In a recent disclosure, Nidec Corporation, a global leader in precision motors and automotive components, confirmed a significant data breach from a ransomware attack that occurred earlier this year. Hackers, after failing to extort the company, leaked stolen data…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Security Experts Downplay the Significance of the Chinese Quantum “Hack”
Security experts have recommended caution following a series of doom-laden reports in recent days claiming that Chinese researchers have cracked military-grade encryption via quantum computing technology. The reports, which first appeared in the South China Morning Post last week,…
HM Surf Bug in macOS Raises Data Privacy Concerns
Several vulnerabilities in the Safari web browser for macOS may have left users open to being spied on, having their data stolen, and acquiring other types of malware thanks to this security weakness. Specifically, the vulnerability arises from the…
Vietnamese Hackers Target Digital Marketers in Malware Attack
Cyble Research and Intelligence Lab recently unearthed an elaborate, multi-stage malware attack targeting not only job seekers but also digital marketing professionals. The hackers are a Vietnamese threat actor who was utilising different sophisticated attacks on systems by making…
North Korean Hackers Develop Linux Variant of FASTCash Malware Targeting Financial Systems
A new Linux variant of FASTCash malware has surfaced, targeting the payment switch systems of financial institutions. North Korean hackers, linked to the Hidden Cobra group, have expanded their cyber arsenal to now include Ubuntu 22.04 LTS distributions. Previously,…
Microsoft Builds Fictitious Azure Tenants to Lure Phishers to Honeypots
Microsoft employs deceptive tactics against phishing actors, creating realistic-looking honeypot tenants with Azure access and luring attackers in to gather intelligence on them. Tech giant can use the acquired data to map malicious infrastructure, gain a better understanding of…
Cyber Threats by Nation-States Surge Beyond Control
In recent years, state-sponsored hacker groups have increased their attacks on critical infrastructure, causing great concern across the globe. It has become increasingly evident that these coordinated and sophisticated cyber threats and attacks are posing serious risks to the…
Brazil’s Federal Police Arrests ‘USDoD,’ Hacker in FBI Infragard Breach
Brazil’s Polícia Federal arrested USDoD, an infamous hacker linked to the National Public Data and InfraGard breaches, as part of “Operation Data Breach”. USDoD, dubbed EquationCorp, has a long history of high-profile data breaches in which he stole data…
How to Enhance Your Windows Security with Memory Integrity
Windows Security, the antivirus program built into Microsoft’s operating system, is generally sufficient for most users. It provides a decent level of protection against various threats, but a few important features, like Memory Integrity, remain turned off by default.…
The Cybersecurity Burnout Crisis: Why CISOs Are Considering Quitting
Cybersecurity leaders are facing unprecedented stress as they battle evolving threats, AI-driven cyberattacks, and ransomware. A recent BlackFog study reveals that 93% of CISOs considering leaving their roles cite overwhelming job demands and mental health challenges. Burnout is driven…
Microsoft Introduces AI Solution for Erasing Ex from Memories
It reveals the story of a woman who is emotionally disturbed and seeks the help of artificial intelligence as she tries to erase her past in director Vikramaditya Motwane’s new Hindi film, CTRL. There is no doubt that the…
The Extent of Data Surveillance in Modern Smart TVs
Several years ago, smart TVs started to become popular choices in households. They are widely available now and provide a wide range of features and applications that make them an excellent choice. To stay competitive, users will be inclined…
New Cybersecurity Threat for the Middle Eastern Countries: OilRig Malware
Cybersecurity experts say that there is a new threat against Middle East organisations, and more specifically within the United Arab Emirates, and other Gulf countries. There is an Iranian gang cybercrime known as OilRig that aims to hunt login…
Cisco Investigates Data Breach After Hacker Claims Sale of Data
Cisco has acknowledged that it is investigating reports of a data breach after a hacker began offering allegedly stolen firm data for sale on a hacking platform. As per a report in a local media outlet, the investigation was…
Managing LLM Security Risks in Enterprises: Preventing Insider Threats
Large language models (LLMs) are transforming enterprise automation and efficiency but come with significant security risks. These AI models, which lack critical thinking, can be manipulated to disclose sensitive data or even trigger actions within integrated business systems. Jailbreaking…
New TrickMo Variants Exploit Fake Lock Screens to Steal Android PINs
A perilous new variant of the Android banking malware TrickMo has been discovered, capable of mimicking the Android lock screen and stealing users’ PINs. This comes according to the data compiled by the security firm Zimperium, who made a…
Ransomware Attack and Software Glitches Reveal Fragility in U.S. Car Dealerships and Global Systems
A surprising situation unfolded this summer when buying a car in the U.S. became nearly impossible. In June, a ransomware attack targeted CDK Global, a Chicago-based software company with a market value of about $6.4 billion, halting operations at…
Iranian Attackers Exploit Windows Bug to Elevate Privileges
The Iranian state-sponsored hacking outfit APT34, dubbed OilRig, has recently escalated its activity by launching new campaigns against government and vital infrastructure entities in the United Arab Emirates and the Gulf area. OilRig employed a new backdoor to target…
TrickMo Banking Trojan Unveils Advanced Threat Capabilities in Latest Variant
Malware Analyst at Zimperium, Aazim Yaswant, has released an in-depth report on the most recent TrickMo samples, highlighting worrisome new functionalities of this banking trojan. Initially reported by Cleafy in September, this new version of TrickMo employs various techniques to…
Examining Telegram’s Encryption Flaws: Security Risks and Privacy Concerns
Telegram is often perceived as a secure messaging app, but this perception is flawed. Unlike WhatsApp, Telegram doesn’t have end-to-end encryption by default. While Secret Chats offer encryption, users must manually activate this feature, and it doesn’t apply to…