The Evolving Cybercrime Landscape in India India is one of the fastest-growing economies in the world and has set an ambitious target of becoming a USD 5 trillion economy by 2025. However, this dream is being threatened by the rising…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Fortinet: Remote Working has Resulted in Breaches for Two-Thirds of Businesses
When the COVID-19 global epidemic hit nearly three years ago, millions of people were compelled to complete their tasks away from their offices and coworkers. Due to this, there has been an unheard-of rise in the number of workers…
ChatGPT Sparking Security Concerns
Cyberhaven, a data security company, recently released a report in which it found and blocked requests to input data into ChatGPT from 4.2% of the 1.6 million employees at its client companies due to the potential leakage of sensitive…
Flutterwave Hit by Unknow Hackers Lost Millions of Dollars
Flutterwave, Africa’s largest startup, suffered a cyberattack resulting in the disappearance of over ₦2.9 billion (~$4.2 million) from its accounts last month. According to the reports, the missing funds were transferred across 28 accounts in 63 transactions in early February…
Verifiable Credentials: How has it Changed the Identity Verification Status
Online authentication has been a challenge to firms, regardless of their shapes and sizes. Despite more advanced cybersecurity solutions, threat actors and criminals continue to find sneaky new ways to access corporate systems. Verifiable credentials are one of the methods…
Demanding Data Privacy Measures, FBI Cyber Agent Urges Users
The FBI maintains a close eye on cyber security risks, but officials emphasized that in order to be more proactive with the prevention, they need the assistance of both people and businesses. Every one of us can simply navigate that…
Attacks are Being Outmanoeuvred by AI Cybersecurity in Novel Ways
These days, chatbots that use artificial intelligence (AI) are the hot topic. Yet, AI cybersecurity is one of the software program’s most rapidly expanding functions. That’s because real-time detection and defence against cyberattacks saves money for businesses, governments, and…
Customers’ Accounts Were Exposed in the Verizon breach
There have been a lot of talks lately about telecom companies and consumer data breaches. In the past few years, you are more likely to hear about T-Mobile announced in the headlines. There have been numerous attacks on the…
How the SYS01 Campaign Uses Multiple Evasion Tactics to Avoid Detection in Cyber Espionage
Multiple Malware Families: The Primary Evasion Tactic of the SYS01 Campaign In the world of cybersecurity, it is not uncommon for attackers to use multiple tactics to evade detection and carry out their malicious activities. The SYS01 campaign is a…
AI Takes Center Stage: How Artificial Intelligence is Revolutionizing the Marketing Industry
Artificial Intelligence (AI) has become a buzzword in the business world, and it’s no surprise that it is transforming marketing in unprecedented ways. AI-driven marketing is revolutionizing the industry by providing marketers with the ability to analyze data and personalize…
Despite the Risk of Ransomware Attacks, Businesses Continue to Pay
Most companies in four Asia-Pacific countries have had to protect against phishing and ransomware attacks, with those infected in Australia being the most willing to pay ransomware demands. Australians are also the most likely to be victims of such…
Does Antivirus Detect and Remove All Malware?
Antivirus software has become an essential tool in safeguarding our system online and offline. However, the question often arises in our heads is whether these software programs provide us complete protection against all types of malware and viruses or not. …
The West Accuses TikTok of Espionage & Data Mining
TikTok is one of the few social media corporate giants that was not created by a Silicon Valley business. The parent business, ByteDance, which launched the internet service in China in 2016, has offices spread across the globe, including…
New MOTW Bypass Method Introduced by LockBit
Despite being on the winning side of the race, LockBit operators continue to exfiltrate data from high-profile organizations and add the names of those organizations to its leak site. It’s well known that the tactics and techniques employed by…
APT41: Cyberespionage Group Targets Asian Materials Industry
The Chinese-sponsored APT41 cyberespionage group, also known as Blackfly, Barium Bronze Atlas, Double Dragon, Wicked Panda, and Wicked Spider has emerged as one of the most active threat groups since at least 2007. The cyber-threat group has recently been targeting…
Freenom Suspends Domain Registrations After Being Sued by Meta
Freenom, a domain name registrar that has attracted spammers and phishers with its free domain names, no longer accepts new domain name registrations. The action was taken just days after Meta filed a lawsuit against the Netherlands registrar, alleging…
Transparent Tribe Hackers Disseminate CapraRAT via Trojanized Messaging Apps
Transparent Tribe, an alleged Pakistan-aligned advanced persistent threat (APT) group, has been interconnected to an ongoing cyber espionage campaign targeting Indian and Pakistani Android users with a backdoor called CapraRAT. “Transparent Tribe distributed the Android CapraRAT backdoor via trojanized…
LastPass Releases New Security Incident Disclosure and Recommendations
LastPass was compromised twice last year by the same actor, once in late August 2022 and again on November 30, 2022. On Wednesday, the global password manager company released a report with new findings from its security incident investigation…
New Phishing Scam Targets User’s With Fake ChatGPT Platform
The general population is fascinated with AI chatbots like OpenAI’s ChatGPT. Sadly, the popularity of the AI tool has also attracted scammers who use it to carry out extremely complex investment frauds against naive internet users. Nevertheless, security experts warn…
Here are the Countries That Have Imposed TikTok Ban
This week, the U.S. and Canada have issued orders to ban the use of TikTok on state-issued gadgets, following the raising cybersecurity concerns over the video-sharing app. Bytedance, the Chinese company that owns TikTok, has long insisted that it does…
7 Essential Tips to Ensure Your Wi-Fi Security and Protect Your Personal Information
In today’s digital world, Wi-Fi has become an essential part of our lives. It provides us with access to the internet and allows us to connect to our devices wirelessly. However, as much as Wi-Fi has made our lives more…
Law Enforcement Using Facebook Chat Logs to Prosecute Abortion Seekers
Facebook and Google are two tech giants companies that provide online services such as social media and search engines, to millions of people worldwide. These companies collect vast amounts of data on their users. It has been reported that these…
Air Fryers are Offered by Scammers as a ‘Free’ Kitchen Gadget
The deputy chief executive officer of Sainsbury’s and Argos has warned shoppers to be vigilant against an air fryer scam targeting them at the moment. Taking part in an online survey is the only way to receive a free…
AI Image Generators: A Novel Cybersecurity Risk
Our culture could be substantially changed by artificial intelligence (AI) and there is a lot to look forward to if the AI tools we already have are any indication of what is to come. A number of things are…
Zoom Boss Greg Tomb Fired ‘Without Cause’
Zoom, the video conferencing platform that many people use to work from home, has terminated the contract of its President, Greg Tomb. Tomb was in charge of sales and had been involved in the company’s financial calls. But, Zoom has…
Thousands of Websites Attacked Via Compromised FTP Credentials
Wiz, a cloud security startup, has issued a warning about a widespread redirection campaign in which thousands of East Asian-targeted websites have been affected using legitimate FTP credentials. In many cases, the attackers gained access to highly secure auto-generated…
Attack on Oakland City attributed to Play Ransomware
Oakland recently became the victim of a ransomware attack that disrupted the city’s services and caused a state of emergency to be declared by the city. Cyberattacks are a real-world problem with real-world consequences and the recent attack on…
Southeastern Louisiana University & Tennessee State Hit by Breaches
After a possible incident last week forced the Southeastern Louisiana University to shut down its network and call in Louisiana State Police to investigate, the University is now on its fifth day without a website, email, or mechanism for submitting…
Consumers of Chick-fil-A had Grievances Following Account Takeovers
An automated credential stuffing attack that affected more than 71,000 customers of Chick-fil-A, an American food chain,for months has been made known to its clients. Attacks that use automation—often through bots—to test a large number of username-password combinations against…
Information of European Hotel Chain’s Customers Discovered in Unprotected Server
A researcher has recently found an unprotected server storing the personal data of several Falkensteiner hotel chain clients in Europe. Falkensteiner, the Austria-based hotel chain has hotels that are spread across Central and Eastern Europe, including Austria, Italy, Croatia, Slovakia,…
Visa Bolsters Cybersecurity Defenses with AI and Machine Learning
Enhancing Fraud Detection and Prevention with Visa Advanced Authorization (VAA) Visa is one of the largest payment companies in the world, handling billions of transactions every year. As such, it is a prime target for cyberattacks from hackers looking to…
Dubai’s Crypto Industry Introduces New Licensing Regulations
The crypto industry in Dubai is witnessing a huge breakthrough since the jurisdiction has recently come up with its new crypto regulatory framework, apparently providing individuals with a concrete licensing regime for their digital asset issues and service vendors. The…
A GoAnywhere MFT hack Exposes Hatch Bank’s Data Breach
Hackers exploited a zero-day vulnerability in Hatch Bank’s internal file transfer software, allowing access to thousands of Social Security numbers from customers, according to Hatch Bank, a digital-first bank that provides infrastructure for fintech companies offering their brand credit…
Crypto Scammer Monkey Drainer Shuts Down Criminal Operations
Cyber threats are not new in the crypto space. The industry has been witnessing advanced cyber security attacks since its inception and even recorded more during the 2022 crypto winter, especially in the DeFi Sector. According to Yahoo Finance, the…
For Your Mid to Large-Sized Firm, Here Are Four Best Cybersecurity Practices
As technology advances and becomes more sophisticated, cybercriminals continue to look for new ways to take advantage of enterprises. A cyber attack could result in financial loss, loss of reputation, and legal repercussions, among other catastrophic and permanent harms.…
Digital Resignation is Initial Stage of Safeguarding Privacy Online
Several internet businesses gather and use our personal information in exchange for access to their digital goods and services. With the use of that data, they can forecast and affect our behavior in the future. Recommendation algorithms, targeted marketing,…
Beware of Bot Malware: Understanding the Dangers and How to Protect Your Computer
How Bot Malware Spreads and Infects Your Computer Bot malware, also known as botnet malware, is a type of malicious software designed to create a network of infected computers or “bots” that can be remotely controlled by a hacker. These…
Trezor Users: Target of a Major Cryptocurrency Wallet Phishing Campaign
Trezor users are being coerced into disclosing their seed phrases. A new phishing campaign targeting cryptocurrency hardware wallet firm Trezor has been discovered. These wallets enable cryptocurrency users to keep their funds offline rather than in a “hot wallet”…
Some Hackers Use Malware-Free Methods
As cybercriminals try to become more and more sophisticated, they are turning away from their adversaries. They are turning back on their hacking attacks without even using any malware as part of their hacking campaigns, according to new research. …
Twitter Returns After Two-Hour Outage Affecting Tweets
On Wednesday, Twitter experienced a service disruption that resulted in users being unable to access certain parts of the platform, specifically the “Following” and “For you” feed. These feeds displayed an error message rather than the expected content. The problem…
YouTube Charged for Data Gathering on UK Minors
A million children’s personal data might be collected by YouTube, as per the research. According to the claim, YouTube violates the ‘age-appropriate design code’ set forth by the Information Commissioner’s Office (ICO). The UK’s data protection rules pertaining to the…
Resecurity Discovered the Investment Scam Network Digital Smoke
Resecurity discovered one of the largest investment fraud networks in terms of size and volume of operations designed to defraud InteSecurity from Australia, Canada, China, Colombia, the European Union, India, Singapore, Malaysia, the United Arab Emirates, Saudi Arabia, Mexico,…
What Are Some Big Cyber-Security Fears Concerning TikTok?
China claims that the US has inflated national security concerns over TikTok in an effort to suppress the Chinese startup. Due to concerns over cyber-security, US federal entities have been asked to remove the Chinese app from all staff devices…
Blue Cross Customers at Risk: Sobeys Hack Exposes Personal Data in Latest Breach
The Rising Threat of Data Breaches: An Overview of Recent Incidents Blue Cross, a Canadian insurance organisation, has recently alerted its customers about a possible data breach resulting from a cyberattack that occurred at Sobeys, a famous Canadian grocery chain.…
Fully patched Windows 11 Systems are Susceptible to the BlackLotus Bootkit
ESET’s analysis of the malware has shown that the BlackLotus bootkit may circumvent security safeguards on fully updated Windows 11 PCs and permanently infect them. BlackLotus is a brand-new threat actor that first appeared on darknet forums in October…
Popular Real Estate Theme in WordPress Leaves Websites Vulnerable to Cyber Attacks
The WP Residence Theme: An Overview of a Popular Real Estate Theme Real estate sites are one of the most famous and thriving sites on the web, and WordPress is one of the most generally used content management systems (CMS)…
Enterprise Users Still at Risk: RIG Exploit Kit Continues to Infect via Internet Explorer
The RIG Exploit Kit, a well-known and long-running exploit kit, is experiencing a significant increase in its success rate. The RIG Exploit Kit is a tool used by bad actors to break into computer systems. It is now attempting…
Mobile Banking Trojan Volume Doubles
There were nearly 200,000 new telecommunications and banking Trojans developed in 2022, an increase of 100% over the previous year and the biggest spike in mobile malware development seen in the previous six years, confirming the trend of mobile…
Australia’s OAIC Confirms Substantial Increase in Data Breaches
According to the Office of the Australian Information Commissioner’s (OAIC) most recent report on notifiable data breaches, there was a 26% rise in breaches in the second half of 2022, including many significant breaches that affected millions of Australians. The…
Data is currency: Tech Experts On Canada’s TikTok Ban on Government-issued Mobile Devices
The action to remove the video-sharing app TikTok has begun to spread, with several regions and city councils following Canada’s announcement of the app’s ban on government-issued mobile devices. As per Ryan Westman, senior manager of threat intelligence at…
Blind Eagle: Hackers Targets Prominent Industries in Columbia
BlackBerry has recently published a report on a malicious actor, Blind Eagle. It is a cyberespionage campaign based in South America that has been targeting systems in Ecuador, Chile, Spain, and Colombia since the year 2019. The most recent threat…
Customers are Being Used as Cyber “Crash Test Dummy,” Says CISA Director
The CEO of the Cybersecurity and Infrastructure Security Agency, Jen Easterly, referred to the current state of commercial cybersecurity as “unsustainable,” and she argued that businesses, consumers, and the government as a whole needed to change their expectations so…
CrowdSrike: Cybercriminals Are Choosing Data Extortion Over Ransomware Attacks
CrowdStrike’s threat intelligence recently reported that cybercriminals have been learning how data extortion attacks are more profitable than ransomware attacks, leading to a drastic shift in the behavior of cyber activities throughout 2022. The cybersecurity vendor’s “2023 Global Threat Report,”…
Tech Issues Persist at Minneapolis Public Schools
Students and staff from Minneapolis Public Schools returned to their school buildings this week. However, the ongoing issues resulting from a cyberattack that occurred in the district caused disruptions to continue for the remainder of the week. There was…
Free MortalKombat Ransomware Decryptor Released
An open-source universal decryptor for the newly discovered MortalKombat malware, which encrypts files, has been made available by the Romanian cybersecurity firm Bitdefender. The virus has been employed on dozens of victims in the United States, United Kingdom, Turkey, and…
Dish Network Blames Ransomware for Ongoing Outage
Dish, a satellite television provider in the United States, has confirmed that a ransomware attack is responsible for an ongoing service outage. The company also warned that the malicious actors have also exfiltrated data from its systems during the breach. …
U.S Marshals Service Suffers Data Breach, Hackers Steal Personal Data
The U.S. Marshals Service, one the oldest law enforcement agencies in the US, was hit by a major breach in which threat actors stole sensitive data. The attack highlights the rising problems of cyber attacks on government agencies and the…
Creator of WannaCry Hero and Kronos Malware Named Cybrary Fellow
Marcus Hutchins, a security researcher, has a new chapter to write after accidentally preventing the spread of the notorious WannaCry worm using a sinkhole he made in May 2017. Hutchins, who was detained for developing and marketing the Kronos…
Rapid7 Report: Attackers are Launching Exploits Faster Than Ever Before
Rapid7 has released its latest Vulnerability Intelligence Report, which examines 50 of the most significant security vulnerabilities and high-impact cyberattacks in 2022. The report examines attacker use cases and highlights exploitation trends, as well as provides a framework for…
Fraudsters can Rob your Entire Digital Life Using this iPhone Feature
The Wall Street Journal has recently published a detailed article covering a technique that thieves are using to steal not only people’s iPhones, but also their savings. The success of the attack is dependent on the thieves (often working…
Lazarus’s Latest Weapons: Wslink Loader and WinorDLL64 Backdoor
Cyberattacks have become increasingly advanced, and one of the most dangerous threats that companies face these days is backdoors. Backdoors are a type of malware that gives unauthorized access to a system to hackers, letting them steal important info, interrupt…
GoDaddy, a Web Hosting Provider Hit Multiple Times by the Same Group
This month, GoDaddy, a leading web hosting provider, revealed that it had experienced a major security breach over several years, resulting in the theft of company source code, customer and employee login credentials, and the introduction of malware onto…
Here is How Toronto-area Police Force Helped Take Down a Russian-linked Hacking Group
The Toronto police force has recently been explanatory on how it ended up getting involved with the international attempt on legally hack Hive, one of most ruthless ransomware groups in the world. The contributions made by the Peel Regional Police…
Cybercriminals Use ChatGPT to Ease Their Operations
Cybercriminals have already leveraged the power of AI to develop code that may be used in a ransomware attack, according to Sergey Shykevich, a lead ChatGPT researcher at the cybersecurity firm Checkpoint security. Threat actors can use the capabilities…
Future of the Cloud is Plagued by Security Issues
Several corporate procedures require the use of cloud services. Businesses may use cloud computing to cut expenses, speed up deployments, develop at scale, share information effortlessly, and collaborate effectively all without the need for a centralised site. But, malicious…
The Ukraine Invasion Blew up Russian Cybercrime Alliances
Over the years, Russia has built up one of the world’s most formidable cybercriminal ecosystems. Russian hacker groups are linked to disruptive cyberattacks including one of the United States’ most critical oil pipelines and the world’s largest meat producers. …
How SMB Protocol Functions and its Susceptibility to Vulnerabilities
The SMB protocol enables computers connected to the same network to share files and hardware such as printers and external hard drives. However, the protocol’s popularity has also led to an increase in malicious attacks, as older versions of…
Travelling? These Are 5 Tips For Better Online Safety
Using your electronics while travelling is extremely risky, regardless of when you go or why. The risk to your privacy and problems with online safety when travelling are the two things that will ruin a vacation the quickest. Despite…
Preventing a USB Killer Threat
A USB Killer is a USB drive that was altered to emit an electrical surge that can break or destroy hardware when a modified flash drive is plugged into a computer’s USB port. The concept for USB Killers was created…
Info-stealer Ransomware hit Government Organisations
Threat actors have targeted government entities with the PureCrypter malware downloader, which is used to deliver several information stealers and ransomware variants to targeted entities. According to a study conducted by researchers at Menlo Security, the initial payload of…
What Must You Do Before Uploading Your Sensitive Data to the Cloud?
Cloud storage has emerged as a prominent tool when it comes to managing or storing users’ data. Prior to the establishment of cloud storage technology, more than a decade ago, emailing individual files to yourself or saving them to an…
Meta Announces a New AI-powered Large Language Model
On Friday, Meta introduced its new AI-powered large language model (LLM) named LLaMA-13B that, in spite of being “10x smaller,” can outperform OpenAI’s GPT-3 model. Language assistants in the ChatGPT style could be run locally on devices like computers and…
Online Tracking: What Do You Need to Know?
You can leave a record of whatever you click on the Internet whenever you browse the Internet, as well as any websites you visit. The majority of websites use small pieces of data known as cookies to track information…
Challenges With Software Supply Chain & CNAPP
In 2021, sales of CNAPP exceeded $1.7 billion, an increase of roughly 49% over 2020, according to a recent Frost & Sullivan analysis. According to Frost & Sullivan, CNAPP revenue growth will average over 26% annually between 2021 and 2026.…
2023: The Year of AI? A Closer Look at AI Trends
Threats to cyberspace are constantly changing. As a result, businesses rely on cutting-edge tools to respond to risks and, even better, prevent them from happening in the first place. The top five cybersecurity trends from last year were previously…
Ransomware Attack Compromises Indigo Employees’ Data
As per Indigo Books & Music Inc., a ransomware attack compromised the data of current and former employees at Canada’s largest bookstore chain. Indigo said in a statement on its website that the February 8 breach left no evidence…
How to Avoid Cyberattacks on Your Home Network
As remote working can offer employees several benefits, it also poses the possibility of creating the additional threat of cyber-attacks in the future because employees work outside of their company’s internal network. There is also the possibility that if…
Stress May Drive Half of the Cyber Staffer to Leave Their Jobs
We are all aware of the significance of cybersecurity sector and how it is short of vacancies and skills. It is yet unfortunate that their may not be an immediate relief, research firm Gartner’s estimates come true that a full…
Dangers of Adopting Unsanctioned SaaS Applications
A sleek little app-store sidebar was silently introduced to the right side of your session screen by the most recent programme update, as you might have seen on your most recent Zoom calls. With the touch of a button…
Canadian Telecom Provider Telus is Reportedly Breached
One of Canada’s biggest telecommunications companies, Telus, is allegedly investigating a system breach believed to be fairly severe when malicious actors exposed samples of what they claimed to be private corporate information online. As per sources, the malicious actors…
Open Source Software has Advantages, but Supply Chain Risks Should not be Overlooked
While app development is faster and easier, security remains a concern. In an era of continuous integration and deployment, DevOps, and daily software updates, open-source components are becoming increasingly important in the software development scene. In a report released last…
Mozilla Research Lashes Out Google Over ‘Misleading’ Privacy Labels on Leading Android Apps
An investigation, conducted by the Mozilla Foundation, into the data safety labels and privacy policy on the Google Play Store has exposed some severe loopholes that enable apps like Twitter, TikTok, and Facebook to give inaccurate or misleading information about…
Data Centers Hacked to Collect Data from Multinational Firms
Over the past 18 months, there have been reports of cyberattacks against numerous data centers in various parts of the world, which have led to the leakage of information about some of the biggest corporations in the world and the…
Warnings About Scams, Tips for Avoiding Them
There have been several frauds and scams that have been presented on various platforms daily and the Ontario Provincial Police (OPP) and the Canadian Anti-Fraud Centre (CAFC) continue to promote awareness to reduce the incidents of community members being…
Top Cybersecurity Trends to Watch Out in 2023
The most recent research from Malwarebytes, which examines the situation of malware in 2023, has just been published. The research includes information on current significant security advancements, 5 cyber threat archetypes to watch out for this year, the most…
DDoS Attacks: Becoming More Powerful & Shorter in Duration
Microsoft says that it witnessed distributed denial-of-service attacks turn shorter in duration in 2022 while also becoming more effective and capable of greater impact. As per Microsoft’s DDoS trends report for 2022, the United States, India, and East Asia…
FinTech Sector Emerges as a Prominent Target for Cybercriminals
Like every other sector that has evolved, thanks to the innovative digital transformation it has adopted, cybercrime has become a significant challenge in the finances of organizations. As per research by VMware’s Modern Bank Heist, there has been an increase…
Dark Web Malware Steals Your Data
As the dark web seeks new customers and victims, it appears that updated versions of information-stealing malware have made their way onto it and are now circulating the dark web. There have been reports from cybersecurity researchers from SEKOIA…
Security Experts Condemn GoDaddy’s Response to the “Multi-Year” Hack
After GoDaddy announced a significant breach last week, where hackers may have had access to the company’s network for years, the infosec industry has voiced concerns. GoDaddy said last week that it detected the breach in December as a…
Crucial US military Emails was Publicly Available
A US Department of Defense exposed a server that was leaking private internal military emails online Security researcher Anurag Sen discovered the unprotected server, which was “hosted on Microsoft’s Azure federal cloud for Department of Defense customers,” according to a…
One-fifth of British Folks Have Fallen Victim to Online Fraudsters
As per F-Secure, millions of UK adults have been victims of digital scammers in the past, but a quarter has no security controls in place to safeguard their online activity. As part of a global Living Secure study into…
Researchers Develop AI Cyber Defender to Tackle Cyber Actors
A recently developed deep reinforcement learning (DRL)-based artificial intelligence (AI) system can respond to attackers in a simulated environment and stop 95% of cyberattacks before they get more serious. The aforementioned findings were made by researchers from the Department of…
How Does Modern Software Work?
It is encouraging to see a thriving community within the cybersecurity industry clamoring to share experiences as conference season approaches. As a result of the call-for-speakers process, attendees can get a pretty clear idea of what’s on the minds…
Remember to Clear the Cache on Your iPhone
Websites and apps may load more quickly by taking advantage of the cache, a designated area in your iPhone that stores temporary data. As cache data use up space on your phone, it’s a good idea to wipe it off…
Most Ransomware Attacks in 2022 Took Advantage of Outdated Bugs
In the 2022 attacks, ransomware operators took advantage of a number of outdated vulnerabilities that allowed the attackers to become persistent and migrate laterally to complete their objectives. A report from Ivanti released last week stated that the flaws,…
Attackers Use a Poisoned Google Search to Target Chinese-speaking Individuals
A new nefarious campaign has been discovered that promotes malicious websites and fake installers by using tainted Google Search results. FatalRAT is primarily targeting Chinese people in East and Southeast Asia. The IOCs of the threat activities did not correspond…
Internet Users are Inundated With Adware and False Advise Frauds Thanks to Hackers
Avast, a leading provider of cybersecurity software, has released its Q4 2022 Threat Report, which closely examines the kinds of scams that prey on unsuspecting consumers. One of the most well-known scam types was social engineering, which highlights the…
How Can Developers Win the Data Security Battle?
In IT organizations, chief information officers (CIOs) rank security as their top challenge as being one of their biggest weaknesses. It is estimated that 82% of companies are vulnerable to cyber threats in their own software supply chains. Because…
RailYatri Hack: 31M Users Data Impacted On Indian Ticketing Platform
RailYatri, a popular Indian train ticket booking platform, experienced a massive data breach, exposing the personal details of over 31 million (31,062,673) users/travelers. The breach is thought to have happened in late December 2022, and the database of sensitive…
Managing Privileges is Essential Security Strategy
In order to stop increasingly sophisticated hacker assaults, having a system that regulates privileged access is crucial. Therefore, one must integrate privilege removal into their cyber strategy to ensure secure protection without loopholes. Privileged access: What Is It? Privileged access…