Category: CySecurity News – Latest Information Security and Hacking Incidents

ChatGPT Sparking Security Concerns

  Cyberhaven, a data security company, recently released a report in which it found and blocked requests to input data into ChatGPT from 4.2% of the 1.6 million employees at its client companies due to the potential leakage of sensitive…

Flutterwave Hit by Unknow Hackers Lost Millions of Dollars

Flutterwave, Africa’s largest startup, suffered a cyberattack resulting in the disappearance of over ₦2.9 billion (~$4.2 million) from its accounts last month. According to the reports, the missing funds were transferred across 28 accounts in 63 transactions in early February…

Attacks are Being Outmanoeuvred by AI Cybersecurity in Novel Ways

  These days, chatbots that use artificial intelligence (AI) are the hot topic. Yet, AI cybersecurity is one of the software program’s most rapidly expanding functions. That’s because real-time detection and defence against cyberattacks saves money for businesses, governments, and…

Customers’ Accounts Were Exposed in the Verizon breach

  There have been a lot of talks lately about telecom companies and consumer data breaches. In the past few years, you are more likely to hear about T-Mobile announced in the headlines. There have been numerous attacks on the…

Does Antivirus Detect and Remove All Malware?

Antivirus software has become an essential tool in safeguarding our system online and offline. However, the question often arises in our heads is whether these software programs provide us complete protection against all types of malware and viruses or not. …

The West Accuses TikTok of Espionage & Data Mining

  TikTok is one of the few social media corporate giants that was not created by a Silicon Valley business. The parent business, ByteDance, which launched the internet service in China in 2016, has offices spread across the globe, including…

New MOTW Bypass Method Introduced by LockBit

  Despite being on the winning side of the race, LockBit operators continue to exfiltrate data from high-profile organizations and add the names of those organizations to its leak site. It’s well known that the tactics and techniques employed by…

APT41: Cyberespionage Group Targets Asian Materials Industry

The Chinese-sponsored APT41 cyberespionage group, also known as Blackfly, Barium Bronze Atlas, Double Dragon, Wicked Panda, and Wicked Spider has emerged as one of the most active threat groups since at least 2007.  The cyber-threat group has recently been targeting…

Freenom Suspends Domain Registrations After Being Sued by Meta

  Freenom, a domain name registrar that has attracted spammers and phishers with its free domain names, no longer accepts new domain name registrations. The action was taken just days after Meta filed a lawsuit against the Netherlands registrar, alleging…

Transparent Tribe Hackers Disseminate CapraRAT via Trojanized Messaging Apps

  Transparent Tribe, an alleged Pakistan-aligned advanced persistent threat (APT) group, has been interconnected to an ongoing cyber espionage campaign targeting Indian and Pakistani Android users with a backdoor called CapraRAT.  “Transparent Tribe distributed the Android CapraRAT backdoor via trojanized…

New Phishing Scam Targets User’s With Fake ChatGPT Platform

The general population is fascinated with AI chatbots like OpenAI’s ChatGPT. Sadly, the popularity of the AI tool has also attracted scammers who use it to carry out extremely complex investment frauds against naive internet users. Nevertheless, security experts warn…

Here are the Countries That Have Imposed TikTok Ban

This week, the U.S. and Canada have issued orders to ban the use of TikTok on state-issued gadgets, following the raising cybersecurity concerns over the video-sharing app.  Bytedance, the Chinese company that owns TikTok, has long insisted that it does…

AI Image Generators: A Novel Cybersecurity Risk

  Our culture could be substantially changed by artificial intelligence (AI) and there is a lot to look forward to if the AI tools we already have are any indication of what is to come. A number of things are…

Zoom Boss Greg Tomb Fired ‘Without Cause’

Zoom, the video conferencing platform that many people use to work from home, has terminated the contract of its President, Greg Tomb. Tomb was in charge of sales and had been involved in the company’s financial calls. But, Zoom has…

Thousands of Websites Attacked Via Compromised FTP Credentials

  Wiz, a cloud security startup, has issued a warning about a widespread redirection campaign in which thousands of East Asian-targeted websites have been affected using legitimate FTP credentials. In many cases, the attackers gained access to highly secure auto-generated…

Attack on Oakland City attributed to Play Ransomware

  Oakland recently became the victim of a ransomware attack that disrupted the city’s services and caused a state of emergency to be declared by the city. Cyberattacks are a real-world problem with real-world consequences and the recent attack on…

Consumers of Chick-fil-A had Grievances Following Account Takeovers

  An automated credential stuffing attack that affected more than 71,000 customers of Chick-fil-A, an American food chain,for months has been made known to its clients.  Attacks that use automation—often through bots—to test a large number of username-password combinations against…

Dubai’s Crypto Industry Introduces New Licensing Regulations

The crypto industry in Dubai is witnessing a huge breakthrough since the jurisdiction has recently come up with its new crypto regulatory framework, apparently providing individuals with a concrete licensing regime for their digital asset issues and service vendors.  The…

A GoAnywhere MFT hack Exposes Hatch Bank’s Data Breach

  Hackers exploited a zero-day vulnerability in Hatch Bank’s internal file transfer software, allowing access to thousands of Social Security numbers from customers, according to Hatch Bank, a digital-first bank that provides infrastructure for fintech companies offering their brand credit…

Crypto Scammer Monkey Drainer Shuts Down Criminal Operations

Cyber threats are not new in the crypto space. The industry has been witnessing advanced cyber security attacks since its inception and even recorded more during the 2022 crypto winter, especially in the DeFi Sector.  According to Yahoo Finance, the…

Some Hackers Use Malware-Free Methods

  As cybercriminals try to become more and more sophisticated, they are turning away from their adversaries. They are turning back on their hacking attacks without even using any malware as part of their hacking campaigns, according to new research.  …

Twitter Returns After Two-Hour Outage Affecting Tweets

On Wednesday, Twitter experienced a service disruption that resulted in users being unable to access certain parts of the platform, specifically the “Following” and “For you” feed. These feeds displayed an error message rather than the expected content.  The problem…

YouTube Charged for Data Gathering on UK Minors

A million children’s personal data might be collected by YouTube, as per the research. According to the claim, YouTube violates the ‘age-appropriate design code’ set forth by the Information Commissioner’s Office (ICO). The UK’s data protection rules pertaining to the…

Resecurity Discovered the Investment Scam Network Digital Smoke

  Resecurity discovered one of the largest investment fraud networks in terms of size and volume of operations designed to defraud InteSecurity from Australia, Canada, China, Colombia, the European Union, India, Singapore, Malaysia, the United Arab Emirates, Saudi Arabia, Mexico,…

What Are Some Big Cyber-Security Fears Concerning TikTok?

China claims that the US has inflated national security concerns over TikTok in an effort to suppress the Chinese startup. Due to concerns over cyber-security, US federal entities have been asked to remove the Chinese app from all staff devices…

Mobile Banking Trojan Volume Doubles

  There were nearly 200,000 new telecommunications and banking Trojans developed in 2022, an increase of 100% over the previous year and the biggest spike in mobile malware development seen in the previous six years, confirming the trend of mobile…

Australia’s OAIC Confirms Substantial Increase in Data Breaches

According to the Office of the Australian Information Commissioner’s (OAIC) most recent report on notifiable data breaches, there was a 26% rise in breaches in the second half of 2022, including many significant breaches that affected millions of Australians. The…

Blind Eagle: Hackers Targets Prominent Industries in Columbia

BlackBerry has recently published a report on a malicious actor, Blind Eagle. It is a cyberespionage campaign based in South America that has been targeting systems in Ecuador, Chile, Spain, and Colombia since the year 2019.  The most recent threat…

Tech Issues Persist at Minneapolis Public Schools

  Students and staff from Minneapolis Public Schools returned to their school buildings this week. However, the ongoing issues resulting from a cyberattack that occurred in the district caused disruptions to continue for the remainder of the week.  There was…

Free MortalKombat Ransomware Decryptor Released

An open-source universal decryptor for the newly discovered MortalKombat malware, which encrypts files, has been made available by the Romanian cybersecurity firm Bitdefender. The virus has been employed on dozens of victims in the United States, United Kingdom, Turkey, and…

Dish Network Blames Ransomware for Ongoing Outage

Dish, a satellite television provider in the United States, has confirmed that a ransomware attack is responsible for an ongoing service outage. The company also warned that the malicious actors have also exfiltrated data from its systems during the breach. …

Lazarus’s Latest Weapons: Wslink Loader and WinorDLL64 Backdoor

Cyberattacks have become increasingly advanced, and one of the most dangerous threats that companies face these days is backdoors. Backdoors are a type of malware that gives unauthorized access to a system to hackers, letting them steal important info, interrupt…

Cybercriminals Use ChatGPT to Ease Their Operations

  Cybercriminals have already leveraged the power of AI to develop code that may be used in a ransomware attack, according to Sergey Shykevich, a lead ChatGPT researcher at the cybersecurity firm Checkpoint security. Threat actors can use the capabilities…

Future of the Cloud is Plagued by Security Issues

  Several corporate procedures require the use of cloud services. Businesses may use cloud computing to cut expenses, speed up deployments, develop at scale, share information effortlessly, and collaborate effectively all without the need for a centralised site.  But, malicious…

The Ukraine Invasion Blew up Russian Cybercrime Alliances

  Over the years, Russia has built up one of the world’s most formidable cybercriminal ecosystems. Russian hacker groups are linked to disruptive cyberattacks including one of the United States’ most critical oil pipelines and the world’s largest meat producers.  …

Travelling? These Are 5 Tips For Better Online Safety

  Using your electronics while travelling is extremely risky, regardless of when you go or why. The risk to your privacy and problems with online safety when travelling are the two things that will ruin a vacation the quickest. Despite…

Preventing a USB Killer Threat

A USB Killer is a USB drive that was altered to emit an electrical surge that can break or destroy hardware when a modified flash drive is plugged into a computer’s USB port. The concept for USB Killers was created…

Info-stealer Ransomware hit Government Organisations

  Threat actors have targeted government entities with the PureCrypter malware downloader, which is used to deliver several information stealers and ransomware variants to targeted entities.   According to a study conducted by researchers at Menlo Security, the initial payload of…

Meta Announces a New AI-powered Large Language Model

On Friday, Meta introduced its new AI-powered large language model (LLM) named LLaMA-13B that, in spite of being “10x smaller,” can outperform OpenAI’s GPT-3 model. Language assistants in the ChatGPT style could be run locally on devices like computers and…

Online Tracking: What Do You Need to Know?

  You can leave a record of whatever you click on the Internet whenever you browse the Internet, as well as any websites you visit. The majority of websites use small pieces of data known as cookies to track information…

Challenges With Software Supply Chain & CNAPP

In 2021, sales of CNAPP exceeded $1.7 billion, an increase of roughly 49% over 2020, according to a recent Frost & Sullivan analysis. According to Frost & Sullivan, CNAPP revenue growth will average over 26% annually between 2021 and 2026.…

2023: The Year of AI? A Closer Look at AI Trends

  Threats to cyberspace are constantly changing. As a result, businesses rely on cutting-edge tools to respond to risks and, even better, prevent them from happening in the first place. The top five cybersecurity trends from last year were previously…

Ransomware Attack Compromises Indigo Employees’ Data

  As per Indigo Books & Music Inc., a ransomware attack compromised the data of current and former employees at Canada’s largest bookstore chain. Indigo said in a statement on its website that the February 8 breach left no evidence…

How to Avoid Cyberattacks on Your Home Network

  As remote working can offer employees several benefits, it also poses the possibility of creating the additional threat of cyber-attacks in the future because employees work outside of their company’s internal network.   There is also the possibility that if…

Dangers of Adopting Unsanctioned SaaS Applications

  A sleek little app-store sidebar was silently introduced to the right side of your session screen by the most recent programme update, as you might have seen on your most recent Zoom calls. With the touch of a button…

Canadian Telecom Provider Telus is Reportedly Breached

  One of Canada’s biggest telecommunications companies, Telus, is allegedly investigating a system breach believed to be fairly severe when malicious actors exposed samples of what they claimed to be private corporate information online. As per sources, the malicious actors…

Warnings About Scams, Tips for Avoiding Them

  There have been several frauds and scams that have been presented on various platforms daily and the Ontario Provincial Police (OPP) and the Canadian Anti-Fraud Centre (CAFC) continue to promote awareness to reduce the incidents of community members being…

Top Cybersecurity Trends to Watch Out in 2023

  The most recent research from Malwarebytes, which examines the situation of malware in 2023, has just been published. The research includes information on current significant security advancements, 5 cyber threat archetypes to watch out for this year, the most…

DDoS Attacks: Becoming More Powerful & Shorter in Duration

  Microsoft says that it witnessed distributed denial-of-service attacks turn shorter in duration in 2022 while also becoming more effective and capable of greater impact. As per Microsoft’s DDoS trends report for 2022, the United States, India, and East Asia…

FinTech Sector Emerges as a Prominent Target for Cybercriminals

Like every other sector that has evolved, thanks to the innovative digital transformation it has adopted, cybercrime has become a significant challenge in the finances of organizations. As per research by VMware’s Modern Bank Heist, there has been an increase…

Dark Web Malware Steals Your Data

  As the dark web seeks new customers and victims, it appears that updated versions of information-stealing malware have made their way onto it and are now circulating the dark web.  There have been reports from cybersecurity researchers from SEKOIA…

Crucial US military Emails was Publicly Available

A US Department of Defense exposed a server that was leaking private internal military emails online Security researcher Anurag Sen discovered the unprotected server, which was “hosted on Microsoft’s Azure federal cloud for Department of Defense customers,” according to a…

Researchers Develop AI Cyber Defender to Tackle Cyber Actors

A recently developed deep reinforcement learning (DRL)-based artificial intelligence (AI) system can respond to attackers in a simulated environment and stop 95% of cyberattacks before they get more serious.  The aforementioned findings were made by researchers from the Department of…

How Does Modern Software Work?

  It is encouraging to see a thriving community within the cybersecurity industry clamoring to share experiences as conference season approaches. As a result of the call-for-speakers process, attendees can get a pretty clear idea of what’s on the minds…

Remember to Clear the Cache on Your iPhone

Websites and apps may load more quickly by taking advantage of the cache, a designated area in your iPhone that stores temporary data. As cache data use up space on your phone, it’s a good idea to wipe it off…

Most Ransomware Attacks in 2022 Took Advantage of Outdated Bugs

  In the 2022 attacks, ransomware operators took advantage of a number of outdated vulnerabilities that allowed the attackers to become persistent and migrate laterally to complete their objectives.  A report from Ivanti released last week stated that the flaws,…

How Can Developers Win the Data Security Battle?

  In IT organizations, chief information officers (CIOs) rank security as their top challenge as being one of their biggest weaknesses. It is estimated that 82% of companies are vulnerable to cyber threats in their own software supply chains.  Because…

Managing Privileges is Essential Security Strategy

In order to stop increasingly sophisticated hacker assaults, having a system that regulates privileged access is crucial. Therefore, one must integrate privilege removal into their cyber strategy to ensure secure protection without loopholes. Privileged access: What Is It? Privileged access…