As a result of an attack by an unknown entity, some of the $234 million allegedly stolen from the WazirX exchange in one of India’s worst crypto hacks has already been laundered. This action occurred on the same day…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Sophos X-Ops Uncovers Major Qilin Ransomware Breach Targeting Chrome Browser Credentials
Cybersecurity firm Sophos X-Ops has exposed a significant ransomware breach by the Qilin group, which has introduced a new and highly concerning technique of stealing credentials stored in Google Chrome browsers on compromised systems. Qilin, active since at least…
Transport for London Faces Ongoing Cyber Security Incident, Works to Safeguard Systems and Data
Transport for London (TfL), which oversees much of the public transport network in England’s capital, is dealing with an ongoing “cyber security incident.” The organization confirmed the situation yesterday, stating: “We are currently dealing with an ongoing cyber security…
IT Manager Faces Charges for Locking Computers to Demand Money
A recent case has highlighted that ransomware threats can sometimes come from within an organisation. Daniel Rhyne, a 57-year-old IT administrator from Kansas City, Missouri, has been accused of holding his own company hostage by locking down their systems…
CISO Role Expands as Cybersecurity Becomes Integral to Business Strategy
Over the past decade, the role of Chief Information Security Officers (CISOs) has expanded significantly, reflecting cybersecurity’s growing importance in corporate governance and risk management. Once primarily responsible for managing firewalls and protecting data, CISOs now play a critical role…
MIT Database Lists Hundreds of AI Dangers Impacting Human Lives
Artificial intelligence is present everywhere. If it isn’t powering your online search results, it’s just a click away with your AI-enabled mouse. If it’s not helping you enhance your LinkedIn profile, it’s benefiting you at work. As AIs become…
Citrine Sleet APT Exploits Chrome Zero-Day Vulnerability for Rootkit Infiltration
It is believed that North Korean hackers have been able to use unpatched zero-day in Google Chrome (CVE-2024-7971) to install a rootkit called FudModule after gaining admin privileges by exploiting a kernel vulnerability in Microsoft Windows. An investigation by…
Rise in Ransomware Attacks in Southeast Asia Driven by Rapid Digitalization and Security Gaps
A wave of ransomware attacks across Southeast Asia during the first half of this year marks just the beginning of a larger trend. Companies and government agencies, particularly in countries like Thailand, Japan, South Korea, Singapore, Taiwan, and Indonesia,…
Security Analysts Observe Massive Surge in Telegram App Downloads Following Durov Arrest
The arrest of Telegram creator and CEO Pavel Durov in France is beginning to have an influence on the app’s popularity and position. The founder was arrested last month for allegedly allowing illicit practices to thrive on the social…
Adopting a Connected Mindset: A Strategic Imperative for National Security
In today’s rapidly advancing technological landscape, connectivity goes beyond being just a buzzword—it has become a strategic necessity for both businesses and national defense. As security threats grow more sophisticated, an integrated approach that combines technology, strategic planning, and…
Is Telegram Still a Safe Messaging App? An In-Depth Look
Telegram, a popular messaging app launched in 2013, has earned a reputation for its robust security features. This Dubai-based platform offers end-to-end encryption for video and voice calls and in its optional feature, Secret Chats. This encryption ensures that only…
EU’s Initiative to Define ‘Important Data’ in China: A Step Towards Global Data Governance
The flow of data across borders is often hampered by varying national regulations. One such challenge is China’s restrictive data export laws, which have left many international businesses grappling with compliance. The European Union (EU) is now stepping up efforts…
AI System Optimise Could Help GPs Identify High-Risk Heart Patients
Artificial intelligence (AI) is proving to be a game-changer in healthcare by helping general practitioners (GPs) identify patients who are most at risk of developing conditions that could lead to severe heart problems. Researchers at the University of Leeds…
Automatic Burn-In Technology by Sinon Elevates Windows Deception Hosts
As an open-source, modular tool, Autre enables the automatic burn-in of deception hosts based on Windows system types. By using generative capabilities, this framework intends to reduce the complexity involved in orchestrating deception hosts on a large scale while…
Ransomware Group Brain Cipher Targets French Museums During Olympics
The ransomware group Brain Cipher has claimed responsibility for a cyberattack on several French National Museums that took place during the Olympic Games earlier this month. The attack, which targeted institutions managed by the Réunion des Musées Nationaux –…
Cyberattack on TDSB Exposes Student Data, Sparks Parental Concerns
In June 2024, the Toronto District School Board (TDSB), Canada’s largest school board, suffered a ransomware attack that compromised the personal information of its students. The incident was first disclosed to the public on June 12, when the TDSB…
Top 5 Notable Cyberattacks in Modern Warfare
Warfare is no longer restricted to traditional battlefields; in the digital age, cyberspace has emerged as a new arena of conflict. Nations now engage in cyber battles using lines of code and advanced malware instead of conventional weapons. A…
Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure
Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This malware can steal data and run remote PowerShell commands to further penetrate company networks. A reliable security solution…
U.S. Courts Under Cyberattack and the Impact on Justice
Due to the sophistication of cyber threats, cybercriminals target judicial systems more often, exposing significant vulnerabilities. Numerous attacks disrupt court operations and have broader implications, as they hurt employers who use public records to check their criminal records. Gaining…
Rural Hospitals and Patients Face high Risk from Ransomware Attacks: Report
Ransomware attacks pose a significant threat to hospitals across the United States, but rural hospitals and their patients are particularly vulnerable, according to a new study. The research, led by Hannah Neprash, an associate professor at the University of…