A recent report highlights the alarming rise of China-linked human trafficking and scamming networks, now using AI tools to enhance their operations. Initially concentrated in Southeast Asia, these operations trafficked over 200,000 people into compounds in Myanmar, Cambodia, and…
Category: CySecurity News – Latest Information Security and Hacking Incidents
AI-Powered Hack Poses Threat to Billions of Gmail Accounts
Currently, there is a cyberattack powered by artificial intelligence that targets Gmail’s huge network of 2.5 billion users, which is currently making waves. As a way of tricking people into sharing sensitive information, hackers use advanced techniques, including realistic…
Here’s How to Stop Smart TV From Harvesting Your Personal Data
Watching television seems to be a benign pastime, but as all TVs become “smart” and link to the internet via your network, they will be able to track you as well. When you turn on a smart TV from…
Sevco Report Exposes Privacy Risks in iOS and macOS Due to Mirroring Bug
A new cybersecurity report from Sevco has uncovered a critical vulnerability in macOS 15.0 Sequoia and iOS 18, which exposes personal data through iPhone apps when devices are mirrored onto work computers. The issue arose when Sevco researchers detected…
New Coalition to Take Down Online Scams, Led by Google
As cybercrime continues to cost the world economy billions annually, a robust new coalition launched by Google, the DNS Research Federation, and the Global Anti-Scam Alliance (GASA) is working to disrupt online scammers at a global level. By all…
New Trinity Ransomware Strain Targets U.S. Healthcare, Federal Officials Warn
A new ransomware strain, known as Trinity, has reportedly compromised at least one healthcare organization in the U.S., according to a recent report from federal authorities. The U.S. Department of Health and Human Services (HHS) issued a warning on…
Chinese Quantum Computer Breaks Advanced Military Encryption
According to Chinese scientists at Shanghai University, a quantum computer from the Canadian company D-Wave has been demonstrated to be capable of breaking a popular encryption scheme that has been used for many years. A new study shows that…
Fidelity Investments Data Breach Affects 77,099 Customers
Fidelity Investments recently disclosed a data breach that impacted 77,099 customers, with details made public in an October 9 filing with the Maine Attorney General’s Office. The breach occurred on August 17, 2024, and was discovered two days later…
AI Deepfakes Pose New Threats to Cryptocurrency KYC Compliance
ProKYC is a recently revealed artificial intelligence (AI)-powered deep fake tool that nefarious actors can use to circumvent high-level Know Your Customer (KYC) protocols on cryptocurrency exchanges, presenting as a very sophisticated method to circumvent high-level KYC protocols. A…
Apple’s Latest iPhone Update: Bad News for Millions of Google Users
If the latest reports are correct, Apple consumers have just over a fortnight to wait until the launch of iOS 18.1 and the belated arrival of Apple Intelligence, the flagship feature in the latest iOS release. Until then the…
How F5 BIG-IP Cookies Are Being Exploited for Network Snooping: A CISA Warning
US Government’s Cybersecurity and Infrastructure Security Agency released a warning regarding cyberattackers use of unencrypted cookies managed by the F5 BIG-IP Local Traffic Manager, by which they gather information about private networks. In this manner, these attackers identify the…
OpenAI’s Disruption of Foreign Influence Campaigns Using AI
Over the past year, OpenAI has successfully disrupted over 20 operations by foreign actors attempting to misuse its AI technologies, such as ChatGPT, to influence global political sentiments and interfere with elections, including in the U.S. These actors utilized…
Biometric Data Theft and Cyberterrorism Are The Major Future Threats
Cyberterrorism, biometric data poisoning, and metaverse crimes are the most serious digital threats that humans are expected to face in the future, a senior Dubai official said. Major Tarek Belhoul, head of Dubai Police’s virtual assets crime branch, stated,…
Blockchain Innovation Drives Payroll and Employee Data Security in HR
In HR, blockchain technology is still in its infancy when it comes to gaining acceptance among the people. Despite this, it stands to be a great boon for the future of work as well. The APQC report indicates that…
AsyncRAT Malware Exploits Bitbucket to Launch Multi-Stage Attack
G DATA Security Lab has discovered a sophisticated malware operation that used Bitbucket, a popular code hosting platform, to propagate AsyncRAT, a well-known remote access trojan. According to the study, the attackers employed a multi-stage assault strategy, exploiting Bitbucket…
Awaken Likho Targets Russian Agencies with MeshCentral Remote Access Tool
Awaken Likho, also referred to as Core Werewolf or PseudoGamaredon, is a cyber threat group targeting Russian government agencies and industrial entities. Since June 2024, a new campaign has been observed, where attackers have shifted from using UltraVNC to…
Millions of Android Devices at Risk, New Chip Bug Exploited in Targeted Attacks
Overview of the Exploit Hackers recently leveraged a serious security weakness, said to be a “zero-day,” that exists within the Qualcomm chipsets used in many popular Android devices. Qualcomm confirmed that at the time they were first exploited by…
The Role of End-to-End Encryption in Modern Cybersecurity
It is a type of messaging that is protected from everyone, including the messaging service itself, because of end-to-end encryption (E2EE). Using E2EE, a message cannot be decrypted until the sender and the recipient can see it in the…
Casio Hit by Cyberattack Causing Service Disruption Amid Financial Challenges
Japanese tech giant Casio recently experienced a cyberattack on October 5, when an unauthorized individual accessed its internal networks, leading to disruptions in some of its services. The breach was confirmed by Casio Computer, the parent company behind the…
New Yunit Infostealer Bypasses Windows Defender and Steals Sensitive Data
A new information-stealing malware has been discovered that is capable of exfiltrating a large amount of sensitive information while also disabling antivirus products to create persistence on target endpoints. CYFIRMA cybersecurity researchers have published a detailed investigation of the…