Securing an account with only a username and password is insufficient because these can be easily stolen, guessed, or cracked. Therefore, two-factor authentication (2FA) is recommended for securing important accounts and has been a mandatory requirement for online banking…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Veeam Software Issues Fixes for Exploitable Security Flaws
Security experts recommend all Veeam Backup & Replication software customers to upgrade their software immediately to address a critical, remotely exploitable vulnerability. Veeam first revealed the flaw, dubbed CVE-2024-40711, on Thursday, when it issued fixes to address 18 vulnerabilities…
Election Sabotage via Cyberattacks Increases
Several predictions have pointed out that 2024 will not only be an election year but also a year of civil rights. Security has identified an increasing trend of malicious cyber activity aimed at imperilling sovereign elections around the world…
Hackers Use SonicWall Security Flaw in Ransomware Attacks
In the latest ransomware attack, operators have started using a critical bug in SonicWall SonicOS firewall devices as an entry point for compromising business networks. The vulnerability, identified as CVE-2024-40766, is from the management access interface of the firewall…
Why Windows 11 Requires a TPM and How It Enhances Security
When Microsoft launched Windows 11 in 2021, the new operating system came with a stringent hardware requirement: the presence of a Trusted Platform Module (TPM), specifically one that meets the TPM 2.0 standard. A TPM is a secure cryptoprocessor…
Hacktivism: How Hacktivists are Using Digital Activism to Fight for Justice
What is Hacktivism? Hacktivism, a blend of hacking and activism, has become a major threat in the digital landscape. Hacktivists are driven by political, religious, and social aims, they use different strategies to achieve their goals, and their primary targets…
Security Experts Detect SQL Injection to Bypass Airport TSA Security Checks
Security experts discovered a flaw in a critical air transport security system, allowing unauthorised personnel to possibly bypass airport security screenings and get access to aircraft cockpits. Researchers Ian Carroll and Sam Curry uncovered the security vulnerability in FlyCASS,…
Data Poisoning: The Hidden Threat to AI Models
As ongoing developments in the realms of artificial intelligence and machine learning take place at a dynamic rate, yet another new form of attack is emerging, one which can topple all those systems we use today without much ado: data…
Avis Data Breach Exposes Over 400,000 Customers’ Personal Information
Over 400,000 customers of Avis, a prominent car rental company known for its presence at U.S. airports, have had their personal data compromised in a recent cybersecurity breach. The company revealed the incident to the public on Monday, stating…
Bitcoin ATM Emerges as Major Threat to Cryptocurrency
There is an ominous growth in Bitcoin ATMs across the United States, and some experts have claimed they are also one of the biggest cybercrime threats to the country. As with other ATMs, Bitcoin ATMs share a few characteristics with…
Slim CD Data Breach Exposes Credit Card Information of 1.7 Million Customers
Payment processor Slim CD has reported a data breach that exposed the credit card and personal information of nearly 1.7 million people. According to a notification sent to those affected, the company revealed that unauthorized access to its network…
SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets
Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to grow. An advanced malware strain campaign has surfaced from North Korea, it attacks cryptocurrency wallets by…
Digital Dictatorship: The Dangers of Unchecked Spyware
The Pegasus scandal broke into the public eye three years ago and has been widely reported in the media ever since. Yet, the surveillance industry has not been fixed. On the contrary, the spyware problem seems to worsen as…
Disney Data Breach Exposes Sensitive Corporate and Personal Information
In July, Disney experienced a significant data breach that exposed far more than initially reported, compromising a wide array of sensitive information. While early reports focused on stolen Slack messages, it has since been revealed that the breach extended…
‘TIDrone’ Cybercriminals Target Taiwan’s Drone Makers
A previously unknown threat actor with possible ties to Chinese-speaking groups has primarily targeted drone makers in Taiwan as part of a cyber attack operation that started in 2024. Trend Micro is tracking the adversary under the codename TIDRONE,…
Free Russia Foundation Investigates Potential Cyberattack Amid Leak of Sensitive Documents
One of Russia’s leading pro-democracy groups, the Free Russia Foundation, announced on Friday that it is investigating a potential cyberattack following the online leak of thousands of emails and documents related to its operations. On Thursday, the Telegram channel…
AI In Wrong Hands: The Underground Demand for Malicious LLMs
In recent times, Artificial Intelligence (AI) has offered various perks across industries. But, as with any powerful tool, threat actors are trying to use it for malicious reasons. Researchers suggest that the underground market for illicit large language models is…
DarkCracks Malware Exploits Vulnerabilities in GLPI and WordPress Systems
A malware framework named DarkCracks has been identified by cybersecurity experts from QiAnXin. This newly discovered threat takes advantage of weaknesses in GLPI, an IT asset management system, and WordPress websites. DarkCracks has raised alarm due to its ability…
Cybercriminals Ramp Up Malvertising Schemes Through Google Searches
Malvertising, the practice of using online ads for malicious purposes, is on the rise, with incidents in the U.S. spiking by 42 per cent in fall 2023, according to cybersecurity firm Malwarebytes. Hackers are leveraging increasingly sophisticated techniques to…
Adlumin Thwarts Fog Ransomware Attack Using Innovative Decoy Technology
In early August 2024, cybercriminals launched a ransomware attack on a mid-sized financial firm using compromised VPN credentials, deploying the “Fog” ransomware variant on both Windows and Linux endpoints. However, Adlumin’s cutting-edge technology successfully stopped the attack by employing…
Continuous Threat Exposure Management: A Proactive Cybersecurity Approach
Continuous Threat Exposure Management (CTEM) represents a significant shift in cybersecurity strategy, moving beyond the limitations of traditional vulnerability management. In an era where data breaches and ransomware attacks remain prevalent despite substantial cybersecurity investments, CTEM offers a comprehensive…
CyberVolk Ransomware: A Rising Threat to Global Cybersecurity
The Indian hacker outfit CyberVolk, which is a relatively new player in the cybercrime arena, has made headlines with its sophisticated ransomware. CyberVolk Ransomware, discovered in July 2024, has quickly gained attention for its sophisticated features and quick progress. …
The Slim CD Data Breach: 1.7 Million Credit Cards Compromised
Credit card security has always been a challenge for users, as hackers try innovative ways to lure the victims. In a massive data breach, payment gateway provider Slim CD (it offers payment processing services for both online and offline merchants)…
CISA Identifies Industrial Cybersecurity Bugs in Baxter and Mitsubishi Products
A report published recently by the Cybersecurity and Infrastructure Security Agency (CISA) warned about two new ICS vulnerabilities found in products widely used in healthcare, critical manufacturing, and other sectors susceptible to cybercrime activity. Among the affected products are…
Google’s Grip on Ad Tech: What the UK Competition Watchdog Discovered
The UK Competition and Markets Authority (CMA) has provisionally found that Google has been abusing its dominant position in the online advertising technology market. This finding could have far-reaching implications for the digital advertising ecosystem, affecting thousands of publishers and…
Council of Europe Lunches First AI Treaty
The Council of Europe has launched the first legally binding international treaty on artificial intelligence (AI) to align AI usage with the principles of human rights, democracy, and the rule of law. Known as the Framework Convention on Artificial Intelligence,…
TFL Hit by Cyberattack, Leaving Disabled Riders Stranded
Transport for London (TfL) recently confirmed that disabled passengers are the first group to feel the effects of a cyberattack that has hit their systems. This incident has severely impacted the Dial-a-Ride service, a specialised transport service designed for…
Novel Android Malware Employs OCR to Steal Crypto Wallet Keys From Images
A novel mobile malware operation dubbed SpyAgent has surfaced targeting Android device users in South Korea. According to an investigation by McAfee Labs researcher SangRyol Ryu, the malware “targets mnemonic keys by scanning for images on your device that…
Protecting Against Fog Ransomware: Key Strategies and Insights
In August 2024, a mid-sized financial firm was targeted by a ransomware attack using compromised VPN credentials to deploy a variant called “Fog” on both Windows and Linux systems. Fortunately, the attack was detected and neutralized by Adlumin’s innovative…
Apache Addresses Severe RCE Vulnerability in OFBiz with an Urgent Patch
In a recent release, the Apache OFBiz project developers have been working on a patch to fix a new critical flaw of software that can be exploited by unauthenticated attackers to execute arbitrary code on the server. Considering that…
83% of Businesses Hit by Ransomware – Are You Next?
Ransomware continues to be a critical threat to businesses worldwide, with a staggering 83% of organisations reporting they experienced at least one ransomware attack in the last year. Alarmingly, almost half of those affected (46%) faced four or more…
Cyberattack Targets Malaysian Officials with Babylon RAT Malware
An investigation by the Cyble Research and Intelligence Lab (CRIL) has uncovered a sophisticated cyberattack aimed at Malaysian political figures and government officials. Initiated in July 2024, the attack utilizes fake ISO files to deploy Babylon RAT, a dangerous malware…
Here’s Why Attackers Have a Upper Hand Against CISOs
Security experts have an in-depth knowledge of the technical tactics, techniques, and procedures (TTPs) that attackers employ to launch cyberattacks. They are also knowledgeable about critical defensive methods, such as prioritising patching based on risk and creating a zero-trust…
Australia’s Proposed Mandatory Guardrails for AI: A Step Towards Responsible Innovation
Australia has proposed a set of 10 mandatory guardrails aimed at ensuring the safe and responsible use of AI, particularly in high-risk settings. This initiative is a significant step towards balancing innovation with ethical considerations and public safety. The Need…
22,000 PyPI Packages Affected by Revival Hijack Supply-Chain Attack
It has been discovered that hackers can distribute malicious payloads easily and efficiently through the package repository on the PyPI website by using a simple and troublesome exploit. A JFrog security researcher has discovered a new supply chain attack…
Cyber Resilience: Preparing for the Inevitable in a New Era of Cybersecurity
At the TED Conference in Vancouver this year, the Radical Innovators foundation brought together over 60 of the world’s leading CHROs, CIOs, and founders to discuss how emerging technologies like AI and quantum computing can enhance our lives. Despite…
Surge in Ransomware Groups Amid Law Enforcement Disruptions in 2024
New research from Searchlight Cyber reveals a significant rise in ransomware groups, with 73 active groups identified in the first half of 2024, compared to 46 during the same period in 2023. These findings suggest that while law enforcement…
Can VPN Conceal Torrenting? Is it Safe to Torrent With a VPN?
Nowadays, keeping your internet behaviour private can seem impossible, especially if you torrent. This type of file sharing is strongly discouraged by both ISPs, which may throttle your internet connections if you are detected, and government organisations, which are…
Planned Parenthood Cyberattack: How Bad Actors Are Targeting Medical Institutions
The healthcare sector has become an increasingly attractive target for cybercriminals. The latest victim in this alarming trend is Planned Parenthood of Montana, which recently fell prey to a ransomware attack by a group known as RansomHub. This incident not…
OpenStack Ironic Users Advised to Patch Critical Security Vulnerability
OpenStack’s Ironic project, which is used for provisioning bare metal machines, has been identified with a critical security flaw (CVE-2024-44082) that allows authenticated users to exploit unvalidated image data. This vulnerability impacts multiple versions of Ironic and the Ironic-Python-Agent…
Critical Security Flaw Discovered in LiteSpeed Cache Plugin for WordPress
A major security vulnerability has been uncovered in the LiteSpeed Cache plugin, used on over 5 million WordPress websites worldwide. The flaw, identified as CVE-2024-44000, was discovered by Rafie Muhammad, a security researcher at Patchstack. Rated with a CVSS…
Enterprise Resilience in the Face of Cyber Risk
There are now more than $10 trillion in annual cybercrime costs in the world, which speaks volumes about how quickly data breaches, ransomware attacks, and malicious disruption of business and government operations are growing in scale and scope. Cyber…
Irish Data Protection Commission Halts AI Data Practices at X
The Irish Data Protection Commission (DPC) recently took a decisive step against the tech giant X, resulting in the immediate suspension of its use of personal data from European Union (EU) and European Economic Area (EEA) users to train…
Halliburton Hit by Cyberattack, Data Stolen
Halliburton, one of the world’s largest energy companies, has confirmed that it was the victim of a cyberattack. Hackers infiltrated the company’s systems and stole sensitive information. The attack occurred last week, and Halliburton is still determining the extent…
Iran Cyber Attack: Fox Kitten Aids Ransomware Operations in the U.S
A new joint cybersecurity advisory from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) has revealed updated details about the Iran-based cyber threat group known as…
Microchip Technology Confirms Private Data Stolen in Ransomware Attack
Microchip Technology has acknowledged that employee information was stolen from vulnerable systems in an August incident. The Play ransomware group later claimed responsibility. The chipmaker, headquartered in Chandler, Arizona, serves over 123,000 clients across a variety of industries, including…
CISA Launches Major Effort to Secure the 2024 U.S. Elections
The Cybersecurity and Infrastructure Security Agency (CISA) in the United States has initiated a comprehensive campaign to secure the 2024 elections. This effort involves deploying specialized advisory teams across the nation and coordinating security exercises with federal, state, and…
Protecting Your Digital Identity: The Impact of EUCLEAK on FIDO Devices
A new vulnerability has emerged that poses a significant threat to FIDO devices, particularly those using the Infineon SLE78 security microcontroller. Thomas Roche of Ninja Labs discovered the flaw. This vulnerability, dubbed “EUCLEAK,” has raised concerns among security experts and…
WazirX Hacker Starts Moving Stolen Ether Anonymously Using Tornado Cash
As a result of an attack by an unknown entity, some of the $234 million allegedly stolen from the WazirX exchange in one of India’s worst crypto hacks has already been laundered. This action occurred on the same day…
Sophos X-Ops Uncovers Major Qilin Ransomware Breach Targeting Chrome Browser Credentials
Cybersecurity firm Sophos X-Ops has exposed a significant ransomware breach by the Qilin group, which has introduced a new and highly concerning technique of stealing credentials stored in Google Chrome browsers on compromised systems. Qilin, active since at least…
Transport for London Faces Ongoing Cyber Security Incident, Works to Safeguard Systems and Data
Transport for London (TfL), which oversees much of the public transport network in England’s capital, is dealing with an ongoing “cyber security incident.” The organization confirmed the situation yesterday, stating: “We are currently dealing with an ongoing cyber security…
IT Manager Faces Charges for Locking Computers to Demand Money
A recent case has highlighted that ransomware threats can sometimes come from within an organisation. Daniel Rhyne, a 57-year-old IT administrator from Kansas City, Missouri, has been accused of holding his own company hostage by locking down their systems…
CISO Role Expands as Cybersecurity Becomes Integral to Business Strategy
Over the past decade, the role of Chief Information Security Officers (CISOs) has expanded significantly, reflecting cybersecurity’s growing importance in corporate governance and risk management. Once primarily responsible for managing firewalls and protecting data, CISOs now play a critical role…
MIT Database Lists Hundreds of AI Dangers Impacting Human Lives
Artificial intelligence is present everywhere. If it isn’t powering your online search results, it’s just a click away with your AI-enabled mouse. If it’s not helping you enhance your LinkedIn profile, it’s benefiting you at work. As AIs become…
Citrine Sleet APT Exploits Chrome Zero-Day Vulnerability for Rootkit Infiltration
It is believed that North Korean hackers have been able to use unpatched zero-day in Google Chrome (CVE-2024-7971) to install a rootkit called FudModule after gaining admin privileges by exploiting a kernel vulnerability in Microsoft Windows. An investigation by…
Rise in Ransomware Attacks in Southeast Asia Driven by Rapid Digitalization and Security Gaps
A wave of ransomware attacks across Southeast Asia during the first half of this year marks just the beginning of a larger trend. Companies and government agencies, particularly in countries like Thailand, Japan, South Korea, Singapore, Taiwan, and Indonesia,…
Security Analysts Observe Massive Surge in Telegram App Downloads Following Durov Arrest
The arrest of Telegram creator and CEO Pavel Durov in France is beginning to have an influence on the app’s popularity and position. The founder was arrested last month for allegedly allowing illicit practices to thrive on the social…
Adopting a Connected Mindset: A Strategic Imperative for National Security
In today’s rapidly advancing technological landscape, connectivity goes beyond being just a buzzword—it has become a strategic necessity for both businesses and national defense. As security threats grow more sophisticated, an integrated approach that combines technology, strategic planning, and…
Is Telegram Still a Safe Messaging App? An In-Depth Look
Telegram, a popular messaging app launched in 2013, has earned a reputation for its robust security features. This Dubai-based platform offers end-to-end encryption for video and voice calls and in its optional feature, Secret Chats. This encryption ensures that only…
EU’s Initiative to Define ‘Important Data’ in China: A Step Towards Global Data Governance
The flow of data across borders is often hampered by varying national regulations. One such challenge is China’s restrictive data export laws, which have left many international businesses grappling with compliance. The European Union (EU) is now stepping up efforts…
AI System Optimise Could Help GPs Identify High-Risk Heart Patients
Artificial intelligence (AI) is proving to be a game-changer in healthcare by helping general practitioners (GPs) identify patients who are most at risk of developing conditions that could lead to severe heart problems. Researchers at the University of Leeds…
Automatic Burn-In Technology by Sinon Elevates Windows Deception Hosts
As an open-source, modular tool, Autre enables the automatic burn-in of deception hosts based on Windows system types. By using generative capabilities, this framework intends to reduce the complexity involved in orchestrating deception hosts on a large scale while…
Ransomware Group Brain Cipher Targets French Museums During Olympics
The ransomware group Brain Cipher has claimed responsibility for a cyberattack on several French National Museums that took place during the Olympic Games earlier this month. The attack, which targeted institutions managed by the Réunion des Musées Nationaux –…
Cyberattack on TDSB Exposes Student Data, Sparks Parental Concerns
In June 2024, the Toronto District School Board (TDSB), Canada’s largest school board, suffered a ransomware attack that compromised the personal information of its students. The incident was first disclosed to the public on June 12, when the TDSB…
Top 5 Notable Cyberattacks in Modern Warfare
Warfare is no longer restricted to traditional battlefields; in the digital age, cyberspace has emerged as a new arena of conflict. Nations now engage in cyber battles using lines of code and advanced malware instead of conventional weapons. A…
Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure
Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This malware can steal data and run remote PowerShell commands to further penetrate company networks. A reliable security solution…
U.S. Courts Under Cyberattack and the Impact on Justice
Due to the sophistication of cyber threats, cybercriminals target judicial systems more often, exposing significant vulnerabilities. Numerous attacks disrupt court operations and have broader implications, as they hurt employers who use public records to check their criminal records. Gaining…
Rural Hospitals and Patients Face high Risk from Ransomware Attacks: Report
Ransomware attacks pose a significant threat to hospitals across the United States, but rural hospitals and their patients are particularly vulnerable, according to a new study. The research, led by Hannah Neprash, an associate professor at the University of…
Play Ransomware Claims Attack on US Semiconductor Manufacturer Microchip Technology
The Play ransomware group has claimed responsibility for last week’s cyberattack on the American semiconductor company Microchip Technology. On Tuesday, the group added Microchip Technology to its data leak site, as noted by multiple cybersecurity researchers. Play is notorious…
Fota Wildlife Park Issues Urgent Warning After Website Cyberattack
Fota Wildlife Park in East Cork has issued an urgent warning following a major cyberattack on its website, potentially compromising thousands of customers’ personal and financial details. The park advises those who made transactions on its website between May…
Emailing in Different Languages Just Got Easier— This AI Will Amaze You
Proton, a company known for its commitment to privacy, has announced a paradigm altering update to its AI-powered email assistant, Proton Scribe. The tool, which helps users draft and proofread emails, is now available in eight additional languages: French,…
Three Cyber Extortion Schemes Attackers Can Employ Against You
Cybercriminals appear to have an infinite repertoire of strategies at their disposal when it comes to forcefully extracting financial information from victims. They prefer specific methods over others, and extortion is one of them. Keep in mind that blackmailers…
Esso Corporate Fleet Programme Hit by Ransomware Attack on Abecha Servers
A ransomware attack on Abecha, the company managing Singapore’s Esso Corporate Fleet Discount Programme, may have compromised sensitive credit card information of its customers. Abecha discovered the breach on August 13 and notified affected customers on August 28. According…
Security Alert for Gmail, Facebook, and Amazon Users
The number of hacks that occur on Google, Gmail, and Amazon accounts keeps on rising, causing users to become anxious. By using phishing tactics, hackers are targeting users’ passwords for Gmail, Facebook, and Amazon through phishing campaigns that pose…
New Version of Snake Keylogger Targets Victims Through Phishing Emails
Researchers at Fortinet’s FortiGuard Labs have uncovered a newly evolved variant of the Snake Keylogger, a type of malicious software notorious for capturing and recording everything a user types. Keyloggers are often used by cybercriminals to steal personal information, such…
Introducing the “World’s Most Private VPN” – Now Open for Testers
Virtual Private Network (VPN) is a security tool that encrypts your internet connection and disguises your IP address. This is achieved by rerouting your data through an encrypted tunnel to one of the VPN’s servers. While the technical details…
The Corona Mirai Botnet: Exploiting End-of-Life IP Cameras
A recent report by Akami experts highlights a troubling trend: the exploitation of a five-year-old zero-day vulnerability in end-of-life IP cameras by the Corona Mirai-based malware botnet. This blog delves into the details of this issue, its implications, and the…
AT&T Claims It Has Fixed Software Bug That Caused An Outage For Some Wireless Users
Some AT&T customers experienced a disruption in their wireless service earlier this week, which made it difficult for them to call 911 in an emergency. It was rectified in a few hours, with the company blaming a software fault,…
Massive Data Breach Exposes Sensitive Information Linked to ServiceBridge Platform
A recent data breach involving the ServiceBridge platform, used for field service management, has exposed sensitive data belonging to millions of customers and businesses. Security researcher Jeremiah Fowler discovered that nearly 32 million files were left unprotected and accessible…
Hacker Who Took Down North Korea’s Internet Reveals Key Insight
Alejandro Caceres, known online as P4x, recently revealed himself as the hacker who managed to take down North Korea’s internet for over a week. This feat, conducted entirely from his home in Florida, has drawn significant attention, and Caceres…
Espionage Concerns Arise from Newly Discovered Voldemort Malware
As a result of Proofpoint researchers’ research, in August 2024, they discovered an unusual campaign in which custom malware was being delivered by a novel attack chain. Cybercriminals are believed to have named the malware “Voldemort” based on the…
Three Major Issues Family Offices Face With Private Market Data
Simply accumulating more data in a family office does not directly translate into better decision-making. Without the necessary tools and mechanisms in place to process this information, it might have the opposite effect. It’s no secret that many family…
Choosing the Right Browser: Privacy Tips from Apple and Google
Apple has launched an ad campaign urging over a billion iPhone users to stop using Google Chrome, citing privacy concerns. This campaign has sparked a heated debate between two tech giants, Apple and Google, over the best way to protect…
Project Strawberry: Advancing AI with Q-learning, A* Algorithms, and Dual-Process Theory
Project Strawberry, initially known as Q*, has quickly become a focal point of excitement and discussion within the AI community. The project aims to revolutionize artificial intelligence by enhancing its self-learning and reasoning capabilities, crucial steps toward achieving Artificial General…
Chinese Hackers Exploit Serious Flaw in Versa SD-WAN Systems
A Chinese cyber-espionage group, known as Volt Typhoon, has been exploiting a newly discovered security flaw in Versa Networks’ SD-WAN Director servers. This zero-day vulnerability, identified as CVE-2024-39717, has already been used to infiltrate several organizations. Given the seriousness…
Bling Libra Shifts Focus to Extortion in Cloud-Based Attacks
It was observed during an incident response engagement handled by Unit 42, that the threat actor group Bling Libra (which was responsible for distributing ShinyHunters ransomware) had shifted from extortion to extortion of victims rather than its traditional tactic…
The Dual Nature of Telegram: From Protest Tool to Platform for Criminal Activity
Telegram, a messaging app co-founded by Pavel Durov in 2013, has become one of the world’s largest communication platforms, with over 900 million users. The app’s dual nature has recently put it in the spotlight after Durov was arrested…
Private Data of 950K Users Stolen in BlackSuit Ransomware Attack
On April 10, 2024, a BlackSuit ransomware assault disclosed 954,177 personally identifiable information, forcing Young Consulting to send out data breach notifications. Young Consulting (formerly Connexure) is an Atlanta-based software solutions provider that specialises in the employer stop-loss marketplace.…
Enhancing EU Cybersecurity: Key Takeaways from the NIS2 Directive
The European Union has taken a significant step forward with the introduction of the NIS2 Directive. This directive, which builds upon the original Network and Information Systems (NIS) Directive, aims to bolster cybersecurity across the EU by imposing stricter requirements…
Top Travel Scams to Watch Out For: Protect Your Vacation from Common Fraud Schemes
Travel scams can turn a well-deserved vacation into a stressful ordeal, with numerous ways for scammers to exploit unsuspecting tourists. These scams have been around for years, but advancements in technology have made them more prevalent and sophisticated. According…
Cyberattacks Skyrocket in India, Are We Ready for the Digital Danger Ahead?
India is experiencing a rise in cyberattacks, particularly targeting its key sectors such as finance, government, manufacturing, and healthcare. This increase has prompted the Reserve Bank of India (RBI) to urge banks and financial institutions to strengthen their cybersecurity…
BlackByte Ransomware Outfit is Targeting More Orgs Than Previously Known
Researchers from Cisco have discovered that the BlackByte ransomware group is only disclosing a small portion of its successful attacks on its leak site this year. Talos, the company’s cybersecurity department, believes the gang is creating extortion posts for…
Snowflake Faces Declining Growth Amid Cybersecurity Concerns and AI Expansion
Snowflake Inc. recently faced a challenging earnings period marked by slowing growth and concerns following multiple cyberattacks. Despite being an AI data company with innovative technology, these events have impacted investor confidence, causing the stock price to retest recent…
Sweat Sensors Raise Health Benefits and Privacy Concerns
In Oak Ridge, Tennessee, dozens of workers of the United States Air Force worked with hazardous waste, asbestos, and pipes while being tasked with the task of decontaminating and preparing the defunct nuclear facility for demolition during a hot…
Bitcoin and Nostr: What Lies Beyond Decentralization and Freedom
In today’s digital expanse, in some countries governments and corporations wield immense power, two remarkable projects—Bitcoin and Nostr—have emerged as champions of decentralization. Their stories are quite similiar, revealing their struggle for financial autonomy, censorship resistance, and individual empowerment. Bitcoin:…
Why AI-Driven Cybercrime Could Be Your Business’s Biggest Risk
The way technology keeps shifting its paradigm, the line between genuine interactions and digital deception is becoming increasingly difficult to distinguish. Today’s cybercriminals are leveraging the power of generative artificial intelligence (AI) to create more closely intricate and harder-to-detect…
Ransomware on the Rise: Key Steps to Safeguard Your Business from Cyber Threats
In 2023, ransomware attacks saw a significant increase, jumping by 55% compared to the previous year. The number of reported victims climbed to 5,070. However, this statistic only scratches the surface of the issue. According to Statista, nearly 73%…
Georgia Tech Faces DOJ Lawsuit Over Alleged Lapses in Cybersecurity for Defense Contracts
Researchers at the Georgia Institute of Technology, who have received over $1 billion in Defense Department contracts, are facing scrutiny for allegedly failing to secure their computers and servers, citing that doing so was too “burdensome.” Since 2013, the…
Ukrainian Hackers Launch Coordinated Cyber Offensive on Russian Networks
Ukrainian military intelligence agents operated a mass cyberattack on Russian Internet providers on August 24 that disrupted the online platforms of dozens of industrial facilities in Russia, according to a source with the Kyiv Independent, who was authorized to…
Here’s How to Safeguard Yourself Against Phone Scams
Sophisticated phone scams are becoming more common and more relentless. The numbers are mind-boggling. According to the FTC, impostor fraudsters cost US consumers $2.7 billion in 2023, and the figure is rising year after year. These are merely the…