The growing number of online accounts has made managing passwords increasingly difficult. With users juggling dozens of accounts, creating secure yet memorable passwords has become a major challenge. Traditional password guidelines emphasize complexity, requiring combinations of uppercase and lowercase…
Category: CySecurity News – Latest Information Security and Hacking Incidents
How to Declutter and Safeguard Your Digital Privacy
As digital privacy concerns grow, taking steps to declutter your online footprint can help protect your sensitive information. Whether you’re worried about expanding government surveillance or simply want to clean up old data, there are practical ways to safeguard…
Global Cybercrime Epidemic: Pig-Butchering Scams Exploit Vulnerable Victims and Flourish Amidst Enforcement Gaps
The phenomenon of “pig-butchering” scams has emerged as a significant cybercrime, exploiting vulnerabilities intensified by the Covid-19 pandemic. These schemes involve creating fraudulent investment platforms and manipulating victims emotionally, often targeting them through social media. Shockingly, these operations are…
WhatsApp Emerges as the Most Exploited Platform in Cyber Frauds
WhatsApp, Instagram, and Telegram have once again become the favorite tools for hackers, as per a report released by India’s Home Ministry (MHA). According to the report, WhatsApp is still the most commonly utilized medium for cybercrime. Several examples…
Watch Out: Fake Game Invites on Discord Are Stealing Your Personal Data
There is a new online scam, where cyber criminals trick people into downloading harmful software under the pretext of beta testing a game. This campaign targets people on platforms such as Discord, email, and even text messages, aiming at…
FBI Warns Against Public USB Charging Stations Due to “Juice Jacking” Threat
< p style=”text-align: justify;”>The FBI has issued a cautionary alert for travelers, urging them to avoid using public USB charging stations found in airports, hotels, and other public spaces. A rising cyber threat, known as “juice jacking,” enables cybercriminals to…
Cyberattack on Cyberhaven Chrome Extension Exposes Sensitive Data
< p style=”text-align: justify;”>On Christmas Eve, Cyberhaven, a data loss prevention company, experienced a cyberattack targeting its Google Chrome extension. The breach exposed sensitive customer data, including passwords and session tokens. The company has since taken swift measures to…
SysBumps: A Groundbreaking KASLR Break Attack Targeting Apple Silicon macOS Devices
< p style=”text-align: justify;”>In a significant revelation, researchers from Korea University have uncovered “SysBumps,” the first successful Kernel Address Space Layout Randomization (KASLR) break attack targeting macOS devices powered by Apple Silicon processors. Presented at CCS ’24, the study exposes…
Tech Ventures: Israel Advances in Crypto Ecosystem
Israel, often known as the “Startup Nation,” has emerged as a global leader in cybersecurity, defense, and internet technologies. Cryptocurrency has easily integrated into the high-tech ecosystem, transforming the digital asset class and blockchain technology into key drivers of the…
OpenAI’s O3 Achieves Breakthrough in Artificial General Intelligence
In recent times, the rapid development of artificial intelligence took a significant turn when OpenAI introduced its O3 model, a system demonstrating human-level performance on tests designed to measure “general intelligence.” This achievement has reignited discussions on artificial…
Are Passkeys the Future of Authentication? Current Hurdles Say Otherwise
< p style=”text-align: justify;”>For years, cybersecurity experts have criticized passwords as outdated and insecure. Frequently re-used, susceptible to phishing, and vulnerable to leaks, they remain one of the weakest links in online security. Passkeys have been hailed as the solution…
Milwaukee Residents Warned of Parking Ticket Scam
A fraudulent text message claiming to notify residents about an overdue City of Milwaukee parking penalty has been flagged as a scam and should be deleted, city authorities announced earlier this week. According to Ald. Lamont Westmoreland, the scam…
No More Internet Cookies? Digital Targeted Ads to Find New Ways
Google Chrome to block cookies The digital advertising world is changing rapidly due to privacy concerns and regulatory needs, and the shift is affecting how advertisers target customers. Starting in 2025, Google to stop using third-party cookies in the world’s most…
3 Critical Apache Flaws Discovered: Users Should Update to Avoid Major Risks
Experts find critical flaws The Cyber Security Agency of Singapore has issued warning against three critical flaws in Apache software products. The Apache Software Foundation has released security patches to address these vulnerabilities, which can cause risk to users and…
Volkswagen Cybersecurity Breach Exposes Sensitive Vehicle Data
< p style=”text-align: justify;”>A recent cybersecurity lapse within Volkswagen’s Cariad unit, which manages the company’s cloud systems, exposed sensitive data from hundreds of thousands of vehicles. The breach, attributed to a misconfiguration in a cloud environment hosted on Amazon…
Dutch Authority Flags Concerns Over AI Standardization Delays
As the Dutch privacy watchdog DPA announced on Wednesday, it was concerned that software developers developing artificial intelligence (AI) might use personal data. To get more information about this, DPA sent a letter to Microsoft-backed OpenAI. The Dutch Data…
Third-Party Data Breaches Expose Cybersecurity Risks in EU’s Largest Firms
< p style=”text-align: justify;”>A recent report by SecurityScorecard has shed light on the widespread issue of third-party data breaches among the European Union’s top companies. The study, which evaluated the cybersecurity health of the region’s 100 largest firms, revealed that…
Rising GPS Interference Threatens Global Aviation and Border Security
< p style=”text-align: justify;”>A recent report by OPS Group, a global aviation safety network, has highlighted a sharp rise in GPS interference across several global conflict zones, including India’s borders with Pakistan and Myanmar. This interference poses significant risks…
Android Smartphones Revolutionize Ionosphere Mapping
< p style=”text-align: justify;”>Mapping the ionosphere is essential for improving the precision of navigation systems, yet traditional methods face significant limitations. Ground-based GNSS stations, while providing detailed maps of ionospheric total electron content (TEC), suffer from poor spatial coverage,…
2024 CrowdStrike Outage Reveals Critical IT Vulnerabilities
< p style=”text-align: justify;”>The CrowdStrike outage in July 2024 exposed significant weaknesses in global IT supply chains, raising concerns about their resilience and dependence on major providers. The disruption caused widespread impact across critical sectors, including healthcare, transportation, banking,…
Hackers Use Russian Domains for Phishing Attacks
The latest research has found a sharp rise in suspicious email activities and a change in attack tactics. If you are someone who communicates via email regularly, keep a lookout for malicious or unusual activities, it might be a scam.…
AT&T Confirms Cyberattack Amid Salt Typhoon Hacking Incident
AT&T has confirmed being targeted in the Salt Typhoon hacking attack, a cyber operation suspected to involve China. Despite the attack, the telecommunications giant assured customers that its networks remain secure. In a statement, AT&T revealed that hackers aimed…
RBI Report Highlights Rising Fraud Incidents and Financial Impact
The Reserve Bank of India (RBI) has revealed a significant rise in bank fraud cases during the first half of the current fiscal year. According to the Report on Trend and Progress of Banking in India 2023-24, fraud cases…
Transforming Cybersecurity Protocols for US Healthcare Systems
In a proposal posted on Friday in the Federal Register, the Office for Civil Rights of the US Department of Health and Human Services (HHS) outlined several new requirements that could improve the cybersecurity practices of healthcare organizations. The…
Palo Alto Networks Alerts on Exploit Causing Firewall Vulnerabilities
Palo Alto Networks has issued a warning about the active exploitation of the CVE-2024-3393 denial of service (DoS) vulnerability, which attackers are using to compromise firewall defenses by triggering device reboots. Repeated exploitation of this vulnerability forces the firewall…
Understanding Ransomware: A Persistent Cyber Threat
Ransomware is a type of malicious software designed to block access to files until a ransom is paid. Over the past 35 years, it has evolved from simple attacks into a global billion-dollar industry. In 2023 alone, ransomware victims…
General Dynamics Confirms Data Breach Via Phishing Campaign
< p style=”text-align: justify;”>In October 2024, General Dynamics (GD), a prominent name in aerospace and defense, confirmed a data breach impacting employee benefits accounts. The breach, detected on October 10, affected 37 individuals, including two residents of Maine. Attackers…
EU Officially Announce USB-C as Global Charging Standard
< p style=”text-align: justify;”>For tech enthusiasts and environmentalists in the European Union (EU), December 28, 2024, marked a major turning point as USB-C officially became the required standard for electronic gadgets. The new policy mandates that phones, tablets, cameras,…
Hackers Breach Cyberhaven’s Chrome Extension in Supply-Chain Attack, Exfiltrating Sensitive Data
Hackers compromised Cyberhaven’s Chrome extension in a suspected supply-chain attack, publishing a malicious update capable of stealing customer passwords and session tokens. The attack raised serious concerns about the security of widely-used browser extensions. Cyberhaven, a data-loss prevention startup, confirmed…
American Addiction Centers Cyberattack Exposes Sensitive Data of 422,424 Individuals
< p style=”text-align: justify;”>In September 2024, American Addiction Centers (AAC) experienced a significant cyberattack that exposed the personal and health-related information of 422,424 individuals. The breach involved sensitive data such as Social Security numbers and health insurance details, prompting…
North Korean Hackers Set New Record with $1.8 Billion Crypto Heist
Hackers associated with North Korea have taken cyber theft to a record-breaking level in 2024, stealing $1.8 billion in cryptocurrency. According to a detailed report by blockchain analytics firm Chainalysis, this highlights the growing sophistication of these attackers and…
Critical Security Issue Hits Four-Faith Routers
< p style=”text-align: justify;”>According to VulnCheck, a critical vulnerability identified as CVE-2024-12856 has been discovered in Four-Faith industrial routers, specifically affecting the F3x24 and F3x36 models, as well as users’ machines. Evidence suggests active exploitation of this vulnerability in…
Cybercriminals Leverage LLMs to Generate 10,000 Malicious Code Variants
< p style=”text-align: justify;”>Cybersecurity researchers are raising alarms over the misuse of large language models (LLMs) by cybercriminals to create new variants of malicious JavaScript at scale. A report from Palo Alto Networks Unit 42 highlights how LLMs, while not…
New Two-Step Phishing Attack Exploits Microsoft Visio and SharePoint
A novel two-step phishing strategy is targeting Microsoft Visio files (.vsdx) and SharePoint, signaling a new trend in cyber deception, according to experts. Researchers at Perception Point have noted a significant rise in attacks leveraging these previously uncommon .vsdx…
Cybercriminals Exploit Identity Verification Systems
Cybercriminals on the dark web have developed new ways to exploit identity verification systems. Rather than hacking or stealing personal information, they are purchasing it directly from individuals, as revealed by security researchers at iProov. This approach allows them…
Sanctions Imposed on North Korean Cyber Activities Supporting Nuclear Ambitions
South Korea has announced sanctions against 15 North Korean nationals and the Chosun Geumjeong Economic Information Technology Exchange Corporation for orchestrating schemes that finance North Korea’s nuclear weapons and missile programs. These measures target a global network involved in…
rth Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign
The North Korean hackers behind the ongoing Contagious Interview campaign have been observed launching a new JavaScript malware named OtterCookie. The campaign includes social engineering techniques, with the hacker team frequently posing as recruiters to trick job seekers into…
Cyberattack Compromises European Space Agency Online Store Security
A malware attack on the European Space Agency’s official web shop revealed that the application was hacked by loading a JavaScript script that generated a fake Stripe payment page at checkout. With an annual budget of more than 10…
Protect Yourself from Zelle Scams: Prevention Tips and Recovery Steps
Zelle has become a popular choice for online money transfers due to its simplicity, zero fees, and support from over 1,700 banks. However, since its launch in June 2017, the peer-to-peer payment service has been plagued by fraud. On…
Rising Cyber Threats in Q3 2024: AI’s Dual Role in Attacks and Defense
The Q3 2024 Threat Report from Gen unveils a concerning rise in the sophistication of cyber threats, shedding light on how artificial intelligence (AI) is both a tool for attackers and defenders. As cybercriminals evolve their tactics, the line…
Understanding VoIP DDoS Attacks: Prevention and Mitigation Strategies
A distributed denial-of-service (DDoS) attack targets a VoIP server by overwhelming it with phony user requests. This excessive traffic can exceed the network’s capacity, causing service disruptions and making genuine user requests unprocessable. Online criminals exploit these attacks to…
Critical Infrastructure Faces Rising Ransomware Risks
In October 2024, Interlock claimed to have attacked several organizations, including Wayne County, Michigan, which is known for its cyberattacks. Ransomware is characterized by the fact that the encrypted data is encrypted by an encryptor specifically designed for the…
Builder.ai Data Breach Exposes Sensitive Information of Over 3 Million Users
A huge data security breach has come to light, with the data platform Builder.ai. It’s a service that lets organizations build their own proprietary, custom software applications, which don’t need heavy programming. According to a blog post by a…
Bitcoin Heist in Japan Attributed to North Korean Cybercriminals
A joint alert from the FBI, the Department of Defense (D.O.D.) Cyber Crime Center and the National Police Agency of Japan reveal that a North Korean threat group carried out a significant cryptocurrency theft from Japan’s crypto firm DMM…
CISA’s Enhanced Mobile Security Recommendations Following U.S. Telecom Breach
The Cybersecurity and Infrastructure Security Agency (CISA) issued updated recommendations in December 2024 aimed at enhancing mobile phone cybersecurity. Following a significant hack involving major U.S. telecom companies like AT&T, Verizon, and Lumen Technologies, these guidelines focus on adopting…
Here’s How Google Willow Chip Will Impact Startup Innovation in 2025
As technology advances at an unprecedented rate, the recent unveiling of Willow, Google’s quantum computing device, ushers in a new age for startups. Willow’s unprecedented computing capabilities—105 qubits, roughly double those of its predecessor, Sycamore—allow it to accomplish jobs…
Tech’s Move Toward Simplified Data Handling
The ethos of the tech industry for a long time has always been that there is no shortage of data, and that is a good thing. Recent patents from IBM and Intel demonstrate that the concept of data minimization…
New Finds from The June Ascension Hack
Healthcare industry giant Ascension has broken the silence and revealed more sensitive information concerning the recent hack in June. Through a worker opening a suspicious file without even knowing the malware was actually very harmful to download, it gave room…
75% of Ransomware Attacks Target Healthcare on Holidays: Expert Insights
Approximately 75% of ransomware attacks on the healthcare sector over the past year occurred during weekends or holidays, highlighting the urgency for organizations to strengthen their staffing and security measures during these high-risk periods. Jeff Wichman, director of incident…
AI Impersonations: Revealing the New Frontier of Scamming
In the age of rapidly evolving artificial intelligence (AI), a new breed of frauds has emerged, posing enormous risks to companies and their clients. AI-powered impersonations, capable of generating highly realistic voice and visual content, have become a major…
Integrating Human Expertise and Technology for Robust Cybersecurity
< p style=”text-align: justify;”> In today’s complex digital landscape, the role of human expertise in cybersecurity remains indispensable. Two pivotal approaches — human-led security testing and human-centric cybersecurity (HCC) — have gained prominence, each contributing distinct strengths. However, these…
Trio of SQL Injection Vulnerabilities Found in Amazon Redshift Drivers: Update Now
Three severe SQL injection vulnerabilities have been identified in specific Amazon Redshift drivers, posing a significant risk of privilege escalation and data compromise. The vulnerabilities, labeled as CVE-2024-12744, CVE-2024-12745, and CVE-2024-12746, each hold a CVSS severity score of 8.0, emphasizing…
Understanding and Preventing Botnet Attacks: A Comprehensive Guide
Botnet attacks exploit a command-and-control model, enabling hackers to control infected devices, often referred to as “zombie bots,” remotely. The strength of such an attack depends on the number of devices compromised by the hacker’s malware, making botnets a…
Protect Yourself from AI Scams and Deepfake Fraud
In today’s tech-driven world, scams have become increasingly sophisticated, fueled by advancements in artificial intelligence (AI) and deepfake technology. Falling victim to these scams can result in severe financial, social, and emotional consequences. Over the past year alone, cybercrime…
Fortinet Researchers Discover Two Malicious Python Packages
A new research published earlier this week by Fortinet Inc.’s FortiGuard Labs warns of two newly found malicious Python packages that indicate a major threat of credential theft, data exfiltration, and unauthorised system access. The first flaw, Zebo-0.1.0, was…
How to Protect Yourself from Email Scams: FBI’s Top Tips for Staying Safe
While phishing scams are on the rise over the holiday period, the FBI has reminded Gmail, Outlook, Apple Mail, and other services users to be more alert. More phishing schemes are becoming common as criminals use the festive season…
Big Tech’s Interest in LLM Could Be Overkill
AI models are like babies: continuous growth spurts make them more fussy and needy. As the AI race heats up, frontrunners such as OpenAI, Google, and Microsoft are throwing billions at massive foundational AI models comprising hundreds of billions…
Thousands of Users Exposed by Flawed Camera Streaming App
A Cybernews research team discovered a huge exposed data server on June 25th. The server contained 3GB of personal information and telemetry from iPhones equipped with an app known as “Home V.” According to the log samples, the data…
Bengaluru Techie Loses ₹11.8 Crore in “Digital Arrest” Scam Over 18 Days
A Bengaluru software engineer recently fell victim to a complex cyber scam, losing ₹11.8 crore in just 18 days. The incident highlights the growing sophistication of cybercrimes in India, particularly in tech hubs like Bengaluru. The victim, whose identity…
Clop Ransomware Gang Threatens 66 Companies with Data Leak After Cleo Breach
The Clop ransomware gang has intensified its extortion tactics following a data theft attack targeting Cleo software. On its dark web portal, the group revealed that 66 companies have been given 48 hours to meet their ransom demands. According…
Look Who’s Back: LockBit Gears Up for a Comeback With Version 4.0
The infamous LockBit ransomware group has announced its return with the upcoming release of LockBit 4.0, set for February 2025. This marks a big moment for the group, which has had major setbacks over the last year. A global…
New Alert: Windows and Mac Are the Target of a Self-Deleting Ransomware
The ransomware epidemic may have been stopped by recent law enforcement operations that disrupted attack infrastructure, led to the arrest of cybercriminals, and broke up some threat groups, but this would be wrong as well. A recent study on…
Global Crypto Hacks Escalate to $2.2 Billion in 2024
Chainalysis, a blockchain analytics company that provides data analysis on the blockchain ecosystem, has reported that the volume of compromised crypto funds and the number of hacking incidents are set to rise in 2024. The report states that the…
Free VPN Big Mama Raises Security Concerns Amid Cybercrime Links
Big Mama VPN, a free virtual private network app, is drawing scrutiny for its involvement in both legitimate and questionable online activities. The app, popular among Android users with over a million downloads, provides a free VPN service while…
Understanding TPM: The Key Security Feature Powering Windows 11 Compatibility
When Microsoft launched Windows 11 in 2021, it introduced a strict hardware compatibility requirement, including the necessity for a Trusted Platform Module (TPM) that adheres to the TPM 2.0 standard. A TPM is a secure cryptoprocessor designed to manage…
Hackers are Employing Amazon Appstore to Propagate Malware
‘BMI CalculationVsn’ is a malicious Android spyware app that was identified on the Amazon Appstore. It poses as a simple health tool while covertly harvesting data from compromised devices. Cybersecurity researchers from McAfee Labs discovered the app and notified…
Proton Docs vs Google Docs in the Productivity Space
< p style=”text-align: justify;”>For those who are concerned about privacy, Proton has announced an end-to-end encrypted document editor intended to be a viable alternative to Microsoft Word and Google Docs. This application, released on Wednesday by the Swiss software…
Executives Targeted by Advanced Mobile Phishing Attacks
< p style=”text-align: justify;”>Mobile phishing attacks have continued to advance, targeting corporate executives. A report from mobile security firm Zimperium describes these attacks as highly sophisticated means of exploiting mobile devices. Thus, there is an emerging need for awareness…
Ledger Phishing Scam Targets Cryptocurrency Wallets
A sophisticated phishing email campaign has emerged, targeting cryptocurrency users by impersonating Ledger, a prominent hardware wallet provider. These fraudulent emails claim that the recipient’s Ledger wallet seed phrase — also known as a recovery or mnemonic seed —…
The Future of Artificial Intelligence: Progress and Challenges
Artificial intelligence (AI) is rapidly transforming the world, and by 2025, its growth is set to reach new heights. While the advancements in AI promise to reshape industries and improve daily lives, they also bring a series of challenges that…
Juniper Networks Warns of Mirai Malware Threat to Routers with Default Passwords
Juniper Networks has issued a warning about a vulnerability in its Session Smart Routers, emphasizing the risk of Mirai malware infection if factory-set passwords are not changed. Starting December 11, the company began receiving reports from customers about “suspicious…
Ledger Users Targeted by Sophisticated Phishing Attacks
< p style=”text-align: justify;”> Ledger users are once again in the crosshairs of phishing attacks as hackers employ increasingly advanced tactics to steal crypto assets. The latest campaigns involve fake emails crafted to deceive users into revealing their secret…
Here’s How to Safeguard Your Data From Data Brokers
Privacy concerns have grown as more of our private data is being gathered online. We share intimate details with just a few clicks. The majority of people, however, are ignorant of how extensively their data is shared. Behind the…
Massive Credit Card Breach Puts Millions at Risk
< p style=”text-align: justify;”> A significant credit card breach has been uncovered, threatening to disrupt holiday shopping for millions of Americans. The breach stems from an Amazon Web Services (AWS) S3 bucket left unsecured online, which contained sensitive customer data,…
Cybersecurity Essentials : Key to Success for All Businesses to Navigate Security
The journey of building a business is an exhilarating experience, whether it’s a startup taking its first steps, a small-to-medium business (SMB) scaling new heights, or an enterprise striving for sustained growth. However, regardless of the size or stage,…
Beware of Fake Delivery Text Scams During Holiday Shopping
< p style=”text-align: justify;”> As the holiday shopping season peaks, cybercriminals are taking advantage of the increased online activity through fake delivery text scams. Disguised as urgent notifications from couriers like USPS and FedEx, these scams aim to steal…
Thousands of SonicWall Devices Vulnerable to Critical Security Threats
< p style=”text-align: justify;”> Thousands of SonicWall network security devices are currently exposed to severe vulnerabilities, with over 20,000 running outdated firmware that no longer receives vendor support. This puts countless organizations at risk of unauthorized access and potential…
Phishing Scams Target YouTubers: Malware Hidden in Fake Brand Deals
Cybercriminals are using a complex phishing scam to target the owners of YouTube channels and their teams, thus exposing the accounts and personal information to severe threats. According to cybersecurity experts, a report was released on how the attackers…
AMD Systems Vulnerability Could Threaten Encrypted Data Protection
There has been an announcement of a new technique for bypassing key security protections used in AMD chips to gain access to the clients of those services. Researchers believe that hackers will be able to spy on clients through…
Novel Android NoviSpy Spyware Linked to Qualcomm Zero-Day Flaws
Amnesty International researchers discovered an Android zero-day bug that was exploited to silently disseminate custom surveillance spyware targeting Serbian journalists. The probe has traced the technology to Cellebrite, an Israeli forensics vendor. In a technical report published earlier this…
Hackers Infect Security Researchers with Malware to Steal WordPress Credentials
For the past year, a cyberattack campaign has been targeting security professionals, including red teamers, penetration testers, and researchers, infecting their systems with malware. The malicious software has been used to steal WordPress credentials and sensitive data while also…
Salt Typhoon Hack: A Grave Threat to U.S. Telecommunications
< p style=”text-align: justify;”> The Chinese state-sponsored hacking group Salt Typhoon has been implicated in one of the most severe breaches in U.S. telecommunications history. Sensitive information, including call logs, timestamps, phone numbers, and location data, was compromised across…
FBI Warns of Security Risks in RCS Messaging
< p style=”text-align: justify;”>The FBI has issued a warning to Apple and Android device users regarding potential vulnerabilities in Rich Communication Services (RCS). While RCS was designed to replace traditional SMS with enhanced features, a critical security flaw has…
Rising Tactics of Winnti Hackers Include Deploying Glutton PHP Backdoors
In the past few months, researchers at a Chinese cybersecurity firm have been responsible for the discovery of an advanced PHP backdoor that supports Winnti, a group linked to Chinese cybercrime that is launching increasingly sophisticated attacks. Research has…
CISA Issues Mobile Security Guidelines Amid Cyber Espionage Threats
The US Cybersecurity and Infrastructure Security Agency (CISA) released a comprehensive guide on Wednesday to help individuals in highly targeted positions protect their mobile communications from malicious actors. This move follows a series of sophisticated telecom hacks that impacted…
Colorado Faces Growing Financial Losses from AI-Powered Scams in 2024
Colorado is on track to suffer even greater financial losses from scams by the end of 2024 compared to the nearly $100 million stolen in 2023. According to the Colorado Attorney General’s Office, the rapid integration of artificial intelligence…
Bitcoin Security Concerns Amid Quantum Computing Advancements
Chamath Palihapitiya, CEO of Social Capital, has raised alarms over Bitcoin’s future security, cautioning that its SHA-256 encryption may become vulnerable within the next two to five years. Speaking on the All-In Podcast, he highlighted rapid advancements in quantum…
Ransomware Attacks Expose Gaps in Backup Practices: The Case for Modern Solutions
Ransomware attacks are becoming increasingly sophisticated and widespread, posing significant risks to organizations worldwide. A recent report by Object First highlights critical vulnerabilities in current backup practices and underscores the urgency of adopting modern solutions to safeguard essential data.…
Germany Warns of Pre-Installed Malware on 30,000 Devices
< p style=”text-align: justify;”>Earlier this week, Germany’s cybersecurity office issued a warning about at least 30,000 internet-connected devices across the nation being compromised by pre-installed malware known as BadBox. The Federal Office for Information Security (BSI) announced that it…
Blue Yonder Recovers from Ransomware Attack, Focuses on Resilience
Blue Yonder, a leading provider of supply chain solutions, is making steady progress in recovering from a ransomware attack that disrupted services for several of its clients. On November 21, the company was targeted by a ransomware attack that…
Dubai Police Impersonation Scam: A Sophisticated Cybercrime Targeting UAE Residents
< p style=”text-align: justify;”>Cybercriminals have recently targeted the Dubai Police in an elaborate impersonation scam aimed at defrauding unsuspecting individuals in the UAE. Thousands of phishing text messages, pretending to be from law enforcement, were sent to trick recipients…
AI Models at Risk from TPUXtract Exploit
A team of researchers has demonstrated that it is possible to steal an artificial intelligence (AI) model without actually gaining access to the device that is running the model. The uniqueness of the technique lies in the fact that…
Rhode Island Residents Warned of Cyberattack Targeting State Government
Rhode Island officials have issued an urgent advisory for residents to take immediate precautions following a significant cyberattack on the state government. Authorities are warning that private data, including Social Security and bank account details, may soon be exposed…
Ymir Ransomware: A Rising Threat in the Cybersecurity Landscape
< p style=”text-align: justify;”>The evolving threat landscape continues to present new challenges, with NCC Group’s latest Threat Pulse report uncovering the emergence of Ymir ransomware. This new ransomware strain showcases the growing collaboration among cybercriminals to execute highly sophisticated…
Malware Found Preinstalled on 30,000 Android Devices in Germany
A concerning cybersecurity issue has surfaced in Germany, where investigators uncovered that nearly 30,000 Android devices were sold with preinstalled malware. The malware, dubbed “BadBox,” resides in the device firmware and affects various internet-enabled devices, including digital picture frames…
Google Warns Users About Privacy Risks Posed by Certain Android Apps
It has recently been reported by a leading media outlet that more than 11 million Android devices have been infected with malicious software known as the Necro Trojan, which has crept into phones and tablets through unofficially modified applications,…
Bitcoin Hits $100,000 for the First Time Amid Market Volatility
< p style=”text-align: justify;”> The cryptocurrency market reached a historic milestone this week as Bitcoin closed above $100,000 for the first time in history. This marks a defining moment, reflecting both market optimism and growing investor confidence. Despite reaching…
U.S. Justice Department Shuts Down Rydox Cybercrime Marketplace
< p style=”text-align: justify;”>The U.S. Justice Department announced on Thursday the successful seizure and dismantling of Rydox, a notorious online marketplace for trafficking stolen personal information and cybercrime tools. In a coordinated operation with international law enforcement agencies, three…
OTP Scams Decline in Bengaluru as Sophisticated Cybercrimes Surge in 2024
Bengaluru has witnessed a significant drop in traditional cybercrimes like One-Time Password (OTP) scams and phishing, but more advanced and sophisticated scams, such as digital arrest fraud and stock investment schemes, have been on the rise. Data obtained by…
Massive Data Breach Puts Millions at Risk During Christmas Season
< p style=”text-align: justify;”>As the Christmas season approaches, millions of U.S. citizens could face a potential holiday nightmare after a major data breach exposed 5 million unique credit and debit card details online. The leak threatens to compromise countless…