Singapore is experiencing the dread of scams and cybercrimes in abundance as we speak, with fraudsters relying more on messaging and social media platforms to target unsuspecting victims. As per the recent figures from the Singapore Police Force (SPF),…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Beyond Prioritization: Security Journey for Organizations
Organizations face an overwhelming number of vulnerabilities, and deciding which ones to address first can be a challenge for many. However, it’s essential to recognize that prioritization is merely the beginning of a more comprehensive security journey. The Limitations of…
FBI Director Christopher Wray Highlights Unprecedented Threat Landscape and Importance of Law Enforcement Partnerships
FBI Director Christopher Wray emphasized the unprecedented level of diverse threats facing the nation, describing it as a time when multiple threats are simultaneously elevated, a situation he finds unparalleled in his career. In an exclusive interview during his…
DMM Bitcoin Hack: 500 BTC Transfer Linked to $305 Million Theft Raises New Concerns
A cryptocurrency address linked to the $305 million DMM Bitcoin hack in May has reportedly transferred 500 Bitcoin, valued at approximately $30.4 million. On August 22, PeckShield Alert reported that the suspect address initially split the funds into two…
US Authorities Charge Alleged Key Member of Russian Karakurt Ransomware Outfit
The U.S. Department of Justice (DOJ) released a statement this week charging a member of a Russian cybercrime group with financial fraud, extortion, and money laundering in a U.S. court. The 33-year-old Moscow-based Latvian national Deniss Zolotarjovs was extradited…
Fake macOS Apps Infect Devices, Steal Sensitive Data in the Latest Malware Attack
The latest cyber-attack uncovered by security researchers is an information stealer that targets Apple macOS hosts and gathers a wide array of information to reach sensitive computer data. It underscores how threat actors are increasingly targeting the OS as…
Slack Fixes AI Security Flaw After Expert Warning
Slack, the popular communication platform used by businesses worldwide, has recently taken action to address a potential security flaw related to its AI features. The company has rolled out an update to fix the issue and reassured users that…
Cyber Security: A Rising Threat to Australia’s Renewable Energy Campaign
Australia is striving to become a more energy-efficient nation. The Australian Renewable Energy Agency recently announced a $100 million effort to research and develop solar energy technologies. Further investments in energy storage, pumped hydro, and low-carbon systems may be…
Lessons from the CrowdStrike Falcon Sensor Defect: Enhancing Ransomware Recovery and Business Continuity
In recent times, a significant IT disruption was caused by a defect in a content update for CrowdStrike’s Falcon sensor, affecting approximately 8.5 million PCs across diverse sectors. This issue, which disrupted organizations ranging from small businesses and global…
Everest Gang Poses New Cybersecurity Threat to US Healthcare
According to the Health Sector Cybersecurity Coordination Center, the Everest Ransomware group is a threat profile of the recent ransomware attack that took place at Gramercy Surgery Center in New York. The Everest Ransomware group is behind the recent…
QR Code Phishing: How Cybercriminals Exploit Trust via Quishing
Today, QR codes have become a familiar sight. And why not, it makes our daily tasks easy. From making payments to accessing websites, these square patterns of black and white squares offer convenience and efficiency. However, cybercriminals have found a…
North Korea Exploited Windows Zero-Day Vulnerability to Install Fudmodule
North Korea’s Lazarus hacking group has once again exploited a zero-day vulnerability in Microsoft Windows to deploy malware on targeted devices. On August 13, Microsoft addressed this issue with its monthly Patch Tuesday updates, fixing a flaw in the…
Worried About Cash App Breach? These Three Steps Can Keep Your Financial Data Safe
You’re not alone if the most recent Cash App data hack made you nervous. In 2022, the parent company of Block, the peer-to-peer payment platform, failed to prevent unauthorised access to Cash App customer accounts. Cash App agreed to…
16 Years of Cybercrime: The Story of Greasy Opal’s CAPTCHA Solver
Certain tools and techniques have been persistent, continually adapting to new challenges and threats. One such tool is the CAPTCHA solver developed by Greasy Opal, a name that has become synonymous with cybercrime over the past 16 years. This blog…
New Styx Stealer Malware Targets Browsers and Instant Messaging for Data Theft
A new malware strain known as Styx Stealer has recently emerged, posing a significant threat to online security. Discovered in April 2024, Styx Stealer primarily targets popular browsers based on the Chromium and Gecko engines, such as Chrome and…
Misconfigured Access Controls in NetSuite Stores Cause Major Data Breach
Microsoft’s apps for MacOS have been exploited by hackers recently to expose a critical vulnerability. It is believed that hackers have been exploiting vulnerabilities in popular applications, such as Microsoft Outlook and Teams, to spy on Mac users. In…
Cybercriminals Place 85-Year-Old Woman Under ‘Digital Arrest’ in Hyderabad, Cheat Her of ₹5.9 Crore
Cybercriminals recently targeted an 85-year-old woman from the city, subjecting her to what can be described as a ‘digital arrest’ and extorting a staggering ₹5.9 crore from her. This elaborate scam involved convincing the elderly woman that her Aadhaar…
Oil Giant Halliburton Hit by Cyberattack, Certain Systems Affected
On Friday, oil firm Halliburton revealed further details to regulators regarding a recent attack that forced the shutdown of critical systems. The company told news outlets that it was struck by a cyberattack on Wednesday, which disrupted operations at…
Cyble Research Reveals Near-Daily Surge in Supply Chain Attacks
The prevalence of software supply chain attacks is on the rise, posing significant threats due to the extensive impact and severity of such incidents, according to threat intelligence researchers at Cyble. Within a six-month span from February to mid-August,…
Unicoin’s Four-Day Cyberattack: Disruption, Recovery, and Ongoing Investigation
Unicoin, a leading cryptocurrency company, experienced a cyberattack beginning on August 9, 2024, which severely disrupted its operations for nearly four days. The breach occurred when a hacker gained unauthorised access to the company’s Google G-Suite account, affecting all…
Iranian Threat Actor TA453 Targets Jewish Figure with Fake Podcast Invite in Malicious Campaign
A recent cyber campaign by the Iranian threat actor TA453 has drawn significant attention following their targeting of a prominent Jewish religious figure with a fake podcast interview invitation. The campaign, which began in July 2024, involved a series…
Massive Data Breach Worsens as New Details Emerge Across US, UK, and Canada
Several days ago, the company whose data breach could have potentially exposed all Americans’ Social Security numbers to identity thieves confirmed that they were victims of a data breach, stressing that they obtained even more sensitive data than previously…
Protecting Your Wallet: Understanding NGate Android Malware
A new and sophisticated malware has emerged, targeting the increasingly popular Near Field Communication (NFC) payment systems. Known as NGate, this Android malware has been discovered by ESET Research and poses a significant risk to users’ financial security. This blog…
Florida Medical Lab Data Breach Exposes 300,000 Individuals’ Sensitive Information
Florida-based medical laboratory, American Clinical Solutions (ACS), recently experienced a significant data breach that exposed the sensitive information of approximately 300,000 individuals. The hacking incident, attributed to the criminal group RansomHub, resulted in the theft of 700 gigabytes of…
AI Revolutionizing Accounting: Experts Urge Accountants to Embrace Technology for Future Success
Artificial Intelligence (AI) is capable of handling repetitive tasks, but accountants who embrace and integrate technology can concentrate on more valuable activities beyond basic number-crunching, according to Md Sajid Khan, Director – India at the Association of Certified…
Google Assures Privacy with Gemini AI: No Data Sharing with Third Parties
Google recently announced bringing into view its Gemini AI technology, beginning with the latest Pixel 9 devices. As part of this consequential development, Google has reassured users about the strong privacy and security measures surrounding their personal data, addressing growing…
Ransomware Actors Extorted More Than $450 Million in First Half of 2024
In the first half of 2024, victims of ransomware have paid $459,800,000 to attackers; if ransom payments continue at this pace, this year might establish a new record. Ransomware payments hit a historic high of $1.1 billion last year,…
Mac Users Targeted by Hackers Through Microsoft App Security Flaw
During the past couple of weeks, Cisco Talos, one of the world’s most respected cybersecurity companies known for its cutting-edge cybersecurity products, has discovered at least eight security vulnerabilities. As a result of these bugs, researchers have found that…
When Cybersecurity Fails: The Impact of the Microchip Technology Hack
In an era where digital transformation is at the forefront of every industry, cybersecurity remains a critical concern. The recent cyberattack on Microchip Technology, a leading provider of microcontrollers and analog semiconductors, underscores the vulnerabilities that even the most advanced…
Hackers Spread Disinformation to undermine Taiwan’s Military
Foreign hackers are increasingly targeting Taiwan by hijacking social media accounts to spread disinformation aimed at undermining the country’s military, according to a statement released by the Ministry of Justice Investigation Bureau (MJIB) yesterday. The hackers, believed to be…
Lawsuits Pile Up Against Florida-Based Data Firm After Security Breach
Given all of the major news events that have dominated headlines this summer, you’d be forgiven for missing yet another: reports that a massive data breach may have disclosed billions of details, including names, social security numbers, and addresses. …
How AI and Machine Learning Are Revolutionizing Cybersecurity
The landscape of cybersecurity has drastically evolved over the past decade, driven by increasingly sophisticated and costly cyberattacks. As more businesses shift online, they face growing threats, creating a higher demand for innovative cybersecurity solutions. The rise of AI…
Critical LiteSpeed Cache Plugin Flaw CVE-2024-28000 Sparks a Surge in Cyberattacks
According to cyber security researchers, there is a critical security flaw in the LiteSpeed Cache plugin for WordPress that users can exploit without authentication to gain administrative privileges on the site. It is an all-in-one site acceleration plugin that…
Costa Rican Authorities Issue Warning as Social Media Identity Theft Cases Double
With the rapid evolution of technology, there has been a concerning rise in cybercrime, particularly in the realm of identity theft on social media platforms. The Cybercrime Unit of the Public Prosecutor’s Office has observed a significant surge in…
Navigating Without GPS: Quantum Breakthroughs and Their Impact
From everyday smartphone users to military operations, GPS plays a crucial role in determining precise locations. However, the dependency on GPS comes with its own set of vulnerabilities, including signal disruptions and potential spoofing. Enter the groundbreaking research from Sandia…
Fintechs Encouraged to Join National Cyber Fraud Reporting System
The Fintech Association of India (FACE) has urged its members to register on the Citizen Financial Cyber Fraud Reporting and Management System (CFCFRMS). This platform, part of the broader National Cybercrime Reporting Portal, facilitates the reporting and management of financial…
Flight Aware User Data Leaked Following Misconfiguration
FlightAware, a flight tracking company, urges some customers to change their account login passwords after a data breach may have compromised private data. This Houston-based technology company provides aircraft tracking data in both real time and historical format. Furthermore,…
Chemical Giant Orion Loses $60 Million in Email Scam
Luxembourg-based Orion S.A., a leading supplier of carbon black, has been defrauded of a staggering $60 million. The company alerted the US Securities and Exchange Commission (SEC) on August 10th through an official filing (Form 8-K). The filing reveals…
T-Mobile Customers Alarmed by Unfamiliar Support Links, But They Are Legitimate
T-Mobile customers have recently raised concerns after receiving unusual-looking links from the company’s support channels, leading to fears of potential phishing scams. However, investigations have confirmed that these links are legitimate, though their appearance and unfamiliar origin have caused…
Bangladeshi SIM Box Fraud Uncovered in Major Odisha Operation
According to the Bhubaneswar-Cuttack Police Commissionerate, there is an enormous amount of SIMbox crime going on in the Laxmisagar area of the city. During the period of about 5 to 6 months, this racket has been active, illegally intercepting…
Critical Jenkins RCE Vulnerability: A New Target for Ransomware Attacks
Recently, the CISA (Cybersecurity and Infrastructure Security Agency) warned about a critical remote code execution (RCE) vulnerability in Jenkins, a widely used open-source automation server. This vulnerability, CVE-2024-23897, has been actively exploited in ransomware attacks, posing a significant risk to…
AI-Enhanced Crypto Scams: A New Challenge for ASIC
The Australian Securities and Investments Commission (ASIC) has been at the forefront of combating crypto scams, working tirelessly to protect consumers from fraudulent schemes. Despite a reported decline in the number of scams since April, ASIC continues to emphasize the…
Lessons for Banks from the Recent CrowdStrike Outage
The recent disruption caused by CrowdStrike has been a wake-up call for financial institutions, highlighting that no cybersecurity system is entirely foolproof. However, this realisation doesn’t lessen the need for rigorous preparation against potential cyber threats. What Happened with…
New Report Reveals Rising Attacks on macOS Systems
A new report published by Intel471 reveals that macOS is increasingly being targeted by threats developing malware specific to the operating system or using cross-platform languages to achieve their goals on macOS computers through malware being developed for Mac…
Here’s Why Ransomware Actors Have a Upper Hand Against Organisations
Successful ransomware assaults are increasing, not necessarily because the attacks are more sophisticated in design, but because attackers have found that many of the world’s largest companies lack adequate resilience to basic safety measures. Despite huge efforts in cybersecurity…
Timeline of the Ransomware Attack on Change Healthcare: How It Unfolded
Earlier this year, a ransomware attack targeted Change Healthcare, a health tech company owned by UnitedHealth, marking one of the most significant breaches of U.S. health and medical data in history. Months after the breach occurred in February, a…
RansomHub Deploys EDRKillShifter Malware to Disable Endpoint Detection Using BYOVD Attacks
Sophos security researchers have identified a new malware, dubbed EDRKillShifter, used by the RansomHub ransomware group to disable Endpoint Detection and Response (EDR) systems in attacks leveraging Bring Your Own Vulnerable Driver (BYOVD) techniques. This method involves deploying a…
Here’s What Businesses Can Learn From a $2 Million Ransomware Attack SEC Settlement
Business leaders and security teams can learn a lot from the recent $2.1 million settlement reached between the Securities and Exchange Commission and R.R. Donnelly & Sons Co. regarding a ransomware assault. The settlement brought RRD’s negligence to light…
Zero-Trust Security: The Critical Role of Trust And Human Integrity
Zero-trust security, a framework built on the principle of “never trust, always verify,” has transformed how organisations protect their data. However, as vital as the technical safeguards in this system are, there’s an often-overlooked aspect: the human element. The…
The Rise of Manual Techniques in Ransomware Attacks: A Growing Threat
A recent report by CrowdStrike observes on a disturbing trend: the increasing use of manual techniques in ransomware attacks. This shift towards hands-on-keyboard activities is not only making these attacks more sophisticated but also more challenging to detect and mitigate. The…
Massive Data Breach Exposes Social Security Numbers of 2.9 Billion People
A significant data breach has reportedly compromised the personal information of 2.9 billion people, potentially affecting the majority of Americans. A hacking group known as USDoD claims to have stolen this data, which includes highly sensitive information such as…
Major Data Breach at FlightAware Exposes Pilots and Users’ Information
A popular flight tracking website accidentally exposed names, addresses, aircraft owned, pilot status, and tracked flights, as well as user data. There was a surprise in the inbox of many users of FlightAware, a popular flight tracking application, on…
The Rise of Malvertising: How Scammers Target Google Products with Malicious Search Ads
Cybersecurity keeps evolving, and so do threats. One such threat is malvertising, it exploits the tools made for enhancing our digital threats. A recent campaign has surfaced, targeting Google products through malicious search ads, displaying the persistence and sophistication of…
Russian Disinformation Network Struggles to Survive Crackdown
The Russian disinformation network, known as Doppelgänger, is facing difficulties as it attempts to secure its operations in response to increased efforts to shut it down. According to a recent report by the Bavarian State Office for the Protection…
Pro-Palestine Outfit Takes Responsibility for Hacking Donald Trump-Elon Musk Interview
During a conversation between billionaire Elon Musk and Republican presidential candidate Donald Trump on Musk’s social media platform X, technical issues occurred that Musk claimed were caused by a DDoS attack. The discussion was significant since it was Trump’s…
Ransomware Attack on the Washington Times Leads to a Dark Web Data Auction
In a countdown clock that showed that the auction would begin in seven days, the Rhysida cartel promoted an online auction that promised to sell Washington Times’ unique data. The auction was set to start within seven days of…
Navigating AI and GenAI: Balancing Opportunities, Risks, and Organizational Readiness
The rapid integration of AI and GenAI technologies within organizations has created a complex landscape, filled with both promising opportunities and significant challenges. While the potential benefits of these technologies are evident, many companies find themselves struggling with AI…
National Public Data Breach Exposes Millions: Threat of Identity Theft Looms
Data breaches continue to be a persistent issue without a simple solution, as evidenced by the recent breach of the background-check service National Public Data. This incident highlights the escalating dangers and complexity of such breaches. After months of…
Cyber Attack Disrupts Housing Services Across Greater Manchester
A scathing cyber attack has disrupted housing services in three Greater Manchester boroughs, leaving thousands of residents at risk of a phishing scam. The breach, which affected the software company Locata, has caused the temporary closure of housing websites for…
Should Americans Share The Social Security Number? Experts Explain the Pros and Cons
The initial Social Security numbers were most likely issued in late 1936, and they were intended to be used solely by the US federal government to manage retirement and disability insurance payouts. However, in the 1960s, the use of…
The Hidden Threat: Vulnerable App on Google Pixel Devices Puts Millions at Risk
A flaw was discovered in Google Pixel devices, raising concerns among users and experts alike. This blog delves into the details of this vulnerability, its implications, and the steps being taken to mitigate the risk. The Discovery A pre-installed app…
Paris 2024 Olympics Faced Over 140 Cyberattacks, No Disruptions Reported
During the Paris 2024 Olympics, French authorities reported over 140 cyberattacks, but none of these incidents disrupted the sporting events. The French government’s cybersecurity agency, Anssi, maintained a high state of alert throughout the games, anticipating potential threats to…
Vendor Reliance and M&A Surge Contribute to Heightened Ransomware Threat
In 2024, threat actors are likely to evolve tactics to exploit the consolidation of businesses and technologies. The mid-year 2024 cyber risk report released by Resilience Group indicates that mergers and acquisitions (M&As) are becoming more popular as well…
Critical Security Flaw Discovered in Ivanti Virtual Traffic Manager
Ivanti, a leading company in network and security solutions, has issued urgent security updates to address a critical vulnerability in its Virtual Traffic Manager (vTM). The flaw, identified as CVE-2024-7593, carries an alarming severity with a CVSS score of…
Ukraine Faces New Phishing Campaign Targeting Government Computers, Warns CERT
The CERT-UA (Computer Emergency Response Team of Ukraine) has issued a warning about a sophisticated phishing campaign targeting Ukrainian government computers. This campaign, which began in July 2024, has already compromised over 100 government systems, posing a significant threat to…
Massive Data Leak Exposes Sensitive Information for Millions
A significant data breach has compromised the personal information of millions of individuals across the United States, United Kingdom, and Canada. The leaked data, obtained from a company called National Public Data, includes highly sensitive information such as names,…
X Confronts EU Legal Action Over Alleged AI Privacy Missteps
X, the artificial intelligence technology company of Elon Musk, has reportedly been accused of unlawfully feeding personal information about its users to its artificial intelligence technology without their consent according to a privacy campaign group based in Vienna. This…
This Security Researcher Infiltrated the LockBit Ransomware Outfit and Exposed its Leader
As part of a larger plan to gather intelligence and stop cybercrime from within, security researchers are actively pursuing and even infiltrating the groups that commit cybercrimes. To win the trust of cybercriminals, they frequently adopt a James Bond…
New Windows Vulnerability CVE-2024-6768 Triggers Blue Screen of Death on All Versions of Windows 10 and 11
A recently uncovered Windows vulnerability, known as CVE-2024-6768, has raised alarm among cybersecurity experts due to its potential to cause widespread disruption by triggering the dreaded blue screen of death (BSOD) on a range of Windows operating systems. Discovered…
Here’s How Users Can Safeguard Themselves From E-Challan Scams
In light of the growing prevalence of e-challan scams, the Indian Computer Emergency Response Team (CERT-In) has released some crucial advice to prevent individuals from becoming victims and suffering financial loss. Nearly 4400 devices have been infected with malware,…
North Miami Mayor’s Gmail Hacked; Ransomware Attack Disrupts City Services
North Miami residents are on edge after Mayor Alix Desulme disclosed that his personal Gmail account was hacked in a ransomware attack. This cyberattack has severely disrupted city operations, leaving many services unavailable online. While City Hall has reopened, residents…
FBI and Allies Dismantle Dispossessor Ransomware Network
The FBI announced on Monday that it has taken down the servers and websites used by the Radar/Dispossessor ransomware group. This action was part of a global investigation involving the U.K.’s National Crime Agency, the Bamberg Public Prosecutor’s Office,…
Microsoft Patches Critical SmartScreen Vulnerability Exploited by Attackers
Microsoft’s SmartScreen feature, a cornerstone of Windows security, faced a significant setback when a critical vulnerability, CVE-2024-38213, was exploited by cybercriminals. This vulnerability allowed attackers to circumvent SmartScreen’s protective mechanisms and deliver malicious code to unsuspecting users. The vulnerability…
When Data Security Fails: The National Public Data Breach Explained
Recent events have highlighted the vulnerabilities that still exist in our digital infrastructure. One such incident is the data breach involving National Public Data (NPD), a background check company. This breach, initially revealed in a class-action lawsuit, has now escalated,…
Comprehensive Hacker Toolkit Uncovered: A Deep Dive into Advanced Cyberattack Tools
Cybersecurity researchers have recently uncovered a vast and sophisticated hacker toolkit that provides a comprehensive suite of tools for executing and maintaining cyberattacks. Found in an open directory in December 2023, the discovery offers a rare glimpse into the…
Hackers Exploit Dark Skippy Attacks to Steal Secret Keys from Secure Devices
An element of the Dark Skippy attack involves the subtle manipulation of nonces during the signature creation process to create the signature. To obtain the private key of a cryptocurrency wallet, attackers craft carefully crafted nonces, thereby gaining full…
CrowdStrike’s Recovery Efforts in Focus After Global IT Outage
On July 19, cybersecurity leader CrowdStrike found itself at the centre of a crisis after a faulty software update caused a widespread IT outage, affecting millions of computers worldwide. The aftermath of this incident was evident at the Black…
Xapo Bank Aims To Boost Bitcoin Safety With Tech And Bunkers
Satoshi Nakamoto, the pseudonymous developer of Bitcoin, published the system’s whitepaper in 2008, bluntly criticising financial institutions and the confidence they demand. However, in 2010, one of the most notable Bitcoin collaborators in its early days and the recipient…
GPS Spoofing Incidents Spike 400%: Here’s What You Should Know
Global Positioning System (GPS) technology has become an integral part of our daily lives, from smartphone navigation apps to precision agriculture and aviation. However, recent incidents have highlighted a growing threat: GPS spoofing. In this blog, we delve into GPS…
Dark Web Revealed: The Hidden Internet’s Role in Cybercrime and Digital Privacy
The dark web, often shrouded in mystery and fear, is portrayed as a breeding ground for illicit activities and cybercrime. While this image is not entirely unfounded, the dark web’s origins and uses are more nuanced, with surprising ties…
Cloud Security Report Highlights Misconfiguration and IAM as Top Threats
Traditional cloud security issues once associated with service providers are declining in significance, as per the Cloud Security Alliance’s 2024 Top Threats report, However, new challenges persist. Misconfigurations, weak identity and access management (IAM), and insecure application programming interfaces (APIs)…
2.7 Billion Data Records Leaked Including Social Security Numbers
There has been news about a prominent hacking group that claimed a large amount of sensitive personal information was allegedly stolen from a major data broker about four months ago, but a member of that group has reportedly released…
Ewon Cosy+ Industrial Devices Vulnerable to Serious Security Exploits
Recently, severe security flaws were identified in the Ewon Cosy+ industrial remote access devices, which could allow attackers to gain complete control over the systems. This vulnerability presents a serious risk, as it could lead to unauthorised access, allowing…
Rhysida Ransomware Takes Responsibility for Bayhealth Hospital Breach
The Rhysida Ransomware outfit claims to have infiltrated Bayhealth Hospital in Delaware and is offering the allegedly stolen data for 25 BTC. Bayhealth Hospital is a technologically equipped not-for-profit healthcare facility with around 4,000 employees and a medical team…
Massive Data Breach in Columbus Over 3TB Files Leaked by Rhysida Ransomware Group
Columbus is grappling with the fallout from a significant data breach, as the Rhysida ransomware group has begun leaking over three terabytes of stolen data on the dark web. The breach, which targeted the city’s employees, comes after two…
Urgent Call for EPA Cyber Strategy to Safeguard Water Infrastructure
A new watchdog report published by the US government’s Environmental Protection Agency says the EPA must develop a comprehensive plan of action to counter the increasing number and sophistication of cybersecurity threats facing the utilities. In the last few…
Italy Demands Cybersecurity Safeguards from Dongfeng for New Auto Plant Investment
Italy is demanding that Dongfeng Motor Group Co., a prominent Chinese automaker, agree to stringent cybersecurity and data protection measures as a condition for supporting the establishment of a new plant in the country. According to sources familiar with…
The UK Erupts in Riots as Big Tech Stays Silent
For the past week, England and parts of Northern Ireland have been gripped by unrest, with communities experiencing heightened tensions and an extensive police presence. Social media platforms have played an unjust role in spreading information, some of it…
India’s Largest Crypto Theft: INR 2,000 Crore Stolen from WazirX Exchange Wallet
In a shocking incident that marks India’s largest crypto theft to date, nearly ₹2,000 crore (approximately $230 million) worth of cryptocurrencies were stolen from a wallet associated with the WazirX exchange last month. This massive theft has resulted in…
18-Year-Old Vulnerability in Firefox and Chrome Actively Exploited in Cyber Attacks
A security vulnerability, identified 18 years ago and known as “0.0.0.0 Day,” has been discovered to allow malicious websites to bypass security measures in Google Chrome, Mozilla Firefox, and Apple Safari. This vulnerability enables these websites to interact with…
Researchers Demonstrate How Attackers Can Exploit Microsoft Copilot
Security researcher Michael Bargury revealed serious flaws in Microsoft Copilot during the recent Black Hat USA conference, demonstrating how hackers might be able to use this AI-powered tool for malicious purposes. This revelation highlights the urgent need for organisations…
Researcher Saves Six Companies from Ransomware by Exploiting Security Flaws in Ransomware Gangs’ Infrastructure
A security researcher has revealed that six companies were saved from potentially paying significant ransom demands due to security flaws found in the web infrastructure of the ransomware gangs targeting them. In a rare win for the victim organizations,…
AI and the Legal Framework: A Critical Turning Point
It is no secret that the rapid advancement of generative artificial intelligence (AI) is transforming several industries – including the legal sector. Using AI, lawyers and legal departments can be able to handle all sorts of tasks from standard…
Experts Find Sinkclose Bug in Millions of AMD Processors, Hard to Patch
A recently found major security flaw called ‘Sinkclose’ impacts virtually all of the AMD’s processors released since 2006. The vulnerability allows threat actors to deeply infiltrate into a system, making it difficult to identify and eliminate the malicious software. According…
DevSecOps Teams Face Regular Outages, Cyberattacks, and Data Breaches
The past year has seen a sharp rise in cyber attacks targeting popular DevOps platforms like GitHub, Bitbucket, GitLab, and Jira. These platforms, which are crucial for developers and IT operations teams, have faced growing threats that disrupt their services…
‘0.0.0.0 Day’ Vulnerability Puts Chrome, Firefox, Mozilla Browsers at Risk
A critical security bug known as “0.0.0.0 Day” has shook the cybersecurity world, leaving millions of users of popular browsers such as Chrome, Firefox, and Safari vulnerable to future assaults. This vulnerability allows malicious actors to possibly gain access…
CrowdStrike Explains Root Cause of Globat IT Outage
In July 2023, we witnessed a large-scale global breakdown impacting over 8.5 million Microsoft users. The reason? A software update that turned into chaos. Leading cybersecurity company CrowdStrike recently published its root cause analysis, providing insights on the incident. Let’s…
BlackSuit Ransomware: A New Threat on the Rise
The FBI and CISA have alerted organizations about a new ransomware strain known as BlackSuit. This malware is an advanced version of the Royal ransomware, which caused significant disruptions between September 2022 and June 2023. Since becoming active in…
National Public Data Hacked: Personal Information of Millions at Risk
National Public Data, a company specializing in background checks and fraud prevention, has experienced a significant data breach. The data collected by the company has reportedly fallen into the hands of a hacking group known as “USDoD,” which began…
Exposing the Business of Doxing and Its Perils
Doxing, a once obscure practice of publishing someone’s private information online without their consent, has evolved into a dangerous and profitable underground industry. The dark world of doxing has grown increasingly sophisticated, with malicious actors exploiting the vast amounts…