Many customers are captivated by Gen AI, employing new technologies for a variety of personal and corporate purposes. However, many people ignore the serious privacy implications. Is Generative AI all sunshine and rainbows? Consumer AI products, such as OpenAI’s ChatGPT,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Phishing Kit FishXProxy Equips Online Criminals for Success
Phishing campaigns have always been a threat, but a new toolkit called FishXProxy is making it alarmingly easy for even inexperienced cybercriminals to carry out sophisticated scams. SlashNext Email Security researchers have disclosed exclusive details about FishXProxy, a new…
Microsoft Faces Criticism Over Data Breach Notification Emails
Microsoft recently began notifying some customers via email about a potential data breach that might have compromised their personal information. However, the company’s approach has faced heavy criticism, with many saying the emails resembled spam or phishing attempts. Cybersecurity…
Data Breach Exposes Millions of mSpy Spyware Customers
A data breach at the phone surveillance operation mSpy has compromised the personal information of millions of customers who purchased access to the phone spyware app over the past decade, as well as the Ukrainian company behind it. In…
Debunking Common Myths About VPNs
Virtual Private Networks (VPNs) are important tools for online privacy, but they’re often misunderstood. Here, we clear up the top five myths to help you understand what VPNs can and can’t do for your digital security. Myth 1: All VPNs…
Apple Alerts Pegasus-like Attack on Indian Activists and Leaders
On July 10, two individuals in India received alarming notifications from Apple, Inc. on their iPhones, indicating they were targeted by a “mercenary” attack. This type of spyware allows attackers to infiltrate personal devices, granting access to messages, photos,…
Akira Ransomware: The Need for Rapid Response
Threat actors wielding the Akira ransomware demonstrated unprecedented efficiency in a recent cyber attack that sent shockwaves through the cybersecurity community. Their lightning-fast data exfiltration took just over two hours, representing a dramatic shift in the average time it takes…
Cyber Criminals Siphoned ‘Almost All’ of AT&T’s Call Logs Over Six Months
Hackers accessed AT&T’s data storage platform in April, stealing metadata from “nearly all” call records and messages sent by users over a six-month period in 2022. AT&T filed paperwork with the Securities and Exchange Commission (SEC) on Friday, stating…
Major Ransomware Attack Targets Evolve Bank, Impacting Millions
An Arkansas-based financial services organization confirmed the incident on July 1 shortly after the ransomware gang published data it claimed had been stolen during the attack and published it on its website. According to the company, there was no…
Improved ViperSoftX Malware Distributed Through eBooks
Researchers have found new advancements in the ViperSoftX info-stealing malware, which was first discovered in 2020. This malware has become more sophisticated, using advanced techniques to avoid detection. One of its new methods is using the Common Language Runtime…
Chinese Expert Confirms Authenticity of Leaked F-35 and F-15 Documents
One of the key findings of a Chinese expert on information security is the authenticity of recent documents that leaked information on the F-35 fighter jet and sensitive US weapons. According to the expert, the documents appear authentic. Ivan…
Dubai Customs Introduces Blockchain Platform to Streamline Commerce
Dubai Customs has recently unveiled a new blockchain platform aimed at streamlining commercial activities in the region, reinforcing its status as a technology-forward market. This initiative seeks to address and overcome obstacles hindering entrepreneurship in Dubai by leveraging blockchain…
Houthi-Aligned APT Targets Mideast Militaries With ‘GuardZoo’ Spyware
Since 2019, surveillance equipment deployed by a Yemeni Shia Islamist organization’s partners has been used to target troops throughout the Middle East, according to a new study. Surveillanceware Targeting Middle Eastern Militaries A Houthi-aligned threat actor utilized GuardZoo malware to…
The Impact of AI on Society and Science
Nowadays, everyone is talking about artificial intelligence (AI). Governments view AI as both an opportunity and a challenge. Industries are excited about AI’s potential to boost productivity, while academia is actively incorporating AI into teaching and research. However, the…
England Fans Warned Over ‘Quishing’ Scam Ahed of Euro Final
England football fans have been urged to be wary of a ‘quishing’ scam as they gather in pubs to watch the Euro 2024 final against Spain. The duping phenomenon has the potential to be devastating for victims, and it…
Poland Pushes for Shorter Drug Data Protection in EU
At a recent EU meeting in Luxembourg, Poland supported a European Commission proposal to shorten the time new drugs are protected by data exclusivity rules. Health Minister Izabela Leszczyna said Poland prefers one year of market protection over longer…
Singapore Banks Phasing Out OTPs in Favor of Digital Tokens
It has been around two decades since Singapore started issuing one-time passwords (OTPs) to users to aid them in logging into bank accounts. However, the city-state is planning to ditch this method of authentication shortly. Over the next three…
Chinese APT40 Can Exploit Flaws Within Hours of Public Release
A joint government advisory claims that APT40, a Chinese state-sponsored actor, is focusing on recently discovered software vulnerabilities in an attempt to exploit them in a matter of hours. The advisory, authored by the Cybersecurity and Infrastructure Security Agency,…
Decrypting DoNex: The Flaw That Brought Down a Ransomware Empire
DoNex Ransomware Encryption: Flaw in Cryptographic Schema Experts uncovered a critical flaw in the encryption schema of the DoNex ransomware, including all variations and predecessors. Since March 2024, they’ve worked with law enforcement to give a decryptor to affected DoNex…
Significant Drop in Cyber-Insurance Premiums Makes Coverage More Affordable
Over the last year, a steady decline in premium rates has made cyber-insurance coverage more accessible and affordable for organizations of all sizes. The primary driver behind this decrease is the increasingly competitive marketplace, with more insurance companies offering…