OpenAI is taking the challenge of bringing into existence the very first powerful AI agents designed specifically to revolutionise the future of software development. It became so advanced that it could interpret in plain language instructions and generate complex…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Big Tech’s Data-Driven AI: Transparency, Consent, and Your Privacy
In the evolving world of AI, data transparency and user privacy are gaining significant attention as companies rely on massive amounts of information to fuel their AI models. While Big Tech giants need enormous datasets to train their AI systems,…
Check Point Uncover Pakistan-Linked APT36’s New Malware Targeting Indian Systems
Pakistan’s APT36 threat outfit has been deploying a new and upgraded version of its core ElizaRAT custom implant in what looks to be an increasing number of successful assaults on Indian government agencies, military entities, and diplomatic missions over…
Why Small Businesses Are Major Targets for Cyberattacks and How to Defend Against Them
Recent research by NordPass and NordStellar, backed by NordVPN, has shed light on small private businesses being prime targets for cybercriminals. After analyzing around 2,000 global data breaches over two years, they found that retail and technology sectors, particularly…
Operation Synergia II: A Global Effort to Dismantle Cybercrime Networks
In an unprecedented move, Operation Synergia II has significantly strengthened global cybersecurity efforts. Led by INTERPOL, this extensive operation focused on dismantling malicious networks and thwarting cyber threats across 95 countries. Spanning from April to August 2024, the initiative marks…
UIUC Researchers Expose Security Risks in OpenAI’s Voice-Enabled ChatGPT-4o API, Revealing Potential for Financial Scams
Researchers recently revealed that OpenAI’s ChatGPT-4o voice API could be exploited by cybercriminals for financial scams, showing some success despite moderate limitations. This discovery has raised concerns about the misuse potential of this advanced language model. ChatGPT-4o, OpenAI’s latest…
Columbus Data Breach Affects 500,000 in Recent Cyberattack
In July, a ransomware attack on Columbus, Ohio, compromised the personal information of an estimated 500,000 residents, marking one of the largest cyber incidents to affect a city in the United States in recent years. There has been great…
Digital Arrest: How Even The Educated Become Victims
One of the most alarming trends in recent times is the surge in digital arrest scams, particularly in India. These scams involve cybercriminals impersonating law enforcement officials to extort money from unsuspecting victims. Cybersecurity threats are rapidly escalating in India,…
JPCERT Explains How to Identify Ransomware Attacks from Windows Event Logs
Japan Computer Emergency Response Team (JPCERT/CC) has published guidance on early identification of ransomware attacks in the system using Windows Event Logs. Probably by reviewing these logs, firms would identify some signs or clues of an existing ransomware attack…
UK Watchdog Urges Data Privacy Overhaul as Smart Devices Collect “Excessive” User Data
A new study by consumer group Which? has revealed that popular smart devices are gathering excessive amounts of personal data from users, often beyond what’s required for functionality. The study examined smart TVs, air fryers, speakers, and wearables, rating…
The Growing Concern Regarding Privacy in Connected Cars
Data collection and use raise serious privacy concerns, even though they can improve driving safety, efficiency, and the whole experience. The automotive industry’s ability to collect, analyse, and exchange such data outpaces the legislative frameworks intended to protect individuals.…
NCSC Unveils “Pigmy Goat” Malware Targeting Sophos Firewalls in Advanced Chinese Cyberattack
The National Cyber Security Centre (NCSC) recently disclosed the presence of a Linux malware, “Pigmy Goat,” specifically designed to breach Sophos XG firewall devices. This malware, allegedly developed by Chinese cyber actors, represents a significant evolution in network infiltration…
Gmail Under Attack: Secure a Backup Account
Having access to a Gmail account in the present world is rather dangerous because hackers create new ways of penetrating the account, even if it at times employs a 2FA security feature. While methods like passkey sign-ins and secure…
Researchers Develop Blockchain-Based Federated Learning Model to Boost IoT Security
In a groundbreaking development for Internet of Things (IoT) security, a team of researchers led by Wei Wang has introduced a novel distributed federated intrusion detection system. The study, published in Frontiers of Computer Science and co-published by Higher…
Crypto Bull Market Targeted: The Lottie-Player Security Breach
In an alarming development for the tech community, especially for those immersed in the Web3 ecosystem, a supply chain attack has targeted the popular animation library, Lottie-Player. If users fall for this prompt, it could enable attackers to drain cryptocurrency…
Facebook, Nvidia Push SCOTUS to Limit Investor Lawsuits
The US Supreme Court is set to take two landmark cases over Facebook and Nvidia that may rewrite the way investors sue the tech sector after scandals. Two firms urge the Court to narrow legal options available for investment…
New Flaws in Fortinet, SonicWall, and Grafana Pose Significant Threats
Cyble Research and Intelligence Labs (CRIL) has discovered new IT vulnerabilities that affect Fortinet, SonicWall, Grafana Labs, and CyberPanel, among others. The report for the week of October 23-29 identifies seven security flaws that require immediate attention from security…
How to Protect Yourself Against Phishing Extortion Scams Involving Personal Data
Imagine receiving an email with a photo of your house, address, and a threatening message that seems ripped from a horror movie. Unfortunately, this is the reality of modern phishing scams, where attackers use personal information to intimidate victims…
LightSpy Update Expands Surveillance on iOS Devices
It has been discovered that a newer version of LightSpy spyware, commonly used to target iOS devices, has been enhanced with the capability to compromise the security and stability of the device. LightSpy for macOS was first discovered by…
Scammers Impersonate Thunder Bay RCMP in New Phone Spoofing Scheme
Phone number of the RCMP used in scams across Thunder Bay. The local Royal Canadian Mounted Police detachment is warning residents of Thunder Bay about a phone scam. Scammers are spoofing the official RCMP number, 807-623-2791, which will have…