by OpenAI, has been making waves in the tech world for its impressive capabilities in natural language understanding. However, recent developments have highlighted a significant concern – ChatGPT’s plug-in problem, which poses potential…
FraudGPT: ChatGPT’s Evil Face
Threat actors are promoting the FraudGPT artificial intelligence (AI) tool, which follows in the footsteps of WormGPT, on a number of Telegram channels and dark web marketplaces. This is an AI bot, solely designed for malicious purposes, such as…
Out of 50,000 Cybercrimes Reported in 6 Years, Only 23% Successfully Solved
Over the span of nearly six and a half years, a significant number of cybercrime cases, totaling 50,027, were reported in the city up until May 31 of this year. However, the resolution rate for these cases is rather…
The Unyielding AI Challenge: Safeguarding Organizations in the Digital Era
As ChatGPT and other generative artificial intelligence tools continue to rise, defining workplace productivity has become more difficult. For a productive workplace to be achieved, however, there must be a consideration of how artificial intelligence (AI), machine learning (ML),…
CERT-In Warns Against Mallox Ransomware Targeting Unsecured MS SQL Servers
Indian government’s nodal agency, CERT-In has issued warning about the Mallox ransomware that is exploiting MS-SQL servers through dictionary attacks. By using dictionary attack method, the ransomware acquire unauthorized access to victims’ networks, finally succeeding in server compromise and data…
‘Verified human’: Worldcoin Users Crowd for Iris Scans
The Worldcoin project, founded by Sam Altman, CEO of OpenAI (the developer of ChatGPT), is offering people around the world the opportunity to get a digital ID and free cryptocurrency in exchange for getting their eyeballs scanned. Despite concerns…
Challenge Arising From the ChatGPT Plugin
OpenAI’s ChatGPT has achieved important advancements in AI language models and provides users with a flexible and effective tool for producing human-like writing. But recent events have highlighted a crucial problem: the appearance of third-party plugins. While these plugins promise…
Zenbleed: Security Flaw Steals Data from AMD Zen 2 CPUs
After initially disclosing the flaw to AMD on May 15, Google security researcher Tavis Ormandy published an overview of it on his blog. Because of the Zenbleed vulnerability, AMD’s entire Zen 2 product line is said to be affected. The…
Corporate Data Heist: Infostealer Malware Swipes 400,000 Credentials in a Record Breach
Recent research has revealed that corporate credentials are being stolen alarmingly. The study revealed that over 400,000 corporate credentials were stolen by malware specialized in data theft. Approximately 20 million malware logs were examined in the study. The study…
Employees are Feeding Sensitive Data to ChatGPT, Prompting Security Concerns
Despite the apparent risk of leaks or breaches, according to the latest study from Netskope, employees are still sharing private company information with chatbots like ChatGPT and AI writers. The study, which examines 1.7 million users across 70 international…
Singapore Explores Generative AI Use Cases Through Sandbox Options
Two sandboxes have been introduced in Singapore to facilitate the development and testing of generative artificial intelligence (AI) applications for government agencies and businesses. These sandboxes will be powered by Google Cloud’s generative AI toolsets, including the Vertex AI…
Stolen Session Cookies Turns Into the Next Cyber Threat
According to the recent Identity Exposure Report by SpyCloud, 87,000 credentials linked to Fortune 1000 C-level executives were recovered from the criminal underworld, in year 2022. Security leaders across organizations continue to live in constant terror of becoming a victim…
Exposed Secrets: Backdoor Vulnerabilities in Worldwide Radio Systems
The world has been secretive for over 25 years about a technology used for critical data and voice radio communication around the globe. No one could closely examine its security properties to detect vulnerabilities. A small group of researchers…
Notorious Lazarus Hacking Outfit Linked to a $60 Million Alphapo Crypto Theft
The latest attack on payment processing site Alphapo, in which the attackers stole over $60 million in cryptocurrency, is attributed by blockchain researchers to the North Korean Lazarus hacker gang. The hack on Sunday, July 23rd, targeted Alphapo, a…
Lazarus Hackers Target Microsoft IIS Servers to Propagate Malware
The infamous Lazarus hacker collective has reappeared in a recent wave of cyberattacks, using a cunning plan to spread malware through infected Microsoft Internet Information Services (IIS) servers. Cybersecurity professionals are actively watching the situation to reduce any hazards as…
BlackCat Attackers Target Italian Asset Manager Azimut
Azimut Group, an Italian asset management firm that oversees over $87.2 billion in assets, declared in a public statement that it will “not comply by any means” with a ransomware demand from the notorious hacking organisation BlackCat. Israeli hacking…
Google Cloud’s Security Strategy: Emphasizing ‘Secure by Design’ and ‘Secure by Default’
As artificial intelligence takes center stage, organizations are grappling with new considerations regarding the appropriate security measures and their evolution. For Google LLC and Google Cloud, ensuring security across the organization involves a combination of central teams providing consistent…
Travel HACK: Why you Should not Share Photos of Your Boarding Pass Online
You are done packing the bags, you put on your airport look and now you are all set to board the flight to your dream vacation. You might as well want to post a picture of the trip, or share…