The Overlooked Danger of Password Reuse While digital access is becoming increasingly prevalent in our everyday lives, from managing finances to enjoying online entertainment, there remains a critical security lapse: password reuse. Even though it is convenient, this practice…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Finally, Safer Chats! Apple to Encrypt Messages Between iPhones and Android Phones
Apple is set to make a major improvement in how people using iPhones and Android devices communicate. Soon, text messages exchanged between these two platforms will be protected with end-to-end encryption, offering better privacy and security. For years, secure…
Ransomware Hackers Develop Advanced Tool for VPN Breaches
In the Black Basta ransomware group, an automated brute force attack tool referred to as BRUTED has been developed to target and compromise edge networking devices such as firewalls and VPNs, as well as other edge networking devices. By…
Raymond Cyberattack: IT Teams, Authorities Investigate Massive Breach
Raymond Limited, a leading textile and apparel firm, acknowledged a cyberattack on its IT infrastructure on February 19. The company quickly segregated affected systems to protect essential business operations and avoid disruptions to customer-facing platforms or shop networks. Rakesh…
Ransomware Group Uses Unpatched Webcams to Deploy Attacks
A recent cybersecurity report by S-RM has revealed a new tactic used by the Akira ransomware group, demonstrating their persistence in bypassing security defenses. When their initial attempt to deploy ransomware was blocked by an endpoint detection and response…
Auto Industry Faces Sharp Rise in Cyberattacks, Raising Costs and Risks
The growing use of digital systems in cars, trucks, and mobility services has made the automotive industry a new favorite target for hackers. Companies involved in making vehicles, supplying parts, and even selling them are now dealing with a…
Here’s How to Prevent Outdated Software from Hurting Your Business
Do you think continuing with the same old version of the same old software is a good idea? While it may function adequately for the time being, the clock is ticking towards disaster. Waiting to upgrade results in a…
North Korean Spyware Disguised as Android Apps Found on Google Play
Researchers have discovered at least five Android apps on Google Play that secretly function as spyware for the North Korean government. Despite passing Google Play’s security checks, these apps collect personal data from users without their knowledge. The malware,…
Growing Concerns Over Deceptive Master Password Reset Emails
A network security risk associated with unauthorized password resets is very significant, as it can expose sensitive information and systems to cyber threats. IT administrators must take care to monitor and validate every password reset, particularly those that involve…
New Ransomware ‘SuperBlack’ Abuses Fortinet Firewall Flaws to Launch Attacks
A newly discovered ransomware group known as Mora_001 is carrying out cyberattacks by exploiting security weaknesses found in Fortinet’s firewall systems. The group is using a custom ransomware strain named SuperBlack to target organizations and lock their data for…
Medusa Ransomware Attacks: CISA, FBI, and MS-ISAC Issue #StopRansomware Advisory
The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the FBI and the Multi-State Information Sharing and Analysis Center (MS-ISAC), has issued a #StopRansomware advisory, warning organizations about the increasing threat of Medusa ransomware. Medusa, a ransomware-as-a-service (RaaS)…
Microsoft Unearths Novel XCSSET macOS Malware Variant Targeting Xcode Projects
Microsoft Threat Intelligence identified a new strain of XCSSET, a complex modular macOS malware that targets Xcode programs. The malware was discovered in the wild during routine threat hunting, and it is the first known XCSSET variant to appear…
Smishing Scams and How to Strengthen Cybersecurity
There is a growing threat to individuals from spamming, a form of cyber attack derived from SMS phishing, which uses text messaging to deceive them into disclosing sensitive information or engaging with malicious links via text messaging. Though the…
How Web Browsers Have Become a Major Data Security Risk
For years, companies protected sensitive data by securing emails, devices, and internal networks. But work habits have changed. Now, most of the data moves through web browsers. Employees often copy, paste, upload, or transfer information online without realizing the…
The Business Consequences of Believing ID Verification Myths
With the advent of cybercrime, a highly lucrative industry has emerged, which in turn has drawn the attention of malicious actors eager to exploit the growing digital landscape. Cyber-attacks have become increasingly sophisticated and frequent and have made the…
Amazon Faces Criticism For Still Hosting Stalkerware Victims’ Data
Amazon is drawing fire for hosting data from the Cocospy, Spyic, and Spyzie apps weeks after being notified of the problem, as the spyware firms continue to upload sensitive phone data of 3.1 million users to Amazon Web Services…
How Data Removal Services Protect Your Online Privacy from Brokers
Data removal services play a crucial role in safeguarding online privacy by helping individuals remove their personal information from data brokers and people-finding websites. Every time users browse the internet, enter personal details on websites, or use search engines,…
The Future of Work: Why Remote Desktop Solutions Are Essential
The workplace is transforming at an unprecedented rate. Remote and hybrid work models, once considered temporary adjustments, have now become permanent components of modern business operations. Organizations worldwide are seeking secure, efficient, and cost-effective solutions to support a distributed…
SIM Swap Scams Growing in the Middle East — Here’s How They Work
The Middle East is seeing a sharp rise in SIM swapping scams, where criminals find ways to take over people’s mobile numbers and misuse them for financial fraud. A new report by cybersecurity experts reveals that scammers are using…
Major Data Breach at Jaguar Land Rover Raises Security Concerns
It has been revealed that a cybercriminal, described as “Rey” on the dark web, has publicly claimed responsibility for a substantial cyberattack that occurred against Jaguar Land Rover over a period of two months. The disclosure was made on a…