Advanced hacking toolkit Winos4.0 spreads across the globe, security experts warn. Originally reported by Trend Micro, this new toolkit-just like known kits Cobalt Strike and Sliver-was connected to a string of recent cyber attacks in China, having initially spread…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Windows PCs at Risk as SteelFox Malware Targets Driver Vulnerabilities
Several experts have warned that hackers are using malware to attack Windows systems with the intention of mining cryptocurrency and stealing sensitive information from their devices. The latest Kaspersky Security Report claims to have spotted tens of thousands of…
Game Emulation: Keeping Classic Games Alive Despite Legal Hurdles
For retro gaming fans, playing classic video games from decades past is a dream, but it’s tough to do legally. This is where game emulation comes in — a way to recreate old consoles in software, letting people play vintage…
ZKP Emerged as the “Must-Have” Component of Blockchain Security.
Zero-knowledge proof (ZKP) has emerged as a critical security component in Web3 and blockchain because it ensures data integrity and increases privacy. It accomplishes this by allowing verification without exposing data. ZKP is employed on cryptocurrency exchanges to validate…
How to Protect Your Brand from Malvertising: Insights from the NCSC
Advertising is a key driver of revenue for many online platforms. However, it has also become a lucrative target for cybercriminals who exploit ad networks to distribute malicious software, a practice known as malvertising. The National Cyber Security Centre (NCSC)…
Chinese Botnet Quad7 Targets Global Organizations in Espionage Campaign
Microsoft has unveiled a sweeping cyber threat posed by a sophisticated Chinese botnet, Quad7, targeting organizations worldwide through advanced password spray attacks. Operated by a group identified as Storm-0940, this campaign primarily aims at high-value entities, including think tanks, government…
Google Cloud to Enforce Multi-Factor Authentication for Enhanced Security in 2025
As part of its commitment to protecting users’ privacy, Google has announced that by the end of 2025, all Google Cloud accounts will have to implement multi-factor authentication (MFA), also called two-step verification. Considering the sensitive nature of cloud…
Fake Invoices Spread Through DocuSign’s API in New Scam
Cyber thieves are making use of DocuSign’s Envelopes API to send fake invoices in good faith, complete with names that are giveaways of well-known brands such as Norton and PayPal. Because these messages are sent from a verified domain…
FBI Cautioned Gmail Users Regarding Cookie Theft
The FBI has warned users of popular email providers such as Gmail, Outlook, Yahoo, and AOL regarding a surge in online criminal activity that compromises email accounts, including those secured by multifactor authentication (MFA). Online criminals lure people into…
Cisco Fixes Critical CVE-2024-20418 Vulnerability in Industrial Wireless Access Points
Cisco recently disclosed a critical security vulnerability, tracked as CVE-2024-20418, that affects specific Ultra-Reliable Wireless Backhaul (URWB) access points used in industrial settings. These URWB access points are essential for maintaining robust wireless networks in environments like manufacturing plants,…
How OpenAI’s New AI Agents Are Shaping the Future of Coding
OpenAI is taking the challenge of bringing into existence the very first powerful AI agents designed specifically to revolutionise the future of software development. It became so advanced that it could interpret in plain language instructions and generate complex…
Big Tech’s Data-Driven AI: Transparency, Consent, and Your Privacy
In the evolving world of AI, data transparency and user privacy are gaining significant attention as companies rely on massive amounts of information to fuel their AI models. While Big Tech giants need enormous datasets to train their AI systems,…
Check Point Uncover Pakistan-Linked APT36’s New Malware Targeting Indian Systems
Pakistan’s APT36 threat outfit has been deploying a new and upgraded version of its core ElizaRAT custom implant in what looks to be an increasing number of successful assaults on Indian government agencies, military entities, and diplomatic missions over…
Why Small Businesses Are Major Targets for Cyberattacks and How to Defend Against Them
Recent research by NordPass and NordStellar, backed by NordVPN, has shed light on small private businesses being prime targets for cybercriminals. After analyzing around 2,000 global data breaches over two years, they found that retail and technology sectors, particularly…
Operation Synergia II: A Global Effort to Dismantle Cybercrime Networks
In an unprecedented move, Operation Synergia II has significantly strengthened global cybersecurity efforts. Led by INTERPOL, this extensive operation focused on dismantling malicious networks and thwarting cyber threats across 95 countries. Spanning from April to August 2024, the initiative marks…
UIUC Researchers Expose Security Risks in OpenAI’s Voice-Enabled ChatGPT-4o API, Revealing Potential for Financial Scams
Researchers recently revealed that OpenAI’s ChatGPT-4o voice API could be exploited by cybercriminals for financial scams, showing some success despite moderate limitations. This discovery has raised concerns about the misuse potential of this advanced language model. ChatGPT-4o, OpenAI’s latest…
Columbus Data Breach Affects 500,000 in Recent Cyberattack
In July, a ransomware attack on Columbus, Ohio, compromised the personal information of an estimated 500,000 residents, marking one of the largest cyber incidents to affect a city in the United States in recent years. There has been great…
Digital Arrest: How Even The Educated Become Victims
One of the most alarming trends in recent times is the surge in digital arrest scams, particularly in India. These scams involve cybercriminals impersonating law enforcement officials to extort money from unsuspecting victims. Cybersecurity threats are rapidly escalating in India,…
JPCERT Explains How to Identify Ransomware Attacks from Windows Event Logs
Japan Computer Emergency Response Team (JPCERT/CC) has published guidance on early identification of ransomware attacks in the system using Windows Event Logs. Probably by reviewing these logs, firms would identify some signs or clues of an existing ransomware attack…
UK Watchdog Urges Data Privacy Overhaul as Smart Devices Collect “Excessive” User Data
A new study by consumer group Which? has revealed that popular smart devices are gathering excessive amounts of personal data from users, often beyond what’s required for functionality. The study examined smart TVs, air fryers, speakers, and wearables, rating…