< p style=”text-align: justify;”>According to VulnCheck, a critical vulnerability identified as CVE-2024-12856 has been discovered in Four-Faith industrial routers, specifically affecting the F3x24 and F3x36 models, as well as users’ machines. Evidence suggests active exploitation of this vulnerability in…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Cybercriminals Leverage LLMs to Generate 10,000 Malicious Code Variants
< p style=”text-align: justify;”>Cybersecurity researchers are raising alarms over the misuse of large language models (LLMs) by cybercriminals to create new variants of malicious JavaScript at scale. A report from Palo Alto Networks Unit 42 highlights how LLMs, while not…
New Two-Step Phishing Attack Exploits Microsoft Visio and SharePoint
A novel two-step phishing strategy is targeting Microsoft Visio files (.vsdx) and SharePoint, signaling a new trend in cyber deception, according to experts. Researchers at Perception Point have noted a significant rise in attacks leveraging these previously uncommon .vsdx…
Cybercriminals Exploit Identity Verification Systems
Cybercriminals on the dark web have developed new ways to exploit identity verification systems. Rather than hacking or stealing personal information, they are purchasing it directly from individuals, as revealed by security researchers at iProov. This approach allows them…
Sanctions Imposed on North Korean Cyber Activities Supporting Nuclear Ambitions
South Korea has announced sanctions against 15 North Korean nationals and the Chosun Geumjeong Economic Information Technology Exchange Corporation for orchestrating schemes that finance North Korea’s nuclear weapons and missile programs. These measures target a global network involved in…
rth Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign
The North Korean hackers behind the ongoing Contagious Interview campaign have been observed launching a new JavaScript malware named OtterCookie. The campaign includes social engineering techniques, with the hacker team frequently posing as recruiters to trick job seekers into…
Cyberattack Compromises European Space Agency Online Store Security
A malware attack on the European Space Agency’s official web shop revealed that the application was hacked by loading a JavaScript script that generated a fake Stripe payment page at checkout. With an annual budget of more than 10…
Protect Yourself from Zelle Scams: Prevention Tips and Recovery Steps
Zelle has become a popular choice for online money transfers due to its simplicity, zero fees, and support from over 1,700 banks. However, since its launch in June 2017, the peer-to-peer payment service has been plagued by fraud. On…
Rising Cyber Threats in Q3 2024: AI’s Dual Role in Attacks and Defense
The Q3 2024 Threat Report from Gen unveils a concerning rise in the sophistication of cyber threats, shedding light on how artificial intelligence (AI) is both a tool for attackers and defenders. As cybercriminals evolve their tactics, the line…
Understanding VoIP DDoS Attacks: Prevention and Mitigation Strategies
A distributed denial-of-service (DDoS) attack targets a VoIP server by overwhelming it with phony user requests. This excessive traffic can exceed the network’s capacity, causing service disruptions and making genuine user requests unprocessable. Online criminals exploit these attacks to…
Critical Infrastructure Faces Rising Ransomware Risks
In October 2024, Interlock claimed to have attacked several organizations, including Wayne County, Michigan, which is known for its cyberattacks. Ransomware is characterized by the fact that the encrypted data is encrypted by an encryptor specifically designed for the…
Builder.ai Data Breach Exposes Sensitive Information of Over 3 Million Users
A huge data security breach has come to light, with the data platform Builder.ai. It’s a service that lets organizations build their own proprietary, custom software applications, which don’t need heavy programming. According to a blog post by a…
Bitcoin Heist in Japan Attributed to North Korean Cybercriminals
A joint alert from the FBI, the Department of Defense (D.O.D.) Cyber Crime Center and the National Police Agency of Japan reveal that a North Korean threat group carried out a significant cryptocurrency theft from Japan’s crypto firm DMM…
CISA’s Enhanced Mobile Security Recommendations Following U.S. Telecom Breach
The Cybersecurity and Infrastructure Security Agency (CISA) issued updated recommendations in December 2024 aimed at enhancing mobile phone cybersecurity. Following a significant hack involving major U.S. telecom companies like AT&T, Verizon, and Lumen Technologies, these guidelines focus on adopting…
Here’s How Google Willow Chip Will Impact Startup Innovation in 2025
As technology advances at an unprecedented rate, the recent unveiling of Willow, Google’s quantum computing device, ushers in a new age for startups. Willow’s unprecedented computing capabilities—105 qubits, roughly double those of its predecessor, Sycamore—allow it to accomplish jobs…
Tech’s Move Toward Simplified Data Handling
The ethos of the tech industry for a long time has always been that there is no shortage of data, and that is a good thing. Recent patents from IBM and Intel demonstrate that the concept of data minimization…
New Finds from The June Ascension Hack
Healthcare industry giant Ascension has broken the silence and revealed more sensitive information concerning the recent hack in June. Through a worker opening a suspicious file without even knowing the malware was actually very harmful to download, it gave room…
75% of Ransomware Attacks Target Healthcare on Holidays: Expert Insights
Approximately 75% of ransomware attacks on the healthcare sector over the past year occurred during weekends or holidays, highlighting the urgency for organizations to strengthen their staffing and security measures during these high-risk periods. Jeff Wichman, director of incident…
AI Impersonations: Revealing the New Frontier of Scamming
In the age of rapidly evolving artificial intelligence (AI), a new breed of frauds has emerged, posing enormous risks to companies and their clients. AI-powered impersonations, capable of generating highly realistic voice and visual content, have become a major…
Integrating Human Expertise and Technology for Robust Cybersecurity
< p style=”text-align: justify;”> In today’s complex digital landscape, the role of human expertise in cybersecurity remains indispensable. Two pivotal approaches — human-led security testing and human-centric cybersecurity (HCC) — have gained prominence, each contributing distinct strengths. However, these…