Australia is striving to become a more energy-efficient nation. The Australian Renewable Energy Agency recently announced a $100 million effort to research and develop solar energy technologies. Further investments in energy storage, pumped hydro, and low-carbon systems may be…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Lessons from the CrowdStrike Falcon Sensor Defect: Enhancing Ransomware Recovery and Business Continuity
In recent times, a significant IT disruption was caused by a defect in a content update for CrowdStrike’s Falcon sensor, affecting approximately 8.5 million PCs across diverse sectors. This issue, which disrupted organizations ranging from small businesses and global…
Everest Gang Poses New Cybersecurity Threat to US Healthcare
According to the Health Sector Cybersecurity Coordination Center, the Everest Ransomware group is a threat profile of the recent ransomware attack that took place at Gramercy Surgery Center in New York. The Everest Ransomware group is behind the recent…
QR Code Phishing: How Cybercriminals Exploit Trust via Quishing
Today, QR codes have become a familiar sight. And why not, it makes our daily tasks easy. From making payments to accessing websites, these square patterns of black and white squares offer convenience and efficiency. However, cybercriminals have found a…
North Korea Exploited Windows Zero-Day Vulnerability to Install Fudmodule
North Korea’s Lazarus hacking group has once again exploited a zero-day vulnerability in Microsoft Windows to deploy malware on targeted devices. On August 13, Microsoft addressed this issue with its monthly Patch Tuesday updates, fixing a flaw in the…
Worried About Cash App Breach? These Three Steps Can Keep Your Financial Data Safe
You’re not alone if the most recent Cash App data hack made you nervous. In 2022, the parent company of Block, the peer-to-peer payment platform, failed to prevent unauthorised access to Cash App customer accounts. Cash App agreed to…
16 Years of Cybercrime: The Story of Greasy Opal’s CAPTCHA Solver
Certain tools and techniques have been persistent, continually adapting to new challenges and threats. One such tool is the CAPTCHA solver developed by Greasy Opal, a name that has become synonymous with cybercrime over the past 16 years. This blog…
New Styx Stealer Malware Targets Browsers and Instant Messaging for Data Theft
A new malware strain known as Styx Stealer has recently emerged, posing a significant threat to online security. Discovered in April 2024, Styx Stealer primarily targets popular browsers based on the Chromium and Gecko engines, such as Chrome and…
Misconfigured Access Controls in NetSuite Stores Cause Major Data Breach
Microsoft’s apps for MacOS have been exploited by hackers recently to expose a critical vulnerability. It is believed that hackers have been exploiting vulnerabilities in popular applications, such as Microsoft Outlook and Teams, to spy on Mac users. In…
Cybercriminals Place 85-Year-Old Woman Under ‘Digital Arrest’ in Hyderabad, Cheat Her of ₹5.9 Crore
Cybercriminals recently targeted an 85-year-old woman from the city, subjecting her to what can be described as a ‘digital arrest’ and extorting a staggering ₹5.9 crore from her. This elaborate scam involved convincing the elderly woman that her Aadhaar…
Oil Giant Halliburton Hit by Cyberattack, Certain Systems Affected
On Friday, oil firm Halliburton revealed further details to regulators regarding a recent attack that forced the shutdown of critical systems. The company told news outlets that it was struck by a cyberattack on Wednesday, which disrupted operations at…
Cyble Research Reveals Near-Daily Surge in Supply Chain Attacks
The prevalence of software supply chain attacks is on the rise, posing significant threats due to the extensive impact and severity of such incidents, according to threat intelligence researchers at Cyble. Within a six-month span from February to mid-August,…
Unicoin’s Four-Day Cyberattack: Disruption, Recovery, and Ongoing Investigation
Unicoin, a leading cryptocurrency company, experienced a cyberattack beginning on August 9, 2024, which severely disrupted its operations for nearly four days. The breach occurred when a hacker gained unauthorised access to the company’s Google G-Suite account, affecting all…
Massive Data Breach Worsens as New Details Emerge Across US, UK, and Canada
Several days ago, the company whose data breach could have potentially exposed all Americans’ Social Security numbers to identity thieves confirmed that they were victims of a data breach, stressing that they obtained even more sensitive data than previously…
Protecting Your Wallet: Understanding NGate Android Malware
A new and sophisticated malware has emerged, targeting the increasingly popular Near Field Communication (NFC) payment systems. Known as NGate, this Android malware has been discovered by ESET Research and poses a significant risk to users’ financial security. This blog…
Iranian Threat Actor TA453 Targets Jewish Figure with Fake Podcast Invite in Malicious Campaign
A recent cyber campaign by the Iranian threat actor TA453 has drawn significant attention following their targeting of a prominent Jewish religious figure with a fake podcast interview invitation. The campaign, which began in July 2024, involved a series…
Florida Medical Lab Data Breach Exposes 300,000 Individuals’ Sensitive Information
Florida-based medical laboratory, American Clinical Solutions (ACS), recently experienced a significant data breach that exposed the sensitive information of approximately 300,000 individuals. The hacking incident, attributed to the criminal group RansomHub, resulted in the theft of 700 gigabytes of…
AI Revolutionizing Accounting: Experts Urge Accountants to Embrace Technology for Future Success
Artificial Intelligence (AI) is capable of handling repetitive tasks, but accountants who embrace and integrate technology can concentrate on more valuable activities beyond basic number-crunching, according to Md Sajid Khan, Director – India at the Association of Certified…
Google Assures Privacy with Gemini AI: No Data Sharing with Third Parties
Google recently announced bringing into view its Gemini AI technology, beginning with the latest Pixel 9 devices. As part of this consequential development, Google has reassured users about the strong privacy and security measures surrounding their personal data, addressing growing…
Ransomware Actors Extorted More Than $450 Million in First Half of 2024
In the first half of 2024, victims of ransomware have paid $459,800,000 to attackers; if ransom payments continue at this pace, this year might establish a new record. Ransomware payments hit a historic high of $1.1 billion last year,…