A recently uncovered Windows vulnerability, known as CVE-2024-6768, has raised alarm among cybersecurity experts due to its potential to cause widespread disruption by triggering the dreaded blue screen of death (BSOD) on a range of Windows operating systems. Discovered…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Here’s How Users Can Safeguard Themselves From E-Challan Scams
In light of the growing prevalence of e-challan scams, the Indian Computer Emergency Response Team (CERT-In) has released some crucial advice to prevent individuals from becoming victims and suffering financial loss. Nearly 4400 devices have been infected with malware,…
North Miami Mayor’s Gmail Hacked; Ransomware Attack Disrupts City Services
North Miami residents are on edge after Mayor Alix Desulme disclosed that his personal Gmail account was hacked in a ransomware attack. This cyberattack has severely disrupted city operations, leaving many services unavailable online. While City Hall has reopened, residents…
FBI and Allies Dismantle Dispossessor Ransomware Network
The FBI announced on Monday that it has taken down the servers and websites used by the Radar/Dispossessor ransomware group. This action was part of a global investigation involving the U.K.’s National Crime Agency, the Bamberg Public Prosecutor’s Office,…
Microsoft Patches Critical SmartScreen Vulnerability Exploited by Attackers
Microsoft’s SmartScreen feature, a cornerstone of Windows security, faced a significant setback when a critical vulnerability, CVE-2024-38213, was exploited by cybercriminals. This vulnerability allowed attackers to circumvent SmartScreen’s protective mechanisms and deliver malicious code to unsuspecting users. The vulnerability…
When Data Security Fails: The National Public Data Breach Explained
Recent events have highlighted the vulnerabilities that still exist in our digital infrastructure. One such incident is the data breach involving National Public Data (NPD), a background check company. This breach, initially revealed in a class-action lawsuit, has now escalated,…
Comprehensive Hacker Toolkit Uncovered: A Deep Dive into Advanced Cyberattack Tools
Cybersecurity researchers have recently uncovered a vast and sophisticated hacker toolkit that provides a comprehensive suite of tools for executing and maintaining cyberattacks. Found in an open directory in December 2023, the discovery offers a rare glimpse into the…
Hackers Exploit Dark Skippy Attacks to Steal Secret Keys from Secure Devices
An element of the Dark Skippy attack involves the subtle manipulation of nonces during the signature creation process to create the signature. To obtain the private key of a cryptocurrency wallet, attackers craft carefully crafted nonces, thereby gaining full…
CrowdStrike’s Recovery Efforts in Focus After Global IT Outage
On July 19, cybersecurity leader CrowdStrike found itself at the centre of a crisis after a faulty software update caused a widespread IT outage, affecting millions of computers worldwide. The aftermath of this incident was evident at the Black…
Xapo Bank Aims To Boost Bitcoin Safety With Tech And Bunkers
Satoshi Nakamoto, the pseudonymous developer of Bitcoin, published the system’s whitepaper in 2008, bluntly criticising financial institutions and the confidence they demand. However, in 2010, one of the most notable Bitcoin collaborators in its early days and the recipient…
GPS Spoofing Incidents Spike 400%: Here’s What You Should Know
Global Positioning System (GPS) technology has become an integral part of our daily lives, from smartphone navigation apps to precision agriculture and aviation. However, recent incidents have highlighted a growing threat: GPS spoofing. In this blog, we delve into GPS…
Dark Web Revealed: The Hidden Internet’s Role in Cybercrime and Digital Privacy
The dark web, often shrouded in mystery and fear, is portrayed as a breeding ground for illicit activities and cybercrime. While this image is not entirely unfounded, the dark web’s origins and uses are more nuanced, with surprising ties…
Cloud Security Report Highlights Misconfiguration and IAM as Top Threats
Traditional cloud security issues once associated with service providers are declining in significance, as per the Cloud Security Alliance’s 2024 Top Threats report, However, new challenges persist. Misconfigurations, weak identity and access management (IAM), and insecure application programming interfaces (APIs)…
2.7 Billion Data Records Leaked Including Social Security Numbers
There has been news about a prominent hacking group that claimed a large amount of sensitive personal information was allegedly stolen from a major data broker about four months ago, but a member of that group has reportedly released…
Ewon Cosy+ Industrial Devices Vulnerable to Serious Security Exploits
Recently, severe security flaws were identified in the Ewon Cosy+ industrial remote access devices, which could allow attackers to gain complete control over the systems. This vulnerability presents a serious risk, as it could lead to unauthorised access, allowing…
Rhysida Ransomware Takes Responsibility for Bayhealth Hospital Breach
The Rhysida Ransomware outfit claims to have infiltrated Bayhealth Hospital in Delaware and is offering the allegedly stolen data for 25 BTC. Bayhealth Hospital is a technologically equipped not-for-profit healthcare facility with around 4,000 employees and a medical team…
Massive Data Breach in Columbus Over 3TB Files Leaked by Rhysida Ransomware Group
Columbus is grappling with the fallout from a significant data breach, as the Rhysida ransomware group has begun leaking over three terabytes of stolen data on the dark web. The breach, which targeted the city’s employees, comes after two…
Urgent Call for EPA Cyber Strategy to Safeguard Water Infrastructure
A new watchdog report published by the US government’s Environmental Protection Agency says the EPA must develop a comprehensive plan of action to counter the increasing number and sophistication of cybersecurity threats facing the utilities. In the last few…
Italy Demands Cybersecurity Safeguards from Dongfeng for New Auto Plant Investment
Italy is demanding that Dongfeng Motor Group Co., a prominent Chinese automaker, agree to stringent cybersecurity and data protection measures as a condition for supporting the establishment of a new plant in the country. According to sources familiar with…
The UK Erupts in Riots as Big Tech Stays Silent
For the past week, England and parts of Northern Ireland have been gripped by unrest, with communities experiencing heightened tensions and an extensive police presence. Social media platforms have played an unjust role in spreading information, some of it…