Japanese tech giant Casio recently experienced a cyberattack on October 5, when an unauthorized individual accessed its internal networks, leading to disruptions in some of its services. The breach was confirmed by Casio Computer, the parent company behind the…
Category: CySecurity News – Latest Information Security and Hacking Incidents
New Yunit Infostealer Bypasses Windows Defender and Steals Sensitive Data
A new information-stealing malware has been discovered that is capable of exfiltrating a large amount of sensitive information while also disabling antivirus products to create persistence on target endpoints. CYFIRMA cybersecurity researchers have published a detailed investigation of the…
How to Recover a Hacked Gmail Account Even After a Security Breach
Having your Gmail account hacked can feel like a nightmare, especially when recovery details like phone numbers and email addresses have been changed by a hacker. Fortunately, recovering a compromised account is still possible, even if most security and…
Comcast Data Breach Impacts Thousands, Sensitive Information Compromised
Comcast Cable Communications LLC reports that it is a victim of a data breach compromising personal information of more than 237,000 individuals, including 22 residents of Maine. According to an investigation, the breach is traced back to Financial Business…
Voice Cloning and Deepfake Threats Escalate AI Scams Across India
The rapid advancement of AI technology in the past few years has brought about several benefits for society, but these advances have also led to sophisticated cyber threats. India is experiencing explosive growth in digital adoption, making it one…
American Water Works faces Cyberattack
American Water Works, the country’s largest provider of water services to 14 states, recently reported that it was cyber attacked on its information technology system. The current report has indicated that operational technology systems that control delivery of water within…
Mitigating the Risks of Shadow IT: Safeguarding Information Security in the Age of Technology
In today’s world, technology is integral to the operations of every organization, making the adoption of innovative tools essential for growth and staying competitive. However, with this reliance on technology comes a significant threat—Shadow IT. Shadow IT refers to…
UN Report: Telegram joins the expanding cybercrime markets in Southeast Asia
According to a report issued by the United Nations Office for Drugs and Crime, dated October 7, criminal networks across Southeast Asia are increasingly turning to the messaging platform Telegram for conducting comprehensive illegal activities. It says Telegram, due…
How Southeast Asian Cyber Syndicates Stole Billions
In 2023, cybercrime syndicates in Southeast Asia managed to steal up to $37 billion, according to a report by the United Nations Office on Drugs and Crime (UNODC). Inside the World of Cybercrime Syndicates in Southeast Asia This staggering figure…
Protect Yourself from Phishing Scams Involving Personal Data and Bitcoin Demands
A new phishing scam is emerging, where hackers send threatening emails to people with personal details like images of their homes and addresses. This scam tricks recipients into believing their privacy is compromised, urging them to pay money or…
Chinese Hackers Breach US Telco Networks to Access US Court Wiretap Systems
A Wall Street Journal report claims that Chinese hackers gained access to systems used for court-authorized wiretaps by breaking into the networks of major US telecommunications companies. The breach, which targeted companies such as Verizon Communications, AT&T, and Lumen…
Federal Agencies Move Against North Korea’s Cybercrime Profits
The media have reported that the US government has filed yet another lawsuit to recover nearly $2.69 million worth of stolen digital assets from North Korea’s notorious Lazarus hacking group. It was filed on October 4, 2024, and concerns…
Qantas Employee Data Misuse: Over 800 Bookings Affected by Rogue Staff
Qantas recently experienced a security breach involving employees of India SATS, its ground handler in India. These employees exploited their access to alter customer bookings and divert frequent flyer points into their own accounts. The fraud, which occurred in…
Downside of Tech: Need for Upgraded Security Measures Amid AI-driven Cyberattacks
Technological advancements have brought about an unparalleled transformation in our lives. However, the flip side to this progress is the escalating threat posed by AI-driven cyberattacks. Rising AI Threats Artificial intelligence, once considered a tool for enhancing security measures, has…
Microsoft Urges Millions to Upgrade as Windows Support Ends, Security Risks Increase
Microsoft Windows users are facing increasing security risks as the end of support for older versions of Windows approaches. Recently, Microsoft warned 50 million users of outdated operating systems such as Windows XP, Vista, 7, and 8.1 that they…
Why Trust Drives the Future of Cybersecurity Marketing
With the changing nature of threats in cyberspace becoming sharper by the day, business houses are seen as shy about entrusting their precious data to the cybersecurity firm of choice. Shallow, flashy, and blanket marketing tactics that worked a…
Apple Patches VoiceOver Flaw That Could Read Passwords Aloud
Recently, Apple fixed a serious flaw in its VoiceOver feature that caused privacy concerns for users of iPhones and iPads. The bug, known as CVE-2024-44204, allowed the VoiceOver accessibility tool to read saved passwords aloud, a serious concern for…
Overly Complex Passwords Could Weaken Security Measures
The creation and use of passwords is one of the areas where websites and mobile apps lay down rules for making them as safe as possible. However, a federal agency thinks some of the requirements do more harm than…
Google Begins Testing Verified Checkmarks for Websites in Search Results
Google has started testing a new feature in its search results that adds a blue checkmark next to certain websites, aiming to enhance user security while browsing. As of now, this experiment is limited to a small number of…
Cyberattacks on Critical Infrastructure: A Growing Threat to Global Security
During World War II, the U.S. Army Air Forces launched two attacks on ball bearing factories in Schweinfurt, aiming to disrupt Germany’s ability to produce machinery for war. The belief was that halting production would significantly affect Germany’s capacity…