Since 2019, surveillance equipment deployed by a Yemeni Shia Islamist organization’s partners has been used to target troops throughout the Middle East, according to a new study. Surveillanceware Targeting Middle Eastern Militaries A Houthi-aligned threat actor utilized GuardZoo malware to…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
The Impact of AI on Society and Science
Nowadays, everyone is talking about artificial intelligence (AI). Governments view AI as both an opportunity and a challenge. Industries are excited about AI’s potential to boost productivity, while academia is actively incorporating AI into teaching and research. However, the…
England Fans Warned Over ‘Quishing’ Scam Ahed of Euro Final
England football fans have been urged to be wary of a ‘quishing’ scam as they gather in pubs to watch the Euro 2024 final against Spain. The duping phenomenon has the potential to be devastating for victims, and it…
Poland Pushes for Shorter Drug Data Protection in EU
At a recent EU meeting in Luxembourg, Poland supported a European Commission proposal to shorten the time new drugs are protected by data exclusivity rules. Health Minister Izabela Leszczyna said Poland prefers one year of market protection over longer…
Singapore Banks Phasing Out OTPs in Favor of Digital Tokens
It has been around two decades since Singapore started issuing one-time passwords (OTPs) to users to aid them in logging into bank accounts. However, the city-state is planning to ditch this method of authentication shortly. Over the next three…
Chinese APT40 Can Exploit Flaws Within Hours of Public Release
A joint government advisory claims that APT40, a Chinese state-sponsored actor, is focusing on recently discovered software vulnerabilities in an attempt to exploit them in a matter of hours. The advisory, authored by the Cybersecurity and Infrastructure Security Agency,…
Decrypting DoNex: The Flaw That Brought Down a Ransomware Empire
DoNex Ransomware Encryption: Flaw in Cryptographic Schema Experts uncovered a critical flaw in the encryption schema of the DoNex ransomware, including all variations and predecessors. Since March 2024, they’ve worked with law enforcement to give a decryptor to affected DoNex…
Significant Drop in Cyber-Insurance Premiums Makes Coverage More Affordable
Over the last year, a steady decline in premium rates has made cyber-insurance coverage more accessible and affordable for organizations of all sizes. The primary driver behind this decrease is the increasingly competitive marketplace, with more insurance companies offering…
Lessons from the Ivanti VPN Cyberattack: Security Breaches and Mitigation Strategies
The recent cyberattack on Ivanti’s VPN software has prompted swift action from the Cybersecurity and Infrastructure Security Agency (CISA). This incident not only highlights the need for stronger cybersecurity measures but also raises important questions about exploit techniques, organizational…
Microsoft’s Breach Notification Emails Wind Up in Spam Folder
Midnight Blizzard, a Russian nation-state hacker gang, breached Microsoft’s security last year, gaining access to the emails of multiple customers. In late June, Microsoft revealed that more organisations were affected than previously assumed. However, the company’s attempts to notify…
Ransomware Attack on Patelco Credit Union Disrupts Services for Nearly Half a Million Members
A ransomware attack on Bay-area Patelco Credit Union has disrupted banking services for nearly half a million members, and the outage could persist for weeks. The credit union announced the attack on June 29 via Twitter. The affected services…
Yemeni Hackers Unmasked Spying on Middle Eastern Military Phones
According to researchers at MIT, a Yemeni hacking group has been eavesdropping on the phone calls of military personnel in the Middle East, the latest example of mobile surveillance becoming prevalent in conflicts around the world as a result…
Investing in AI? Don’t Forget the Cyber Locks! VCs Advice.
The OpenAI Data Breach: A Wake-Up Call for Seed VCs Security breaches are common in the current industry of artificial intelligence (AI) and machine learning (ML). However, when a prominent player like OpenAI falls victim to such an incident, it…
Major Security Flaw in WhatsApp and Signal MacOS Apps Puts User Data at Risk
A significant security warning has emerged for WhatsApp and Signal users this week, urging them to consider deleting their apps, particularly on MacOS. The issue, primarily affecting Apple users leveraging multi-device functionality, highlights severe vulnerabilities in the MacOS versions…
Ransomware Group Uses Harassment Tactics to Secure Payments
A newly identified ransomware group named Volcano Demon is using aggressive tactics to compel victims to pay ransoms. Halycon, an anti-ransomware firm, recently reported that this group has targeted several organisations in the past weeks with a new encryption…
Cybersecurity Expert Warns NHS Still Vulnerable After Major Ransomware Attack
A leading cybersecurity expert has warned that the NHS remains at risk of further cyber-attacks unless it updates its computer systems. This stark warning follows a significant ransomware attack that severely disrupted healthcare services across London. Prof Ciaran Martin,…
A Surge in Advanced Fraud Techniques is Eroding Business Trust
Fraudsters seem to be perpetually ahead of the curve. Early in 2022, research indicated that one in four online accounts was fraudulent, a figure that has only escalated since. In the auto lending sector alone, losses amounted to $7.9…
Mobile Encryption Innovation Aids Criminals, Europol Reports
Europol has proposed solutions to address some of the challenges posed by privacy-enhancing technologies found in Home Routing, which pose a challenge for law enforcement agencies in intercepting communications during criminal investigations as a result of these technologies. There…
Chinese APT40 Attackers Exploit SOHO Routers to Launch Attacks
Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the United Kingdom, and the United States have issued a joint advisory about APT40, a China-linked cyber espionage group, warning regarding its ability to co-opt exploits for newly…
Quantum Key Distribution Achieves Breakthrough with Semiconductor Quantum Dots
In the face of emerging quantum computing threats, traditional encryption methods are becoming increasingly vulnerable. This has spurred the development of quantum key distribution (QKD), a technology that uses the principles of quantum mechanics to secure data transmission. While…