Australia has proposed a set of 10 mandatory guardrails aimed at ensuring the safe and responsible use of AI, particularly in high-risk settings. This initiative is a significant step towards balancing innovation with ethical considerations and public safety. The Need…
Category: CySecurity News – Latest Information Security and Hacking Incidents
22,000 PyPI Packages Affected by Revival Hijack Supply-Chain Attack
It has been discovered that hackers can distribute malicious payloads easily and efficiently through the package repository on the PyPI website by using a simple and troublesome exploit. A JFrog security researcher has discovered a new supply chain attack…
Cyber Resilience: Preparing for the Inevitable in a New Era of Cybersecurity
At the TED Conference in Vancouver this year, the Radical Innovators foundation brought together over 60 of the world’s leading CHROs, CIOs, and founders to discuss how emerging technologies like AI and quantum computing can enhance our lives. Despite…
Surge in Ransomware Groups Amid Law Enforcement Disruptions in 2024
New research from Searchlight Cyber reveals a significant rise in ransomware groups, with 73 active groups identified in the first half of 2024, compared to 46 during the same period in 2023. These findings suggest that while law enforcement…
Can VPN Conceal Torrenting? Is it Safe to Torrent With a VPN?
Nowadays, keeping your internet behaviour private can seem impossible, especially if you torrent. This type of file sharing is strongly discouraged by both ISPs, which may throttle your internet connections if you are detected, and government organisations, which are…
Planned Parenthood Cyberattack: How Bad Actors Are Targeting Medical Institutions
The healthcare sector has become an increasingly attractive target for cybercriminals. The latest victim in this alarming trend is Planned Parenthood of Montana, which recently fell prey to a ransomware attack by a group known as RansomHub. This incident not…
OpenStack Ironic Users Advised to Patch Critical Security Vulnerability
OpenStack’s Ironic project, which is used for provisioning bare metal machines, has been identified with a critical security flaw (CVE-2024-44082) that allows authenticated users to exploit unvalidated image data. This vulnerability impacts multiple versions of Ironic and the Ironic-Python-Agent…
Critical Security Flaw Discovered in LiteSpeed Cache Plugin for WordPress
A major security vulnerability has been uncovered in the LiteSpeed Cache plugin, used on over 5 million WordPress websites worldwide. The flaw, identified as CVE-2024-44000, was discovered by Rafie Muhammad, a security researcher at Patchstack. Rated with a CVSS…
Enterprise Resilience in the Face of Cyber Risk
There are now more than $10 trillion in annual cybercrime costs in the world, which speaks volumes about how quickly data breaches, ransomware attacks, and malicious disruption of business and government operations are growing in scale and scope. Cyber…
Irish Data Protection Commission Halts AI Data Practices at X
The Irish Data Protection Commission (DPC) recently took a decisive step against the tech giant X, resulting in the immediate suspension of its use of personal data from European Union (EU) and European Economic Area (EEA) users to train…
Halliburton Hit by Cyberattack, Data Stolen
Halliburton, one of the world’s largest energy companies, has confirmed that it was the victim of a cyberattack. Hackers infiltrated the company’s systems and stole sensitive information. The attack occurred last week, and Halliburton is still determining the extent…
Iran Cyber Attack: Fox Kitten Aids Ransomware Operations in the U.S
A new joint cybersecurity advisory from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) has revealed updated details about the Iran-based cyber threat group known as…
Microchip Technology Confirms Private Data Stolen in Ransomware Attack
Microchip Technology has acknowledged that employee information was stolen from vulnerable systems in an August incident. The Play ransomware group later claimed responsibility. The chipmaker, headquartered in Chandler, Arizona, serves over 123,000 clients across a variety of industries, including…
CISA Launches Major Effort to Secure the 2024 U.S. Elections
The Cybersecurity and Infrastructure Security Agency (CISA) in the United States has initiated a comprehensive campaign to secure the 2024 elections. This effort involves deploying specialized advisory teams across the nation and coordinating security exercises with federal, state, and…
Protecting Your Digital Identity: The Impact of EUCLEAK on FIDO Devices
A new vulnerability has emerged that poses a significant threat to FIDO devices, particularly those using the Infineon SLE78 security microcontroller. Thomas Roche of Ninja Labs discovered the flaw. This vulnerability, dubbed “EUCLEAK,” has raised concerns among security experts and…
WazirX Hacker Starts Moving Stolen Ether Anonymously Using Tornado Cash
As a result of an attack by an unknown entity, some of the $234 million allegedly stolen from the WazirX exchange in one of India’s worst crypto hacks has already been laundered. This action occurred on the same day…
Sophos X-Ops Uncovers Major Qilin Ransomware Breach Targeting Chrome Browser Credentials
Cybersecurity firm Sophos X-Ops has exposed a significant ransomware breach by the Qilin group, which has introduced a new and highly concerning technique of stealing credentials stored in Google Chrome browsers on compromised systems. Qilin, active since at least…
Transport for London Faces Ongoing Cyber Security Incident, Works to Safeguard Systems and Data
Transport for London (TfL), which oversees much of the public transport network in England’s capital, is dealing with an ongoing “cyber security incident.” The organization confirmed the situation yesterday, stating: “We are currently dealing with an ongoing cyber security…
IT Manager Faces Charges for Locking Computers to Demand Money
A recent case has highlighted that ransomware threats can sometimes come from within an organisation. Daniel Rhyne, a 57-year-old IT administrator from Kansas City, Missouri, has been accused of holding his own company hostage by locking down their systems…
CISO Role Expands as Cybersecurity Becomes Integral to Business Strategy
Over the past decade, the role of Chief Information Security Officers (CISOs) has expanded significantly, reflecting cybersecurity’s growing importance in corporate governance and risk management. Once primarily responsible for managing firewalls and protecting data, CISOs now play a critical role…