A major scandal has emerged in South Korea, where the internet service provider KT is accused of intentionally installing malware on the computers of 600,000 subscribers. This invasive action was reportedly designed to interfere with and block torrent traffic,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Kadokawa Group Hit by Major Ransomware Attack
Kadokawa Group, the parent company of renowned game developer FromSoftware, has fallen victim to a gruesome ransomware attack. The Japanese conglomerate, known for its diverse involvement in book publishing, the video-sharing service Niconico, and various other media enterprises, revealed…
Pipeline Hijacking: GitLab’s Security Wake-Up Call
A major vulnerability exists in some versions of GitLab Community and Enterprise Edition products, which might be exploited to run pipelines as any user. GitLab is a prominent web-based open-source software project management and task tracking tool. There are an…
Phishing And The Threats of QR Codes
Cybercriminals have always been adept at abusing the latest technological developments in their attacks, and weaponizing QR codes is one of their most recent strategies. QR codes have grown in popularity as a method for digital information sharing due…
Kimsuky Unleashes TRANSLATEXT Malware on South Korean Academic Institutions
An investigation has found that a North Korea-linked threat actor, known as Kimsuky, has been involved in the use of a malicious Google Chrome extension to steal sensitive information to collect information as part of an ongoing intelligence collection…
TeamViewer’s Corporate Network Compromised in Suspected APT Hack
iTeamViewer, a remote access software company, has announced that its corporate environment was compromised in a cyberattack. According to the company, the breach was detected on Wednesday, June 26, 2024, and is believed to have been carried out by…
37signals Boosts Profits by Over $1 Million by Exiting Cloud Computing
This year, software company 37signals has made headlines with its decision to leave cloud computing, resulting in a significant profit boost of over $1 million (£790,000). This move highlights a growing trend among businesses reassessing the value of cloud…
Why You Should Mask Your Email Address
In today’s digital age, entering your real email address into a website is a risky move. It’s all too common for websites to sell your information to data brokers, who then use it for marketing, targeted ads, or even…
Apology Accepted: Ken Griffin’s Tax Records and the IRS
A Case of Privacy Breach and Unintended Disclosure In an unprecedented turn of events, the Internal Revenue Service (IRS) recently issued a public apology to billionaire investor Ken Griffin. The reason? Leaked tax records that exposed sensitive financial information, including…
AI-Generated Exam Answers Outperform Real Students, Study Finds
In a recent study, university exams taken by fictitious students using artificial intelligence (AI) outperformed those by real students and often went undetected by examiners. Researchers at the University of Reading created 33 fake students and employed the AI…
Hyperscaling and On-Chain Confidentiality: The Cornerstones of Web3’s Future
The future of Web3 is being significantly shaped by two critical advancements: hyperscaling and on-chain confidentiality. As blockchain technology continues to evolve, these innovations are poised to address some of the fundamental challenges faced by decentralized systems, paving the…
China’s Backdoor Data Infiltration: A Growing Concern For Indian Government
Indian security agencies are concerned about a potential huge data breach triggered by Chinese microchips and hardware detected in biometric attendance systems (BAS) deployed in central and state government buildings, including sensitive departments. During their investigations, intelligence agencies discovered…
AI Accelerates Healthcare’s Digital Transformation
Throughout the healthcare industry, CIOs are implementing technologies that allow precision diagnostics, reduce clinician workload, and automate back-office functions, from ambient documentation to machine learning-based scheduling. A lot of data is available in Penn Medicine BioBank, an institution run…
Hacker Claims Data Breach of India’s Blue-Collar Worker Database
A hacker claims to have accessed a large database linked with the Indian government’s portal for blue-collar workers emigrating from the country. The eMigrate portal’s database allegedly includes full names, contact numbers, email addresses, dates of birth, mailing addresses,…
Jack Dorsey Warns: The Blurring Line Between Real and Fake
Tech billionaire Jack Dorsey, best known as the founder of Twitter (now X), has issued a stark warning about the future. He predicts that in the next five to ten years, it will become increasingly difficult for people to…
The Role of Immutable Data Storage in Strengthening Cybersecurity
In today’s rapidly advancing digital world, how organisations store their data is crucial to their cybersecurity strategies. Whether protecting sensitive customer information, securing intellectual property, or ensuring smooth business operations, effective data storage methods can prominently impact an organisation’s…
Fresh MOVEit Vulnerability Under Active Exploitation: Urgent Updates Needed
A newly discovered vulnerability in MOVEit, a popular file transfer tool, is currently under active exploitation, posing serious threats to remote workforces. Cybercriminals are taking advantage of this flaw to gain unauthorized access to sensitive data. This exploitation highlights…
Hackers Slip Backdoor into WordPress Plugins in Latest Supply-Chain Attack
Security researchers announced on Monday that there had been a supply chain attack on up to 36,000 WordPress plugins running on a wide range of websites that had been backdoored by unknown hackers. Currently, researchers from security firm Wordfence…
Web3 in Healthcare: Privacy, Consent, and Equity
The convergence of Web3 technologies and the healthcare industry has sparked significant interest and investment. As blockchain, decentralized applications (dApps), and smart contracts gain traction, the potential benefits for healthcare are immense. However, this rapid adoption also brings cybersecurity challenges…
Rethinking the Cloud: Why Companies Are Returning to Private Solutions
In the past ten years, public cloud computing has dramatically changed the IT industry, promising businesses limitless scalability and flexibility. By reducing the need for internal infrastructure and specialised personnel, many companies have eagerly embraced public cloud services. However, as…