Category: CySecurity News – Latest Information Security and Hacking Incidents

Subaru Starlink Security Flaw Exposes Risks of Connected Cars

  As vehicles become increasingly connected to the internet, cybersecurity threats pose growing risks to drivers. A recent security flaw in Subaru’s Starlink system highlights the potential dangers, allowing hackers to remotely control vehicles and access sensitive data. This incident…

The Evolution of Data Protection: Moving Beyond Passwords

  < p style=”text-align: justify;”>As new threats emerge and defensive strategies evolve, the landscape of data protection is undergoing significant changes. With February 1 marking Change Your Password Day, it’s a timely reminder of the importance of strong password habits…

Three Ways To Prevent Insider Threat Driven Data Leaks

  The United States is poised to undergo a period of highly disruptive transformation. The incoming administration has promised to make significant changes, including forming a new body, the Department of Governmental Efficiency (DOGE), with the aim of substantially reducing…

Hackers Use IT Support Disguise to Infiltrate Systems

  Cybercriminals in Russia are using a scam to trick their victims into allowing them to install ransomware on their computers by pretending to be technical support via Microsoft Teams. Once they have convinced victims they have an IT problem,…

Cybercriminals Use Google Ads and URL Cloaking to Spread Malware

  Cybercriminals are increasingly using Google ads and sophisticated cloaking techniques to push malware onto unsuspecting users. The latest example involves a fake Homebrew website that tricked users into downloading an infostealer designed to steal sensitive data, including login credentials…

Malware Infections Surge from Fake VPN Downloads

  An attacker is reportedly injecting malware into infected devices using popular VPN applications to gain remote control of the devices they are attacking. Google’s Managed Defense team reported this disturbing finding, which sheds light on how malicious actors use…

IPany VPN Compromised in Supply Chain Attack Deploying Custom Malware

  South Korean VPN provider IPany fell victim to a supply chain attack orchestrated by the China-aligned hacking group “PlushDaemon.” The attackers compromised IPany’s VPN installer, embedding a custom malware named ‘SlowStepper’ into the installer file, affecting customers upon installation.…

Critical Flaws in VPN Protocols Leave Millions Vulnerable

  < p style=”text-align: justify;”> Virtual Private Networks (VPNs) are widely trusted for protecting online privacy, bypassing regional restrictions, and securing sensitive data. However, new research has uncovered serious flaws in some VPN protocols, exposing millions of systems to potential…

Best Tor Browser Substitute for Risk-Free Web Surfing

  Anonymous Browsing: Tools and Extensions for Enhanced Privacy < p style=”text-align: justify;”> Anonymous browsing is designed to conceal your IP address and location, making it appear as though you are in a different region. This feature is particularly useful…

A Closer Look at Torrenting and Its Applications

  Downloading through a peer-to-peer (P2P) network referred to as torrenting involves either using torrent files or magnet links to download files. Torrent files are index files that provide the necessary information to locate certain files, segments of files, or…