Cybersecurity researchers have uncovered a significant threat affecting the internet’s Domain Name System (DNS) infrastructure, known as the “Sitting Ducks” attack. This sophisticated method allows cybercriminals to hijack domains without needing access to the owner’s account at the DNS…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Indonesia Bans Search Engine DuckDuckGo
Bad news for anyone concerned about their privacy who lives in or plans to visit Indonesia in the near future. As authorities ramp up their efforts to combat illegal online gambling and pornography, online privacy suffers as a result.…
China’s National Digital ID System Trials Begin Across 80 Internet Service Applications
China has initiated trials for its new national digital identification system across more than 80 internet service applications. This move follows the release of draft rules on July 26, with a public review and comment period open until August…
NPCI Announces Full Recovery of Banking Services After Ransomware Incident
CPCI, the National Payments Corporation of India, has re-established several retail payment connections with banks that currently use C-Edge systems after the technology provider was struck by a ransomware attack on August 1, according to a statement released by…
Cryptonator Seized for Laundering Ransom Payments and Stolen Cryptocurrency
U.S. and German law enforcement have taken down the domain of Cryptonator, a cryptocurrency wallet platform allegedly used by ransomware groups, darknet marketplaces, and other illegal services. The platform’s operator, Roman Boss, has been indicted on charges of money…
Why Did Turkey Suddenly Ban Instagram? The Shocking Reason Revealed
On Friday, Turkey’s Information and Communication Technologies Authority (ICTA) unexpectedly blocked Instagram access across the country. The ICTA, responsible for overseeing internet regulations, did not provide any specific reason for the ban. However, according to reports from Yeni Safak,…
Generative AI Set To Transform Automotive Industry
For the car sector, generative AI (GenAI) has the potential to transform how automobiles run and are maintained. GenAI’s ability to learn from massive volumes of data, make intelligent decisions, and improve processes makes it extremely useful in this industry.…
Hackers Exploit Bytecode Interpreters to Inject Malicious Code
Attackers can conceal their efforts to execute malicious code by embedding commands into the machine code stored in memory by software interpreters used in many programming languages, such as VBScript and Python. This technique will be demonstrated by a…
Black Basta Unleashes Custom Malware Following Qakbot Takedown
Following last year’s takedown of the Qakbot botnet, the Black Basta ransomware group has switched to relying on new custom tools and initial access techniques as part of a shift in strategy, as part of this year’s efforts to…
Dark Web Actor Claims Responsibility of ADT Data Breach
A dark web actor has claimed responsibility for a data breach affecting ADT, an American security company known for its residential and commercial alarm monitoring services. On August 1, 2024, an individual or group using the alias “netnsher” publicly…
Abuse of Cloudflare Tunnel Service for Malware Campaigns Delivering RATs
Researchers have raised alarms over cybercriminals increasingly exploiting the Cloudflare Tunnel service in malware campaigns that predominantly distribute remote access trojans (RATs). This malicious activity, first detected in February, utilizes the TryCloudflare free service to disseminate multiple RATs, including…
Google Delays Plan to Replace Cookies, Leaving Users and Industry in Limbo
In unexpected turn of events, Google has delayed its plan to replace tracking cookies in its Chrome browser, affecting its three billion users worldwide. The company had intended to transition to new, anonymised tracking methods to enhance user privacy, but…
World’s First AI Law: A Tough Blow for Tech Giants
In May, EU member states, lawmakers, and the European Commission — the EU’s executive body — finalized the AI Act, a significant guideline that intends to oversee how corporations create, use, and use AI. The European Union’s major AI law…
Generative AI is Closing The Tech Gap Between Security Teams And Threat Actors
With over 17 billion records breached in 2023, data breaches have reached an all-time high. Businesses are more vulnerable than ever before due to increased ransomware attacks, third-party hacks, and the increasing sophistication of threat actors. Still, many security…
New Android Malware BingoMod Targets Financial Data and Wipes Devices
Malware has long been a significant threat to online security, serving as a backdoor entry for cybercriminals. Despite Google’s efforts to keep the Play Store free of malicious apps and deliver timely Android security patches, some attackers manage to…
Basta Ransomware Culprits Revealed by Mandiant Investigation
An extortion campaign begun early this year by an unknown hacking group to extort money has been characterized as using the Basta ransomware to stop victims from unlocking their files. This campaign was discovered by Google Mandiant, which uses…
C-Edge Technologies: An In-Depth Look at the Indian Fintech Leader Impacted by a Major Cyberattack
C-Edge Technologies, a prominent IT solutions provider for India’s banking and financial sector, has recently faced significant challenges following a major ransomware attack. This incident has severely impacted its systems, leading to disruptions in payment services for nearly 300…
The Use of AI by Sales Teams is Booming
According to Salesforce’s 2024 State of Sales report, sales teams are combining tools and strengthening data security to reap the benefits of AI. Following a global survey of 5,500 sales professionals, the report’s four main findings are as follows: …
Data Breach: Georgia Voter Information Accidentally Displayed Online
Despite an effort by the Georgian government to provide a new web portal that allows Georgians to cancel their voter registration, the website has come under fire after a technical problem caused personal data to be displayed on users’…
Ransomware Groups Exploit VMware ESXi Bug for Widespread Attacks
Several ransomware groups have been exploiting a vulnerability in VMware ESXi hypervisors that allows them to bypass authentication and rapidly deploy malware across virtual environments. Identified as CVE-2024-37085, this bug has been assigned a “medium” severity rating of 6.8…