Over the past decade, the role of Chief Information Security Officers (CISOs) has expanded significantly, reflecting cybersecurity’s growing importance in corporate governance and risk management. Once primarily responsible for managing firewalls and protecting data, CISOs now play a critical role…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
MIT Database Lists Hundreds of AI Dangers Impacting Human Lives
Artificial intelligence is present everywhere. If it isn’t powering your online search results, it’s just a click away with your AI-enabled mouse. If it’s not helping you enhance your LinkedIn profile, it’s benefiting you at work. As AIs become…
Citrine Sleet APT Exploits Chrome Zero-Day Vulnerability for Rootkit Infiltration
It is believed that North Korean hackers have been able to use unpatched zero-day in Google Chrome (CVE-2024-7971) to install a rootkit called FudModule after gaining admin privileges by exploiting a kernel vulnerability in Microsoft Windows. An investigation by…
Rise in Ransomware Attacks in Southeast Asia Driven by Rapid Digitalization and Security Gaps
A wave of ransomware attacks across Southeast Asia during the first half of this year marks just the beginning of a larger trend. Companies and government agencies, particularly in countries like Thailand, Japan, South Korea, Singapore, Taiwan, and Indonesia,…
Security Analysts Observe Massive Surge in Telegram App Downloads Following Durov Arrest
The arrest of Telegram creator and CEO Pavel Durov in France is beginning to have an influence on the app’s popularity and position. The founder was arrested last month for allegedly allowing illicit practices to thrive on the social…
Adopting a Connected Mindset: A Strategic Imperative for National Security
In today’s rapidly advancing technological landscape, connectivity goes beyond being just a buzzword—it has become a strategic necessity for both businesses and national defense. As security threats grow more sophisticated, an integrated approach that combines technology, strategic planning, and…
Is Telegram Still a Safe Messaging App? An In-Depth Look
Telegram, a popular messaging app launched in 2013, has earned a reputation for its robust security features. This Dubai-based platform offers end-to-end encryption for video and voice calls and in its optional feature, Secret Chats. This encryption ensures that only…
EU’s Initiative to Define ‘Important Data’ in China: A Step Towards Global Data Governance
The flow of data across borders is often hampered by varying national regulations. One such challenge is China’s restrictive data export laws, which have left many international businesses grappling with compliance. The European Union (EU) is now stepping up efforts…
AI System Optimise Could Help GPs Identify High-Risk Heart Patients
Artificial intelligence (AI) is proving to be a game-changer in healthcare by helping general practitioners (GPs) identify patients who are most at risk of developing conditions that could lead to severe heart problems. Researchers at the University of Leeds…
Automatic Burn-In Technology by Sinon Elevates Windows Deception Hosts
As an open-source, modular tool, Autre enables the automatic burn-in of deception hosts based on Windows system types. By using generative capabilities, this framework intends to reduce the complexity involved in orchestrating deception hosts on a large scale while…
Ransomware Group Brain Cipher Targets French Museums During Olympics
The ransomware group Brain Cipher has claimed responsibility for a cyberattack on several French National Museums that took place during the Olympic Games earlier this month. The attack, which targeted institutions managed by the Réunion des Musées Nationaux –…
Cyberattack on TDSB Exposes Student Data, Sparks Parental Concerns
In June 2024, the Toronto District School Board (TDSB), Canada’s largest school board, suffered a ransomware attack that compromised the personal information of its students. The incident was first disclosed to the public on June 12, when the TDSB…
Top 5 Notable Cyberattacks in Modern Warfare
Warfare is no longer restricted to traditional battlefields; in the digital age, cyberspace has emerged as a new arena of conflict. Nations now engage in cyber battles using lines of code and advanced malware instead of conventional weapons. A…
Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure
Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This malware can steal data and run remote PowerShell commands to further penetrate company networks. A reliable security solution…
U.S. Courts Under Cyberattack and the Impact on Justice
Due to the sophistication of cyber threats, cybercriminals target judicial systems more often, exposing significant vulnerabilities. Numerous attacks disrupt court operations and have broader implications, as they hurt employers who use public records to check their criminal records. Gaining…
Rural Hospitals and Patients Face high Risk from Ransomware Attacks: Report
Ransomware attacks pose a significant threat to hospitals across the United States, but rural hospitals and their patients are particularly vulnerable, according to a new study. The research, led by Hannah Neprash, an associate professor at the University of…
Play Ransomware Claims Attack on US Semiconductor Manufacturer Microchip Technology
The Play ransomware group has claimed responsibility for last week’s cyberattack on the American semiconductor company Microchip Technology. On Tuesday, the group added Microchip Technology to its data leak site, as noted by multiple cybersecurity researchers. Play is notorious…
Fota Wildlife Park Issues Urgent Warning After Website Cyberattack
Fota Wildlife Park in East Cork has issued an urgent warning following a major cyberattack on its website, potentially compromising thousands of customers’ personal and financial details. The park advises those who made transactions on its website between May…
Emailing in Different Languages Just Got Easier— This AI Will Amaze You
Proton, a company known for its commitment to privacy, has announced a paradigm altering update to its AI-powered email assistant, Proton Scribe. The tool, which helps users draft and proofread emails, is now available in eight additional languages: French,…
Three Cyber Extortion Schemes Attackers Can Employ Against You
Cybercriminals appear to have an infinite repertoire of strategies at their disposal when it comes to forcefully extracting financial information from victims. They prefer specific methods over others, and extortion is one of them. Keep in mind that blackmailers…