Category: CySecurity News – Latest Information Security and Hacking Incidents

OpenAI’s GPTBot: A New Era of Web Crawling

OpenAI, the pioneering artificial intelligence research lab, is gearing up to launch a formidable new web crawler aimed at enhancing its data-gathering capabilities from the vast expanse of the internet. The announcement comes as part of OpenAI’s ongoing efforts to…

37% of Third-party Applications have High-risk Permissions

Recent data analysis reveals a significant increase in the integration of third-party apps with email platforms. This trend underscores the rapid expansion of a new avenue of vulnerability that cybercriminals are exploiting, demonstrating their ongoing evolution in attack strategies.  The…

Adobe Patches 30 Acrobat, Reader Vulnerabilities

Adobe has recently released a large batch of security updates for its flagship Acrobat and Reader software, patching at least 30 vulnerabilities affecting Windows and MacOS installations. In this blog post, we’ll take a closer look at the details of…

Zoom Declines Training AI on Calls Without Approval

  In response to criticism that it trained its artificial intelligence (AI) models on client calls, Zoom revised its terms of service. The company emphasised that chats, audio, and video were never utilised for AI without permission in a blog…

AI Eavesdrops on Keystrokes with 95% Accuracy

An advanced artificial intelligence (AI) model recently showed a terrifying ability to eavesdrop on keystrokes with an accuracy rate of 95%, which has caused waves in the field of data security. This new threat highlights potential weaknesses in the security…

Worldwide Tailor-Made Massive Phishing Campaign

The spotlight turned towards a worldwide phishing campaign when an incident unfolded involving an Imperva staff member who was singled out and almost ensnared by a social engineering assault. Imperva, situated in San Mateo, California, operates as a cybersecurity company.…

Govt Proposes Rs 250 Cr Fine for Consumer Data Leaks

The Indian government has proposed a fine of up to Rs 250 crore on enterprises found guilty of disclosing customer data, which is a significant step toward bolstering data protection procedures. This action is a component of the Data Protection…

North Korean Hackers Infiltrate Russian Missile Engineering Firm

  A sanctioned Russian missile engineering business was successfully penetrated by North Korean hackers, it has been revealed in an astonishing development, prompting worries about the possible repercussions of this security breach. The event shows how North Korea’s cyberwarfare capabilities…

With 95% Accuracy, New Acoustic Attack can Steal from Keystrokes

UK universities’ researchers have recently developed a deep learning model, designed to extract information from keyboard keystrokes collected using a microphone, with 95% accuracy.  The prediction accuracy decreased to 93% when Zoom was used to train the sound classification algorithm,…

U.S. Hunts Chinese Malware Halting Military Operations

  The Biden administration is looking for malware that may jeopardise military and civilian power grids, communications systems, and water supplies, the New York Times reported.  The malware, which is believed to have been installed by Chinese hackers linked to…

Hospitals Paralyzed by Cyberattack, Emergency Services Diverted

Several hospitals in Pennsylvania and California were compelled to close their emergency departments and redirect incoming ambulances due to a recent uptick in cyberattacks, which created a frightening situation. The hack, which targeted the healthcare provider Prospect Medical Holdings, has…

Amazon Executive Lacks Data for Return-to-Office Mandate

  Amazon employees are expressing discontent over the company’s recent decision to revoke remote work flexibility, and the situation has been exacerbated by comments made by a senior executive. During an internal staff meeting, Mike Hopkins, the SVP of Amazon…

Hacktivists Embrace Cybercrime Tactics for Funding

Hacktivism, the fusion of hacking and activism, has become an increasingly prevalent form of online protest and advocacy. While hacktivists are driven by social or political motivations, it is crucial to understand that some of these individuals or groups fund…

Burger King’s Data Breach Exposes Sensitive Credentials

Burger King, a well-known fast food restaurant famous for its flame-grilled foods, recently experienced a serious data security breach that made private login information public. This occurrence has raised concerns regarding the organization’s cybersecurity procedures and the potential risks connected…

Europe’s AI Regulation Against AI Era

  In a momentous UN summit held in Geneva on July 7, 2023, Doreen Bodgan-Martin, the Secretary-General of the International Telecommunications Union, proclaimed the arrival of the AI era. This declaration followed the European Union’s groundbreaking AI regulation, which has…

FBI Alerts: Hackers Exploit AI for Advanced Attacks

The Federal Bureau of Investigation (FBI) has recently warned against the increasing use of artificial intelligence (AI) in cyberattacks. The FBI asserts that hackers are increasingly using AI-powered tools to create sophisticated and more harmful malware, which makes cyber defense…

CISOs Leading Cyber Risk Engagement with C-Suite & Board

  In a significant move to enhance cybersecurity measures, the Securities and Exchange Commission (SEC) has recently approved new regulations. These rules mandate that public companies must promptly disclose any cybersecurity breaches within a strict four-day timeframe. Additionally, the SEC…

Designers Still Have an Opportunity to Get AI Right

  As ChatGPT attracts an unprecedented 1.8 billion monthly visitors, the immense potential it offers to shape our future world is undeniable. However, amidst the rush to develop and release new AI technologies, an important question remains largely unaddressed: What…

Analyzing Android and iOS Cybersecurity Vulnerabilities

In the ever-evolving landscape of mobile technology, the debate surrounding the security of Android and iOS operating systems continues to captivate the tech community. With cyberattacks becoming increasingly sophisticated, understanding which platform, Android or iOS, is more vulnerable to such…

Abyss Locker Ransomware Targets VMware ESXi Servers on Linux

The infamous Abyss Locker ransomware has surfaced as a significant threat to Linux users, primarily targeting VMware ESXi servers. This is worrying news for cybersecurity experts and server managers. Security experts are concerned about this ransomware’s potential damage to vital…

Worldcoin Crypto Project Already Under Radar in Europe

This week, Worldcoin is set to start its official global rollout but is already facing a setback from the European data protection authorities.  Worldcoin is OpenAI CEO Sam Altman’s attempt to corner the market for humanness verification by persuading enough…

Unleashing FreedomGPT on Windows

  FreedomGPT is a game-changer in the field of AI-powered chatbots, offering users a free-form and customized conversational experience. You’re in luck if you use Windows and want to learn more about this intriguing AI technology. This tutorial will walk…

Here’s How to Safeguard Your Credit Card Info

  Sure, you recognise a phishing email (even if your parents don’t). Unfortunately, thieves are constantly coming up with new ways to get unauthorised access to credit card information, leaving you with financial losses and emotional distress. While hackers demonstrate…

Hackers Infect Call of Duty Players with Self-Spreading Malware

Hackers have recently been discovered abusing Call of Duty players with a self-propagating software attack, raising serious concerns among the gaming community. This malicious activity, which security researchers have uncovered, has aroused concerns since it may compromise user data and…

ChatGPT’s Plug-In Vulnerabilities

  ChatGPT, the revolutionary language model developed by OpenAI, has been making waves in the tech world for its impressive capabilities in natural language understanding. However, recent developments have highlighted a significant concern – ChatGPT’s plug-in problem, which poses potential…

FraudGPT: ChatGPT’s Evil Face

  Threat actors are promoting the FraudGPT artificial intelligence (AI) tool, which follows in the footsteps of WormGPT, on a number of Telegram channels and dark web marketplaces. This is an AI bot, solely designed for malicious purposes, such as…

Challenge Arising From the ChatGPT Plugin

OpenAI’s ChatGPT has achieved important advancements in AI language models and provides users with a flexible and effective tool for producing human-like writing. But recent events have highlighted a crucial problem: the appearance of third-party plugins. While these plugins promise…

Stolen Session Cookies Turns Into the Next Cyber Threat

According to the recent Identity Exposure Report by SpyCloud, 87,000 credentials linked to Fortune 1000 C-level executives were recovered from the criminal underworld, in year 2022. Security leaders across organizations continue to live in constant terror of becoming a victim…

BlackCat Attackers Target Italian Asset Manager Azimut

  Azimut Group, an Italian asset management firm that oversees over $87.2 billion in assets, declared in a public statement that it will “not comply by any means” with a ransomware demand from the notorious hacking organisation BlackCat.  Israeli hacking…