Tag: CySecurity News – Latest Information Security and Hacking Incidents

Are VPNs Undertaking To Oversee All Digital Security?

  In the past decade, the services of Virtual Private Networks (VPNs) have drastically transformed. Once solely focused on providing secure internet connections, VPN companies are now expanding their offerings into comprehensive privacy and security suites. This shift reflects a…

Hackers Use GitHub Search to Deliver Malware

  Checkmarx, an application security firm, has discovered that threat actors are altering GitHub search results in order to infect developers with persistent malware. As part of the campaign, attackers were seen developing fake repositories with popular names and themes,…

US Think Tank Struck by Cyberattack

  The Heritage Foundation, a prominent conservative think tank based in Washington, DC, revealed on Friday that it had fallen victim to a cyberattack earlier in the week. The attack, which occurred amid ongoing efforts to mitigate its effects, left…

Data Exposure Incident: iCabbi’s Security Breach

Data is the new currency, but what happens when the guardians of our privacy mess up? The recent incident involving iCabbi, a taxi software vendor, brings notice to the delicate balance between convenience and security. The Breach Unveiled On a…

Apple Alerts iPhone Users of ‘Mercenary Attack’ Threat

  Apple issued security alerts to individuals in 92 nations on Wednesday, cautioning them that their iPhones had been targeted in a remote spyware attack linked to mercenaries. The company sent out threat notification emails, informing recipients, “Apple has detected…

Is Facial Biometrics the Future of Digital Security?

  Within the dynamic sphere of digital technology, businesses are continually seeking innovative solutions to streamline operations and step up their security measures. One such innovation that has garnered widespread attention is facial biometrics, a cutting-edge technology encompassing face recognition…

Offensive Security Necessitates a Data-driven Approach for CISOs

  There remains a significant disparity in utilisation of resources between defensive and offensive cybersecurity technologies. When comparing the return on investment (ROI) for defensive and offensive investments, security experts discovered that offensive security routinely outperforms defensive security. For example,…

AI’s Role in Averting Future Power Outages

  Amidst an ever-growing demand for electricity, artificial intelligence (AI) is stepping in to mitigate power disruptions. Aseef Raihan vividly recalls a chilling night in February 2021 in San Antonio, Texas, during winter storm Uri. As temperatures plunged to -19°C,…

X’s URL Blunder Sparks Security Concerns

  X, the social media platform formerly known as Twitter, recently grappled with a significant security flaw within its iOS app. The issue involved an automatic alteration of Twitter.com links to X.com links within Xeets, causing widespread concern among users.…

The Vulture in Cyberspace: A Threat to Your Finances

In the digital landscape where information flows freely and transactions occur at the speed of light, a new predator has emerged. Aptly named the “Vulture,” this cyber threat silently circles its unsuspecting prey, waiting for the right moment to strike.…

AI Integration in Cybersecurity Challenges

  In the ongoing battle against cyber threats, government and corporate heads are increasingly turning to artificial intelligence (AI) and machine learning (ML) for a stronger defense. However, the companies are facing a trio of significant hurdles.  Firstly, the reliance…

Look Out For SIM Swap Scams: Tips for Bitcoin Security

  In today’s digitised world, safeguarding personal information and digital assets is of great importance. One emerging threat is the SIM swap scam, a sophisticated form of identity theft where fraudsters manipulate mobile carriers to transfer a victim’s phone number…

LinkedIn Users Targeted in Complex Phishing Scheme

  LinkedIn Users Targeted in Complex Phishing Scheme A concerning security threat has emerged for users of the professional networking platform LinkedIn. Known as the “Microsoft Two-Step Phishing Campaign,” this attack involves hackers using compromised profiles to deceive users and…

Fostering Cybersecurity Culture: From Awareness to Action

  The recent film “The Beekeeper” opens with a portrayal of a cyberattack targeting an unsuspecting victim, highlighting the modern challenges posed by technology-driven crimes. The protagonist, Adam Clay, portrayed by Jason Statham, embarks on a mission to track down…

E-commerce Breach: Hackers Target Magento, Steal Payment Data

  In a concerning development for e-commerce security, hackers have been discovered exploiting a critical flaw in the popular Magento platform, leaving numerous online stores vulnerable to data breaches. The vulnerability, identified as CVE-2024-20720 with a severity score of 9.1,…

Combatting iPhone Scams: Steps Towards Enhanced Security

  The latest revelation in the realm of iPhone scams comes in the form of MFA (Multi-Factor Authentication) bombing. This sophisticated threat targeting Apple users underscores the need for heightened awareness and informed responses. Apple has promptly responded to the…

Lazy Koala: New Cyber Threat Emerges in CIS Region

  Cybersecurity researchers at Positive Technologies Expert Security Center (PT ESC) recently uncovered a new threat actor they’ve named Lazy Koala. Despite lacking sophistication, this group has managed to achieve significant results. The report reveals that Lazy Koala is targeting…

Email Security Vulnerabilities: Shocking Gaps in Malware Detection

In an era where digital communication dominates, email remains a fundamental tool for personal and professional correspondence. However, recent research by web browser security startup SquareX has exposed alarming vulnerabilities in email security.  The study, titled “Security Bite: iCloud Mail,…

Privnote Secure Messaging App Is Under Phishing Threat

  Privnote.com, launched in 2008, revolutionized secure messaging with its encryption technology. It allows users to send messages with a unique link, ensuring privacy as the content self-destructs after reading. However, its popularity among cryptocurrency enthusiasts also drew the attention…

The Growing Threat of Remote Desktop Protocol (RDP) Attacks

Remote Desktop Protocol (RDP) attacks have emerged as a formidable menace to businesses worldwide. Organizations must be vigilant and proactive in safeguarding their digital assets against this rising threat. What Is RDP? RDP is a proprietary protocol developed by Microsoft…

Fund Manager Outlines Digital Data as Rising Asset Class

  In a recent dialogue, Roundtable host Rob Nelson and Lisa Wade, CEO of wholesale fund manager DigitalX, explored the burgeoning data revolution, discussing the profound implications of data ownership and the transformative potential of Web3 and blockchain technology on…

AI Developed to Detect Invasive Asian Hornets

  Researchers at the University of Exeter have made an exceptional breakthrough in combating the threat of unsettling Asian hornets by developing an artificial intelligence (AI) system. Named VespAI, this automated system boasts the capability to identify Asian hornets with exceptional…

Controversial Reverse Searches Spark Legal Debate

In a growing trend, U.S. police departments and federal agencies are employing controversial surveillance tactics known as reverse searches. These methods involve compelling big tech companies like Google to surrender extensive user data with the aim of identifying criminal suspects. …

Rise of Hacktivist Groups Targeting OT Systems

Recent research from Waterfall Security Solutions has revealed important insights into the changing nature of cyberattacks on Operational Technology (OT) organizations. One key finding is the rise of hacktivist groups as major players in targeting OT systems.  Additionally, the study…

Malware Targets End-of-Life Routers and IoT Devices

  A recent investigation by Black Lotus Labs team at Lumen Technologies has revealed a concerning trend in cybercriminal activity targeting end-of-life (EoL) routers and IoT devices. The research sheds light on a sophisticated campaign utilising updated malware known as TheMoon, which…

Smishing Surge: Tactics, Threats, and ‘The Com’

Recently, what we are observed is that enterprises facing a persistent threat from social engineering tactics aimed at acquiring login credentials for crucial systems like Identity and Access Management (IAM), cloud resources, and Single Sign-On (SSO) platforms. Successful breaches through…

DOD Officially Launches New Cyber Policy Office

  The Office of the Assistant Secretary of Defence for Cyber Policy has been formally constituted, the Pentagon announced in a statement last week. Congress directed the Pentagon to set up the office, elevating cyber policy within the office of…