Japanese cybersecurity officials issued a warning that North Korea’s infamous Lazarus Group hacking group recently launched a supply chain attack on the PyPI software repository for Python apps. Threat actors disseminated contaminated packages with names like “pycryptoenv” and “pycryptoconf”…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cybersecurity Teams Tackle AI, Automation, and Cybercrime-as-a-Service Challenges
In the digital society, defenders are grappling with the transformative impact of artificial intelligence (AI), automation, and the rise of Cybercrime-as-a-Service. Recent research commissioned by Darktrace reveals that 89% of global IT security teams believe AI-augmented cyber threats will…
Hyper-Personalization in Retail: Benefits, Challenges, and the Gen-Z Dilemma
Customers often embrace hyper-personalization, which is defined by customized product suggestions and AI-powered support. Marigold, Econsultancy, Rokt, and The Harris Poll polls reveal that a sizable majority of consumers—including 88% of Gen Zers—view personalized services as positive additions to their…
Critical Vulnerabilities in GovQA Platform Expose Sensitive Government Records
In a significant cybersecurity revelation, critical vulnerabilities were discovered in the GovQA platform, a tool extensively used by state and local governments across the U.S. to manage public records requests. Independent researcher Jason Parker uncovered flaws that, if exploited,…
Microsoft Source Code Heist: Russian Hackers Escalate Cyberwarfare
There was an update on the hacking attempts by hackers linked to Russian foreign intelligence on Friday. They used data stolen from corporate emails in January to gain access to Microsoft’s systems again, which were used by the foreign…
Rise in Phishing Attacks Targeting US Schools Raises Concerns
Through a recent report by PIXM, a cybersecurity firm specialising in artificial intelligence solutions, public schools in the United States face a significant increase in sophisticated phishing campaigns. Threat actors are employing targeted spear phishing attacks, utilising stealthy patterns…
OpenAI Bolsters Data Security with Multi-Factor Authentication for ChatGPT
OpenAI has recently rolled out a new security feature aimed at addressing one of the primary concerns surrounding the use of generative AI models such as ChatGPT: data security. In light of the growing importance of safeguarding sensitive information,…
Scaleway Introduces First RISC-V Servers on the Cloud
The world’s first line of RISC-V servers has been introduced by European cloud operator Scaleway, which claims this is a “firm commitment to technological independence” in a market where companies are increasingly vying for control over semiconductor production. The…
UnitedHealth Group Cyberattack Fallout: Government Intervention and Industry Critique
In a recent cybersecurity incident, UnitedHealth Group revealed that its tech unit, Change Healthcare, fell victim to a cyberattack orchestrated by the infamous ransomware gang, Blackcat. The attack, which disrupted healthcare organizations nationwide, targeted electronic pharmacy refills and insurance…
Unveiling the Underbelly of IoT: An In-Depth Analysis of Hacking Risks
In terms of versatility, the Internet of Things (IoT) is a technology that is easily one of the most versatile technologies in the world today. In the era of the internet, the network connection capacity is increasing and the…
Navigating the Delicate Balance: Transparency and Information Security in NATO
In the complex world of international relations and military alliances, NATO (North Atlantic Treaty Organization) is a critical pillar of collective defense. As NATO conducts its largest military exercise since 1988, the Steadfast Defender Exercise, it grapples with a fundamental…
Apple iOS and iPadOS Memory Corruption Vulnerabilities: A Critical Alert
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) raised the alarm by adding two such vulnerabilities in Apple’s iOS and iPad to its Known Exploited Vulnerabilities catalog. These vulnerabilities are actively exploited, posing significant risks to users’ privacy, data, and…
Security Concerns Arise Over Chinese-Manufactured Surveillance Cameras Deployed at Romanian Military Locations
A routine procurement made by the Romanian military on January 16 for surveillance equipment manufactured in China has sparked concerns regarding national security implications. Valued at under $1,000, an employee of the Romanian Defense Ministry purchased an eight-port switch…
Microsoft Claims Russian Hackers are Attempting to Break into Company Networks.
Microsoft warned on Friday that hackers affiliated to Russia’s foreign intelligence were attempting to break into its systems again, using data collected from corporate emails in January to seek new access to the software behemoth whose products are widely…
Technical Glitch Causes Global Disruption for Meta Users
In a recent setback for Meta users, a widespread service outage occurred on March 5th, affecting hundreds of thousands worldwide. Meta’s spokesperson, Andy Stone, attributed the disruption to a “technical issue,” apologising for any inconvenience caused. Shortly after the…
Signal Protocol Links WhatsApp, Messenger in DMA-Compliant Fusion
As part of the launch of the new EU regulations governing the use of digital “gatekeepers,” Meta is ready to answer all of your questions about WhatsApp and Messenger providing end-to-end encryption (E2EE), while also complying with the requirements…
Microsoft Employee Raises Alarms Over Copilot Designer and Urges Government Intervention
Shane Jones, a principal software engineering manager at Microsoft, has sounded the alarm about the safety of Copilot Designer, a generative AI tool introduced by the company in March 2023. His concerns have prompted him to submit a letter…
CSI/NSA Joint Best Practices for Cloud Security
The NSA and CISA have released a set of five cybersecurity bulletins to help make cloud environments safer. These bulletins share important tips for keeping cloud systems secure, which are used a lot by businesses. Cloud services are popular…
TeamCity Software Vulnerability Exploited Globally
Over the past few days a security breach has transpired, hackers are taking advantage of a significant flaw in TeamCity On-Premises software, allowing them to create unauthorised admin accounts. This flaw, known as CVE-2024-27198, has prompted urgent action from…
Former Google Employee Charged with Stealing AI Secrets
A former Google software engineer has been charged with stealing the company’s artificial intelligence trade secrets while surreptitiously working for two Chinese companies, the Justice Department announced Wednesday. Linwei Ding, a Chinese national, was arrested in Newark, California, for…