The Curio decentralized finance (DeFi) initiative encountered a breach, with experts from Cyvers Alerts approximating the incurred losses to be around $16 million. The breach appears to have been orchestrated through an exploitation of vulnerabilities within the permissioned access…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Data Highways: Navigating the Privacy Pitfalls of New Automobiles
There is a possibility that these vehicles may be collecting vast amounts of information about their users that can be accessed by advertisers, data brokers, insurance companies and others, and that information could be shared with several companies including…
Unveiling the New Era of Hacking Ethics: Profit Over Principles
Hacking, once a realm of curiosity-driven exploration, has morphed into a complex ecosystem of profit-driven cybercrime. Originating in the 1960s, hacking was fueled by the insatiable curiosity of a brilliant community known as “hackers.” These early pioneers sought to…
Ransomware Strikes Tarrant Appraisal District
Tarrant Appraisal District (TAD) finds itself grappling with a major setback as its website falls prey to a criminal ransomware attack, resulting in a disruption of its essential services. The attack, which was discovered on Thursday, prompted swift action…
Unmasking Cyber Shadows: New Zealand’s Battle Against State-Backed Hackers
Recently, New Zealand accused China of engaging in “malicious cyber activity” targeting its parliament. This accusation sheds light on the growing tensions between nations and the need to safeguard democratic institutions from cyber espionage. In this blog, we delve into…
Facebook Spied on Users’ Snapchat Traffic in a Covert Operation, Documents Reveal
In 2016, Facebook initiated a secret initiative to intercept and decrypt network traffic between Snapchat users and the company’s servers. According to recently revealed court filings, the purpose was to better analyse user behaviour and help Facebook compete with…
‘Tycoon’ Malware Kit Bypasses Microsoft and Google Multifactor Authentication
An emerging phishing kit called “Tycoon 2FA” is gaining widespread use among threat actors, who are employing it to target Microsoft 365 and Gmail email accounts. This kit, discovered by researchers at Sekoia, has been active since at least…
The Great Data Heist: China’s Alleged Theft of Voter Data and Its Potential Impact
Chinese-backed hackers allegedly targeted U.S. officials, journalists, corporations, pro-democracy activists and the United Kingdom’s electoral watchdog in a comprehensive, state-backed attack on March 25, authorities announced in an announcement on March 25. The attack was aimed at targeting officials,…
Safeguarding the NHS: Protecting Against Potential Cyber Attacks from China
Recent concerns have surfaced regarding the vulnerability of the NHS to cyberattacks, particularly from China. Reports indicate that Beijing-backed actors exploited software flaws to access the personal details of millions of Britons. As experts in cybersecurity, it’s crucial to…
What Are The Risks of Generative AI?
We are all drowning in information in this digital world and the widespread adoption of artificial intelligence (AI) has become increasingly commonplace within various spheres of business. However, this technological evolution has brought about the emergence of generative AI,…
Data Breach at Giant Tiger: Protecting Customer Information in the Digital Age
In an increasingly interconnected world, data breaches have become a recurring nightmare for organizations of all sizes. The recent incident at Giant Tiger Stores Ltd., a popular discount retailer based in Ottawa, serves as a stark reminder of the importance…
Here Are Three Ways AI Will Transform Gaming Forever
Technology has been impacted by artificial intelligence in practically every field. You would struggle to identify a tech-related field where artificial intelligence hasn’t had some sort of impact, from data analysis to art programmes. AI hasn’t advanced as quickly…
Security Failure in Ray Framework Leads to Server Breach
There has been a hacking attack on a widely used open-source AI framework called Ray, which hackers have exploited to gain unauthorized access to servers and hijack their resources, as a result of an unpatched vulnerability. It has been…
Hidden Dangers of Public Wi-Fi: What A Traveler Needs To Know
Public Wi-Fi networks have become ubiquitous in our modern world, offering convenience and connectivity to travellers and commuters alike. However, beneath the surface lies a web of hidden dangers that could compromise your privacy and security. As an expert…
CHR Cautions Bacolod City Regarding QR Code Proposal for Entertainers
The Commission on Human Rights (CHR) has raised concerns over a proposal by the Bacolod city government regarding the inclusion of quick response (QR) codes on health cards issued to employees of entertainment establishments. The aim of this proposal…
Parent Company of Vans Alerts 35.5 Million Customers Following Data Breach
VF Corporation, the parent company of popular brands like Vans and North Face, has confirmed a significant data breach that occurred in December, affecting approximately 35.5 million of its customers. The breach exposed sensitive information including email addresses, names,…
Digital Arrest Scam: Woman Doctor Duped for 40 Lakhs, Loses Her Entire Savings
In today’s digital world, our lives are interconnected through the internet. From shopping on the web and managing finances to connecting with our loved ones, everything is done online these days. But the comfort also comes with some risks. Professor…
Living-Off-the-Land (LOTL) Attacks: Here’s Everything You Need to Know
In the unrelenting fight of cybersecurity, cyberattacks continue to become more elusive and sophisticated. Among these, threat actors who use Living Off the Land (LOTL) strategies have emerged as strong adversaries, exploiting legitimate system features and functionalities to stealthily…
UK Government’s New AI System to Monitor Bank Accounts
The UK’s Department for Work and Pensions (DWP) is gearing up to deploy an advanced AI system aimed at detecting fraud and overpayments in social security benefits. The system will scrutinise millions of bank accounts, including those receiving state…
New Car Owners Beware: Study Finds Serious Data Protection Flaws
Modern gadgets have been collecting every bit of user data they can gather, just to sell it off to the highest bidder, ever since tech companies realized that data could be sold for dollars. While the user’s car has…