Category: CySecurity News – Latest Information Security and Hacking Incidents

BlackCat Attackers Target Italian Asset Manager Azimut

  Azimut Group, an Italian asset management firm that oversees over $87.2 billion in assets, declared in a public statement that it will “not comply by any means” with a ransomware demand from the notorious hacking organisation BlackCat.  Israeli hacking…

Google Cloud’s Security Strategy: Emphasizing ‘Secure by Design’ and ‘Secure by Default’

  As artificial intelligence takes center stage, organizations are grappling with new considerations regarding the appropriate security measures and their evolution. For Google LLC and Google Cloud, ensuring security across the organization involves a combination of central teams providing consistent…

Security Breach: Clearweb Sites Attacked by MOVEit, Data Exposed

  A cybercrime syndicate used by the Clop ransomware gang is substantially more prevalent than any other cybercrime syndicate in exploiting the MOVEit vulnerability than any other. As an additional complication, the ransomware gang’s data stolen through the MOVEit vulnerability…

Rise of Bossware: Balancing Workplace Surveillance and Employee Privacy

  The emergence of ‘Bossware’ or staff surveillance software in recent years has been a troubling trend in offices all around the world. Bossware refers to a collection of devices and software that give employers the ability to track, keep…

Critical Vulnerabilities in AMI MegaRAC BMC Software

Eclypsium, a cybersecurity company, recently discovered two serious flaws in the AMI MegaRAC Baseboard Management Controller (BMC) software, raising questions about the security of millions of servers throughout the world. If these weaknesses are used against the affected systems, serious…

Canadian Cybersecurity Head Warns of Surging AI-Powered Hacking and Disinformation

  Sami Khoury, the Head of the Canadian Centre for Cyber Security, has issued a warning about the alarming use of Artificial Intelligence (AI) by hackers and propagandists.  According to Khoury, AI is now being utilized to create malicious software,…

Beyond Security: The Comprehensive Approach to Tackling Cyberattacks

  In today’s digital landscape, organizations are increasingly facing the harrowing consequences of cyberattacks, particularly ransomware incidents. In these malicious schemes, hackers encrypt vital data, rendering it inaccessible, and then demand exorbitant payments for its restoration.  Unfortunately, such attacks are…

Movie Scam: Fraudsters Take Advantage of the Popularity of Barbie and Oppenheimer

  The films Barbie and Oppenheimer quickly rose to the top of the list of the year’s most anticipated films. Unfortunately, scammers seized the opportunity to use Barbie and Oppenheimer’s enormous popularity for their own nefarious purposes right away, as…

Storm-0558 Breach: Microsoft Breach Risks Millions of Azure AD Apps

Storm-0558 breach, that enabled the China-based advanced persistent threat (APT) group to access emails of at least 25 US agencies seems to be more notorious than anticipated, since the breach may put significant risk on Microsoft cloud services than one…

GitHub Issues Alert on Lazarus Group’s Social Engineering Attack on Developers

  According to a security alert issued by GitHub, this social engineering campaign is designed to compromise developers’ accounts in the blockchain, cryptocurrency, online gambling, and cybersecurity industries. This is done through social engineering techniques.  The campaign was reportedly linked…

North Korea-Backed Hackers Breach US Tech Company to Target Crypto Firms

A North Korean state-sponsored hacking group has recently breached a US IT management company, in a bid to further target several cryptocurrency companies, cybersecurity experts confirmed on Thursday.  The software company – JumpCloud – based in Louisville, Colorado reported its…

Nigel Farage Controversy Results in Hundreds of NatWest Private Data Requests

  Numerous requests for copies of personal data have been made to NatWest Bank under the provisions of data protection regulations.  It unfolded after an argument between the group and Nigel Farage, a pro-Brexit advocate. According to the former UKIP…

Microsoft Offers Free Security Features Amid Recent Hacks

Microsoft has taken a big step to strengthen the security of its products in response to the growing cybersecurity threats and a number of recent high-profile attacks. The business has declared that it will offer all users essential security features…

As More MOVEit Hack Victims Emerge, Ofcom Declares Non-Payment of Ransom

  As the mass-hacking incidents continue to affect users of the widely used file-transfer application MOVEit Transfer, an increasing number of victims are emerging, with nearly 400 organizations now known to be impacted. In a recent statement, Estée Lauder, a…

Ransomware Outbreak in Canada: Cybersecurity Meltdown

  Canadians and Canadian organizations are increasingly falling victim to ransomware attacks. There was an emphasis placed on the urgency of addressing the cyber security issue by Sami Khoury, the president of the Canadian Centre for Cyber Security. The President…

Estée Lauder: Cosmetic Brand Amongst the new Victims of Ransomware Attack

On Tuesday, U.S.-based cosmetic brand Estée Lauder Cos. Inc. confirmed to have witnessed a ransomware attack, following which it compromised some of its data and took down some of its systems. Apparently, ransomware gangs ALPHV/BlackCat claim to have executed the…

Inside the World of Ransomware Negotiations: From Colonial Pipeline to JBS

  In January 2021, JBS, the world’s largest meat-processing company, revealed that it paid a ransom of $11 million in Bitcoin to cyber attackers.  Similarly, in May of the same year, Colonial Pipeline, the largest refined-products pipeline in the U.S.,…

Cybercriminals Masquerade as Cybersecurity Company to Hijack Entire PCs

  In the latest cyber threat, hackers have devised a new approach to deceive unsuspecting victims, even using reputable names as a cover. A ransom-as-a-service (RaaS) attack called “SophosEncrypt” has emerged, masquerading as the cybersecurity vendor Sophos. The operation of…

Ransomware Trends: RaaS and Cryptocurrency Impacts

Ransomware attacks have become a pressing concern for individuals, businesses, and governments worldwide. Cybercriminals are constantly evolving their tactics, and two significant trends that demand close monitoring are the rise of Ransomware-as-a-Service (RaaS) and the growing reliance on cryptocurrencies for…

Top Cyber Official Says AI Needs Better Security

  Artificial intelligence (AI) is used by hackers and propagandists to develop malicious software, draft convincing phishing emails to infect computers, and spread false information via the web, according to Canada’s top cybersecurity official, who spoke to Reuters on Thursday.…

Security Professionals Propose Guidelines for AI Development in an Open Letter

  A new voluntary framework for designing artificial intelligence products ethically has been revealed by a global consortium of AI experts and data scientists.  There are 25,000 members of the World Ethical Data Foundation, including employees of several digital behemoths…

Growing Surveillance Threat for Abortions and Gender-Affirming Care

Experts have expressed alarm about a worrying trend in the surveillance of people seeking abortions and gender-affirming medical care in a recent paper that has received a lot of attention. The research, released by eminent healthcare groups and publicized by…

Cyber Trust Mark: U.S. Administration Introduces Program to Boost Home Security

This Tuesday, Joe Biden’s government announced a ‘U.S. Cyber Trust Mark’ program that will focus on cybersecurity certification and product labels of smart home tech, as a step to help consumers choose products that provide better protection against cyber activities.…

With More Jobs Turning Automated, Protecting Jobs Turn Challenging

With the rapid trend of artificial intelligence being incorporated in almost all the jobs, protecting jobs in Britain now seems like a challenge, as analyzed by the new head of the state-authorized AI taskforce. According to Ian Hogarth, a tech…

Enhancing Security and Observability with Splunk AI

  During Splunk’s .conf23 event, the company announced Splunk AI, a set of AI-driven technologies targeted at strengthening its unified security and observability platform. This new advancement blends automation with human-in-the-loop experiences to enable organisations to improve their detection, investigation,…

ChatGPT’s Reputability is Under Investigation by the FTC

The Federal Trade Commission (FTC) has recently launched an investigation into ChatGPT, the popular language model developed by OpenAI. This move comes as a stark reminder of the growing concerns surrounding the potential pitfalls of artificial intelligence (AI) and the…

Sophisticated Cloud Credential Theft Campaign Targets AWS, Expands to Azure and Google Cloud

  A cybercriminal group behind a sophisticated cloud-credential stealing and cryptomining campaign has recently expanded its targets beyond Amazon Web Services (AWS) to include Microsoft Azure and Google Cloud Platform (GCP).  Researchers from SentinelOne and Permiso have been tracking the…

macOS Sonoma’s Latest Update Brings Significant Enhancements to Apple’s Password Manager

Password manager applications like 1Password and Proton Pass play a crucial role when setting up a new device. These apps securely store login credentials, credit card information, and notes, with an emphasis on login data security.  Not all password managers…

Growing Demand for Healthcare Cybersecurity Specialists

The healthcare sector is increasingly depending on technology to better patient care and increase operational efficiency in today’s quickly evolving digital environment. Cybersecurity dangers are a major worry that comes with this digital transition. The demand for qualified cybersecurity specialists…

Typo Delivers Millions of US Military Emails to Russia’s Ally Mali

  Due to a small typing error, millions of emails from the US military were unintentionally forwarded to Mali, a Russian ally. For years, emails meant for the US military’s “.mil” domain have been transmitted to the west African nation…

The Met Police passed victims’ data to Facebook

  Using its website to report crimes, such as sexual offences, domestic violence, and other crimes, the most powerful police force in the country gathered sensitive details about the people using the site. Observer reports that Facebook shared users’ data…

AI-Based Deepfake Fraud: Police Retrieves Money Worth ₹40,000 Defrauded From Kozhikode Victim

Kozhikode, India: In a ‘deepfake’ incident, a man from Kozhikode, Kerala lost ₹40,000 after he fell prey to an AI-based scam. According to police officials, the victim, identified as Radhakrishnan received a video call on WhatsApp from an unknown number.…

5 AI Tools That may Save Your Team’s Working Hours

In today’s world of ‘everything digital,’ integrating Artificial Intelligence tools in a business is not just a mere trend, but a necessity. AI is altering how we work and interact with technology in the rapidly transforming digital world. AI-powered solutions…

A Few Cybercriminals Account for All Email Extortion Attacks, New Research Reveals

  New research conducted by Barracuda Networks, in collaboration with Columbia University, has revealed that a surprisingly small group of cybercriminals is responsible for the majority of email extortion attempts worldwide. The study examined over 300,000 flagged emails, identified as…

Gay Furry Hackers: Digital Activism Against Anti-Trans Laws

A group of expert hackers known as ‘SiegedSec’ has surfaced in recent months, and they are targeting American state governments that have passed anti-trans legislation. These hackers are members of the furry community, a subculture of people who enjoy anthropomorphic…

Understanding the Drawbacks of Blockchain Smart Contracts

  Blockchain technology has grabbed the attention of companies across the globe. Due to its benefits, such as immutability and transparency, traditional companies outside of banking, like BMW and Bosch, have begun to experiment with smart contracts to produce more…

Forget ChatGPT, Google Bard may Possess Some Serious Security Flaws

A latest research claims that Google’s AI chatbot, Google Bard may let its users to use it for creating phishing emails and other malicious content, unlike ChatGPT. At one such instances, cybersecurity researchers Check Point were able to produce phishing…

Privacy Breach Shockwaves: Colorado State University Students and Staff Impacted by Data Breach

  According to CBS News, a Colorado university is at risk of exposing 30,000 current and former students’ data to hackers. As reported by the University of Colorado Boulder, the incident is the result of a cyber-attack perpetrated against a…

Understanding Internet Identity: Exploring its Functionality and Operation

  Passwords have long been a hassle for daily online logins, even with the help of password managers. However, the DFINITY Foundation’s Web3 experts are developing a promising alternative called Internet Identity (II), which has the potential to transform online…

SolarWinds Hackers Dangle BMWs to Eavesdrop on Diplomats

  The Russia-backed group responsible for the SolarWinds attack, known as Cloaked Ursa or Nobelium/APT29, has shifted its tactics and is now targeting foreign diplomats working at embassies in Ukraine. Instead of using traditional political lures, the group is employing…

Fear Grip Users as Popular Diabetes App Faces Technical Breakdown

 A widely used diabetes management software recently experienced a serious technical failure, stunning the users and leaving them feeling angry and scared. The software, which is essential for assisting people with diabetes to monitor and manage their blood sugar levels,…

Hollywood vs. AI: Strike Highlights the Emerging Use of Cutting-Edge Technology

  The prospects of generative artificial intelligence in Hollywood — and the way it can be used as an alternative labour — has become a critical holding point for actors on strike.  In a news conference earlier this week, Screen…

Custom Data: A Key to Mitigating AI Risks

Businesses are continuously looking for ways to maximize the advantages while limiting the potential hazards in the quickly developing field of artificial intelligence (AI). One strategy that is gaining traction is using unique data to train AI models, which enables…

Killnet Attempts to Build Clout Among Russian Hackers With Media Stunts

  As a result of Killnet and Killmilk’s leadership over the past several months, ragtag hacker groups from Russia have been consolidated under their leadership. This has formed one group called Killnet. Even though Killnet has made a concerted effort…

Microsoft Confirms Zero Day Exploits, Prompts Users to Update

This week Microsoft confirmed around 132 security vulnerabilities in its product lines, including a total of six zero-day flaws that are currently being actively exploited. Because of this, security professionals advise Windows users to upgrade right away. One of these…

AI Malware vs. AI Defences: WormGPT Cybercrime Tool Predicts a New Era

  Business email compromise (BEC) attacks are being launched by cybercriminals with the assistance of generative AI technology, and one such tool used is WormGPT, a black-hat alternative to GPT models that has been designed for malicious goals.  SlashNext said…

Sharp Increase in Malware Attacks via USB Flash Drives

  Instances of cybercriminals employing USB drives for malware attacks have seen a significant rise. According to security researchers from Mandiant, there has been a three-fold increase in malware attacks via USB drives aimed at stealing sensitive information during the…

Unveiling Entrepreneurs’ Hesitations with ChatGPT

ChatGPT has become a significant instrument in the field of cutting-edge technology, utilizing the ability of artificial intelligence to offer conversational experiences. Nevertheless, many business owners are still reluctant to completely adopt this creative solution despite its impressive possibilities. Let’s…

Ransomware Resurgence: A Renewed Wave of Cyber Threats

  Harvard Business Review reports claim that cyberattacks have increased dramatically since the overnight shift from remote to office work in 2020. In 2020, all types of cyberattacks have increased over the previous year, but ransomware is by far the…

Former Amazon Security Engineer Charged of Defrauding a Crypto Exchange

A prominent cybersecurity pro for Amazon is apparently facing a problem. The U.S. Department of Justice has detained security engineer, Shakeeb Ahmed, with charges of defrauding and money laundering from an unnamed decentralized cryptocurrency exchange, both charged carrying a maximum…

Clop Attacks: More Organizations Confirm to have Fallen Prey to MOVEit Mass-hack

As the ongoing MOVEit hack is getting exposed, their seems to be some new names that have fallen prey to the attack. These organizations involve hotel chain Radisson, U.S. based 1st Source Bank, real estate giant Jones Lang LaSalle and…

BlackRock’s Bitcoin ETF Reveals the Future of Cryptocurrency Surveillance

  Surveillance is about to reach a new level as Blackrock awaits the SEC’s confirmation regarding its Bitcoin ETF launch. An ETF tied to Bitcoin was filed on June 15 by the world’s largest asset manager, reportedly the world’s largest…

Zscaler, Palo Alto Under Pressure from Microsoft’s Rapidly Increasing Cybersecurity Offerings

  Microsoft (MSFT) continues to put pressure on cybersecurity stocks with new products aimed at Zscaler (ZS), Palo Alto Networks (PANW), Cloudflare (NET), CrowdStrike Holdings (CRWD), and others. MSFT stock has kept on shining this year, with a 39% increase,…

Major Companies Restrict Employee Use of ChatGPT: Amazon, Apple, and More

Several major companies, including Amazon and Apple, have recently implemented restrictions on the use of ChatGPT, an advanced language model developed by OpenAI. These restrictions aim to address potential concerns surrounding data privacy, security, and the potential misuse of the…

Massive Data Breach at HCA Healthcare: 11 Million Patients’ Information Compromised by Hackers

  Hospital and clinic operator HCA Healthcare has announced that it experienced a significant cyberattack, posing a risk to the data of at least 11 million patients.  The breach affects patients in 20 states, including California, Florida, Georgia, and Texas.…

ScarletEel Hackers Breach AWS Cloud Infrastructure

  Researchers have discovered that a financially motivated threat actor called ScarletEel has been infiltrating Amazon Web Services (AWS) for various malicious activities. These activities include stealing credentials and intellectual property, deploying crypto mining software, and carrying out distributed denial-of-service…

Genesis Market: Formerly a Popular Dark Web Marketplace Now up for Sale

If one wishes to own a defunct darknet business, they could try reaching out to the backers of Genesis Market, the formerly high-and-mighty seller of stolen data. Today, they appear to be desperate to sell their formerly valued asset for…

Private Data of 12,000 SBI Employees Exposed on Telegram Channels

  Over 12,000 employees of the State Bank of India (SBI) had their personal information compromised in a significant data breach, which was later published on Telegram channels. Employees’ names, residences, contact information, PAN numbers, and personal data from their…

Ransomware Gangs Exposing Private Files of Students Online

Ransomware groups have lately been dumping private documents acquired from schools online. The stolen content included happens to be raw, intimate and graphic. The confidential ‘data’ leaked online involve content as explicit as describing student sexual assaults, psychiatric hospitalizations, abusive…

Twitter Becomes the Epicentre of FTM Fraud

  Online settings, such as Twitter, are becoming increasingly perilous, rife with fraudulent schemes aimed at naïve victims. Social media giant has recently been the epicentre of deception, with fraudsters deploying innovative ways to abuse its massive user base. One…

Hackers Steal 25 Crore From Thane Company’s Escrow Account

Hackers took 25 crores from a Thane-based company’s escrow bank account during a significant cyberattack. The construction company had placed the funds in the escrow account as a condition of a contract with another business. The money was transferred to…

Over $30 Billion Stolen from Crypto Sector, Reveals SlowMist’s

A recent report by cybersecurity firm SlowMist has uncovered a shocking revelation regarding the vulnerability of the crypto sector. According to the report, blockchain hacks have resulted in the theft of over $30 billion from the cryptocurrency industry since 2012.…

India’s Finance Ministry Tell State-run Banks to Adopt Emerging Technologies to Increase Operational Efficiency

The Indian finance ministry has ordered state-run banks to collaborate and take use of emerging technology to improve operational effectiveness and customer experience. In a meeting, headed by Finance Minister Nirmala Sitharaman to assess the activities and performance of public…

SCARLETEEL Hackers Target AWS Fargate in Latest Cryptojacking Campaign

  An continuing sophisticated attack effort known as SCARLETEEL continues to target cloud settings, with threat actors currently focusing on Amazon Web Services (AWS) Fargate. According to a new report from Sysdig security researcher Alessandro Brucato, “Cloud environments are still…

Critical TootRoot Bug Hijack Mastodon Servers

  Mastodon, the decentralized social networking platform that emphasizes freedom and open-source principles, has recently addressed several vulnerabilities, including a critical one with potentially severe consequences. This particular vulnerability enabled hackers to exploit specially designed media files, allowing them to…

Ransomware Attack on Pro Bono California Law Firm Affects More Than 42,000

Recently, a ransomware attack on the Law Foundation of Silicon Valley, a California law firm that provides free services to those in need, resulted in the exposure of information of more than 42,000 people. Hackers use ransomware to make money…

DeFi Clients Lost $228 Million to Hackers in Past 3 Months

In the recent past, there has been a dramatic rise in the number of cyber incidents, where cyber threat actors have tried to exploit many cryptocurrency projects. It is interesting to note that hackers have significantly targeted DeFi, according to…

‘Meduza Stealer’ Malware is Preying on Windows Users For Data Theft

  If you are reading this on a Windows device, be on alert for potentially harmful new malware that has been affecting web browsers, password managers, and even cryptocurrency wallets.  A team of Uptycs cybersecurity professionals found this infostealer, naming…

Patch Now or Peril: MOVEit Transfer Customers Urged to Address Critical Vulnerability

  MOVEit Transfer software has been identified as vulnerable to a critical vulnerability. This prompts customers to patch their systems urgently to prevent vulnerability spread. The flaw, identified as CVE-2023-36934, allows an attacker to gain elevated privileges without the user…

French Government Allows Remote Access to Suspects’ Devices: Privacy Concerns Arise

  The French Government has recently introduced a new policy allowing the police to remotely access and control suspects’ devices, including their cameras, microphones, and GPS data. Although this news has sparked controversy, similar practices have been in place in…

ChatGPT Loses Its Spark: Google A.I. Researcher Identifies Children as the Key Challenge

  The number of ChatGPT users is declining for the first time, and those users are not those you thought they would be. According to estimates from Similarweb, a web analytics firm, a 9.7% drop in traffic to ChatGPT’s website…

Ransomware Affiliates, Triple Extortion, and the Dark Web Ecosystem

  While the dark web is often associated with drugs, crime, and leaked information, there has been a rise in a sophisticated cybercrime ecosystem that operates through platforms like Tor and illicit channels on Telegram. One aspect of this trend…

Shell Confirms MOVEit-based Hack After the Threat Group Leaks Data

The CIOp ransomware gang has targeted a zero-day vulnerability in the MOVEit managed file transfer (MFT) product, acquiring data of at least 130 companies that had been utilizing the solution. At least 15 million people are thought to have been…

Pakistan Election Commission Faces Cyber Attack

  The Pakistan Election Commission recently encountered a significant cyber attack, jeopardizing the security and integrity of its electoral processes. This incident has raised concerns regarding the protection of sensitive data and the potential implications for the country’s democratic system.…

Escalating Global Threats Targeting Cloud Infrastructure

  Cloud computing’s quick uptake has fundamentally changed how businesses manage and keep their data. However, as cloud environments become more and more popular, an alarming increase in cyber threats targeting them has also occurred. The sophistication of attacks on…

Can TV and Radio Broadcasts Be Hacked?

In today’s interconnected world, where technology permeates every field, the security of communication channels is paramount. People rely heavily on TV and radio broadcasts for information and entertainment. So, can TV and radio broadcasts be hacked? The answer is yes.…

Netwrix Auditor RCE Bug Abused in Truebot Malware Campaign

  A severe remote code execution (RCE) vulnerability in the Netwrix Auditor software was used in attacks against organisations across the United States and Canada, according to a warning issued today by CISA and the FBI. These assaults targeted organisations…

Are Your Google Docs Safe From AI Training?

  AI systems like Google’s Bard and OpenAI’s ChatGPT are designed to generate content by analyzing a huge amount of data, including human queries and responses. However, these systems have sparked legitimate worries regarding privacy. Google has emphasized that it…

Pentagon Concludes Review Following Discord Leak, Tightens Controls on Classified Info

  The Pentagon has completed a comprehensive assessment lasting 45 days to evaluate the military’s protocols regarding classified information, following a case where a National Guardsman leaked unnecessary classified information on Discord despite having a top-secret clearance. The individual involved,…

Will Threads be a ‘Threat’ to Twitter?

About Threads Meta, Instagram’s parent company launched Threads, which will be a text-based conversation app, rivaling Twitter. Threads, released on Wednesday evening, a day before its scheduled release, allows users to join up directly from their Instagram accounts; it is…

E2E Encryption Under Scrutiny: Debating Big Tech’s Role in Reading Messages

  A recurring conflict between Silicon Valley and several governments is primarily about “end-to-end encryption,” “backdoors,” and “client-side scanning,” which appear to be complex issues. However, in its simplest form, this issue boils down to the question: should technology companies…

Protecting Yourself from ATM Scams: Understanding and Preventing Shoulder Surfing

What is Shoulder Surfing? ATM card scams are a growing concern in many countries, including India. Criminals use a variety of techniques to gain unauthorized access to individuals’ ATM cards and withdraw money from their accounts. One such technique is…

Ransomware Attack Forces Major Japanese Port to Halt its Operation

  A ransomware attack was launched against Japan’s biggest and busiest trading port by a cybercriminal outfit believed to be based in Russia.  Following the incident, the Port of Nagoya paused all cargo operations, including the loading and unloading of…

Industrial Solar Panels Face Critical RCE Bugs

Several critical Remote Code Execution (RCE) vulnerabilities have recently emerged, posing a significant threat to industrial solar panels and potentially endangering grid systems. These vulnerabilities, if exploited, could have severe consequences for energy organizations and their critical infrastructure. Security experts…