Cybersecurity experts said that a malware campaign targeting Ukraine’s military personnel has been released. The malware is spread with the help of a fake installer for an app called “Army+.” That installer looks perfectly legitimate but embeds malicious code.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
With Great Technology Comes Great Responsibility: Privacy in the Digital Age
In today’s digital era, data has become a valuable currency, akin to Gold. From shopping platforms like Flipkart to healthcare providers and advertisers, data powers personalization through targeted ads and tailored insurance plans. However, this comes with its own set…
New “Double-Clickjacking” Threat Revealed: Security Settings at Risk
Cybersecurity experts are raising alarms about a new twist on the classic clickjacking attack technique. Paulos Yibelo, a security engineer at Amazon, has uncovered a variant called “double-clickjacking,” capable of disabling security settings, deleting accounts, or even taking over…
Rethinking Password Security: Why Length Matters More Than Complexity
The growing number of online accounts has made managing passwords increasingly difficult. With users juggling dozens of accounts, creating secure yet memorable passwords has become a major challenge. Traditional password guidelines emphasize complexity, requiring combinations of uppercase and lowercase…
How to Declutter and Safeguard Your Digital Privacy
As digital privacy concerns grow, taking steps to declutter your online footprint can help protect your sensitive information. Whether you’re worried about expanding government surveillance or simply want to clean up old data, there are practical ways to safeguard…
Global Cybercrime Epidemic: Pig-Butchering Scams Exploit Vulnerable Victims and Flourish Amidst Enforcement Gaps
The phenomenon of “pig-butchering” scams has emerged as a significant cybercrime, exploiting vulnerabilities intensified by the Covid-19 pandemic. These schemes involve creating fraudulent investment platforms and manipulating victims emotionally, often targeting them through social media. Shockingly, these operations are…
WhatsApp Emerges as the Most Exploited Platform in Cyber Frauds
WhatsApp, Instagram, and Telegram have once again become the favorite tools for hackers, as per a report released by India’s Home Ministry (MHA). According to the report, WhatsApp is still the most commonly utilized medium for cybercrime. Several examples…
Watch Out: Fake Game Invites on Discord Are Stealing Your Personal Data
There is a new online scam, where cyber criminals trick people into downloading harmful software under the pretext of beta testing a game. This campaign targets people on platforms such as Discord, email, and even text messages, aiming at…
FBI Warns Against Public USB Charging Stations Due to “Juice Jacking” Threat
< p style=”text-align: justify;”>The FBI has issued a cautionary alert for travelers, urging them to avoid using public USB charging stations found in airports, hotels, and other public spaces. A rising cyber threat, known as “juice jacking,” enables cybercriminals to…
Cyberattack on Cyberhaven Chrome Extension Exposes Sensitive Data
< p style=”text-align: justify;”>On Christmas Eve, Cyberhaven, a data loss prevention company, experienced a cyberattack targeting its Google Chrome extension. The breach exposed sensitive customer data, including passwords and session tokens. The company has since taken swift measures to…
SysBumps: A Groundbreaking KASLR Break Attack Targeting Apple Silicon macOS Devices
< p style=”text-align: justify;”>In a significant revelation, researchers from Korea University have uncovered “SysBumps,” the first successful Kernel Address Space Layout Randomization (KASLR) break attack targeting macOS devices powered by Apple Silicon processors. Presented at CCS ’24, the study exposes…
Tech Ventures: Israel Advances in Crypto Ecosystem
Israel, often known as the “Startup Nation,” has emerged as a global leader in cybersecurity, defense, and internet technologies. Cryptocurrency has easily integrated into the high-tech ecosystem, transforming the digital asset class and blockchain technology into key drivers of the…
OpenAI’s O3 Achieves Breakthrough in Artificial General Intelligence
In recent times, the rapid development of artificial intelligence took a significant turn when OpenAI introduced its O3 model, a system demonstrating human-level performance on tests designed to measure “general intelligence.” This achievement has reignited discussions on artificial…
Are Passkeys the Future of Authentication? Current Hurdles Say Otherwise
< p style=”text-align: justify;”>For years, cybersecurity experts have criticized passwords as outdated and insecure. Frequently re-used, susceptible to phishing, and vulnerable to leaks, they remain one of the weakest links in online security. Passkeys have been hailed as the solution…
Milwaukee Residents Warned of Parking Ticket Scam
A fraudulent text message claiming to notify residents about an overdue City of Milwaukee parking penalty has been flagged as a scam and should be deleted, city authorities announced earlier this week. According to Ald. Lamont Westmoreland, the scam…
No More Internet Cookies? Digital Targeted Ads to Find New Ways
Google Chrome to block cookies The digital advertising world is changing rapidly due to privacy concerns and regulatory needs, and the shift is affecting how advertisers target customers. Starting in 2025, Google to stop using third-party cookies in the world’s most…
3 Critical Apache Flaws Discovered: Users Should Update to Avoid Major Risks
Experts find critical flaws The Cyber Security Agency of Singapore has issued warning against three critical flaws in Apache software products. The Apache Software Foundation has released security patches to address these vulnerabilities, which can cause risk to users and…
Volkswagen Cybersecurity Breach Exposes Sensitive Vehicle Data
< p style=”text-align: justify;”>A recent cybersecurity lapse within Volkswagen’s Cariad unit, which manages the company’s cloud systems, exposed sensitive data from hundreds of thousands of vehicles. The breach, attributed to a misconfiguration in a cloud environment hosted on Amazon…
Dutch Authority Flags Concerns Over AI Standardization Delays
As the Dutch privacy watchdog DPA announced on Wednesday, it was concerned that software developers developing artificial intelligence (AI) might use personal data. To get more information about this, DPA sent a letter to Microsoft-backed OpenAI. The Dutch Data…
Third-Party Data Breaches Expose Cybersecurity Risks in EU’s Largest Firms
< p style=”text-align: justify;”>A recent report by SecurityScorecard has shed light on the widespread issue of third-party data breaches among the European Union’s top companies. The study, which evaluated the cybersecurity health of the region’s 100 largest firms, revealed that…