Ivanti, a leading company in network and security solutions, has issued urgent security updates to address a critical vulnerability in its Virtual Traffic Manager (vTM). The flaw, identified as CVE-2024-7593, carries an alarming severity with a CVSS score of…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Ukraine Faces New Phishing Campaign Targeting Government Computers, Warns CERT
The CERT-UA (Computer Emergency Response Team of Ukraine) has issued a warning about a sophisticated phishing campaign targeting Ukrainian government computers. This campaign, which began in July 2024, has already compromised over 100 government systems, posing a significant threat to…
Massive Data Leak Exposes Sensitive Information for Millions
A significant data breach has compromised the personal information of millions of individuals across the United States, United Kingdom, and Canada. The leaked data, obtained from a company called National Public Data, includes highly sensitive information such as names,…
X Confronts EU Legal Action Over Alleged AI Privacy Missteps
X, the artificial intelligence technology company of Elon Musk, has reportedly been accused of unlawfully feeding personal information about its users to its artificial intelligence technology without their consent according to a privacy campaign group based in Vienna. This…
This Security Researcher Infiltrated the LockBit Ransomware Outfit and Exposed its Leader
As part of a larger plan to gather intelligence and stop cybercrime from within, security researchers are actively pursuing and even infiltrating the groups that commit cybercrimes. To win the trust of cybercriminals, they frequently adopt a James Bond…
New Windows Vulnerability CVE-2024-6768 Triggers Blue Screen of Death on All Versions of Windows 10 and 11
A recently uncovered Windows vulnerability, known as CVE-2024-6768, has raised alarm among cybersecurity experts due to its potential to cause widespread disruption by triggering the dreaded blue screen of death (BSOD) on a range of Windows operating systems. Discovered…
Here’s How Users Can Safeguard Themselves From E-Challan Scams
In light of the growing prevalence of e-challan scams, the Indian Computer Emergency Response Team (CERT-In) has released some crucial advice to prevent individuals from becoming victims and suffering financial loss. Nearly 4400 devices have been infected with malware,…
North Miami Mayor’s Gmail Hacked; Ransomware Attack Disrupts City Services
North Miami residents are on edge after Mayor Alix Desulme disclosed that his personal Gmail account was hacked in a ransomware attack. This cyberattack has severely disrupted city operations, leaving many services unavailable online. While City Hall has reopened, residents…
FBI and Allies Dismantle Dispossessor Ransomware Network
The FBI announced on Monday that it has taken down the servers and websites used by the Radar/Dispossessor ransomware group. This action was part of a global investigation involving the U.K.’s National Crime Agency, the Bamberg Public Prosecutor’s Office,…
Microsoft Patches Critical SmartScreen Vulnerability Exploited by Attackers
Microsoft’s SmartScreen feature, a cornerstone of Windows security, faced a significant setback when a critical vulnerability, CVE-2024-38213, was exploited by cybercriminals. This vulnerability allowed attackers to circumvent SmartScreen’s protective mechanisms and deliver malicious code to unsuspecting users. The vulnerability…
When Data Security Fails: The National Public Data Breach Explained
Recent events have highlighted the vulnerabilities that still exist in our digital infrastructure. One such incident is the data breach involving National Public Data (NPD), a background check company. This breach, initially revealed in a class-action lawsuit, has now escalated,…
Comprehensive Hacker Toolkit Uncovered: A Deep Dive into Advanced Cyberattack Tools
Cybersecurity researchers have recently uncovered a vast and sophisticated hacker toolkit that provides a comprehensive suite of tools for executing and maintaining cyberattacks. Found in an open directory in December 2023, the discovery offers a rare glimpse into the…
Hackers Exploit Dark Skippy Attacks to Steal Secret Keys from Secure Devices
An element of the Dark Skippy attack involves the subtle manipulation of nonces during the signature creation process to create the signature. To obtain the private key of a cryptocurrency wallet, attackers craft carefully crafted nonces, thereby gaining full…
CrowdStrike’s Recovery Efforts in Focus After Global IT Outage
On July 19, cybersecurity leader CrowdStrike found itself at the centre of a crisis after a faulty software update caused a widespread IT outage, affecting millions of computers worldwide. The aftermath of this incident was evident at the Black…
Xapo Bank Aims To Boost Bitcoin Safety With Tech And Bunkers
Satoshi Nakamoto, the pseudonymous developer of Bitcoin, published the system’s whitepaper in 2008, bluntly criticising financial institutions and the confidence they demand. However, in 2010, one of the most notable Bitcoin collaborators in its early days and the recipient…
GPS Spoofing Incidents Spike 400%: Here’s What You Should Know
Global Positioning System (GPS) technology has become an integral part of our daily lives, from smartphone navigation apps to precision agriculture and aviation. However, recent incidents have highlighted a growing threat: GPS spoofing. In this blog, we delve into GPS…
Dark Web Revealed: The Hidden Internet’s Role in Cybercrime and Digital Privacy
The dark web, often shrouded in mystery and fear, is portrayed as a breeding ground for illicit activities and cybercrime. While this image is not entirely unfounded, the dark web’s origins and uses are more nuanced, with surprising ties…
Cloud Security Report Highlights Misconfiguration and IAM as Top Threats
Traditional cloud security issues once associated with service providers are declining in significance, as per the Cloud Security Alliance’s 2024 Top Threats report, However, new challenges persist. Misconfigurations, weak identity and access management (IAM), and insecure application programming interfaces (APIs)…
2.7 Billion Data Records Leaked Including Social Security Numbers
There has been news about a prominent hacking group that claimed a large amount of sensitive personal information was allegedly stolen from a major data broker about four months ago, but a member of that group has reportedly released…
Ewon Cosy+ Industrial Devices Vulnerable to Serious Security Exploits
Recently, severe security flaws were identified in the Ewon Cosy+ industrial remote access devices, which could allow attackers to gain complete control over the systems. This vulnerability presents a serious risk, as it could lead to unauthorised access, allowing…