A faulty vending machine at a Canadian university has unintentionally exposed the fact that several of them have been covertly utilising facial recognition technology. Earlier this month, a snack dispenser at the University of Waterloo displayed the error message…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cybersecurity Nightmare Unfolds as Malawi’s Immigration Systems Under Attack
There has been a recent cyberattack on Malawi, according to President Lazarus Chakwera, which has caused the government to stop issuing passports. However, some observers believe such an attack did not occur. Chakwera informed parliament on Wednesday that security…
Rise in Fake Life Insurance Emails, Action Fraud Warns
Over the past few weeks, a surge in fraudulent emails impersonating reputable life insurance companies has prompted over 800 reports to Action Fraud, the UK’s national reporting centre for fraud and cybercrime. The scam emails are cleverly crafted to…
Nation-State Cyber Attacks Cause Pharmacy Delays: A Critical Healthcare Concern
In recent weeks, pharmacies across the United States have experienced significant delays, leaving patients waiting for essential medications. The cause of these delays is now being attributed to a wave of cyber attacks orchestrated by nation-state hackers, raising serious…
Critical DNS Bug Poses Threat to Internet Stability
As asserted by a major finding, researchers at the ATHENE National Research Center in Germany have identified a long-standing vulnerability in the Domain Name System (DNS) that could potentially lead to widespread Internet outages. This flaw, known as “KeyTrap”…
Cybercriminals Exploit Google Cloud Run in Extensive Banking Trojan Scheme
Security experts have issued a warning about hackers exploiting Google Cloud Run to distribute significant amounts of banking trojans such as Astaroth, Mekotio, and Ousaban. Google Cloud Run enables users to deploy various services, websites, or applications without the…
Here’s Why Robust Space Security Framework is Need of the Hour
Satellite systems are critical for communication, weather monitoring, navigation, Internet access, and numerous other purposes. These systems, however, suffer multiple challenges that jeopardise their security and integrity. To tackle these challenges, we must establish a strong cybersecurity framework to…
AI’s Dark Side: Splunk Report Forecasts Troubled Trends in Privacy and Security
There is no doubt that AI is going to be very beneficial to security professionals, but cybercriminals will be looking for ways to harness the power of AI to their advantage as well. As bad actors push artificial intelligence…
ConnectWise ScreenConnect Vulnerability: Navigating the Breach Risk
ConnectWise ScreenConnect, a widely-used remote access software, is facing a critical vulnerability that could expose sensitive data and allow the deployment of malicious code. Described as an authentication bypass flaw, the severity-rated vulnerability poses a significant risk to more…
Analysis: AI-Driven Online Financial Scams Surge
Cybersecurity experts are sounding the alarm about a surge in online financial scams, driven by artificial intelligence (AI), which they warn is becoming increasingly difficult to control. This warning coincides with an investigation by AAP FactCheck into cryptocurrency scams…
Cybersecurity Breach Hits Global Software Developer PSI Software SE
According to a recent announcement, German software company PSI Software SE revealed that it fell victim to a ransomware attack, disrupting its internal infrastructure. The company, specialising in software solutions for energy suppliers worldwide, including control systems for operations,…
Indian Authorities Probes Data Breach Concerns Involving PMO and EPFO
The Open-Source Intelligence (OSINT) team at India Today reviewed leaked data that claimed a Chinese state-affiliated hacker group had targeted major Indian government offices, such as the “PMO” (likely the Prime Minister’s Office), as well as businesses like Reliance…
Exploring the Spike in Data Breaches in 2023
In 2023, there has been a significant surge in data breaches, raising concerns globally. The upswing in cyber incidents can be attributed to various factors, reflecting the intricate dynamics of our digital age. Firstly, the rapid pace of digital…
ALPHV Ransomware Strikes: LoanDepot and Prudential Financial Targeted
Recently, Prudential Financial and loanDepot, two Fortune 500 companies were attacked by the ALPHV/Blackcat ransomware gang, which claims responsibility for the breaches. Despite the threat actors still having to prove their claims, the two companies were added to ALPHV’s…
Researchers Unveil Sound-Based Attack: Swipe Sounds Used to Recreate Fingerprints
A group of researchers from China and the US has introduced an intriguing new method for compromising biometric security systems. Their study, titled “PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound,” presents a novel side-channel…
Indian SMEs Lead in Cybersecurity Preparedness and AI Adoption
In an era where the digital landscape is rapidly evolving, Small and Medium Enterprises (SMEs) in India are emerging as resilient players, showcasing robust preparedness for cyber threats and embracing the transformative power of Artificial Intelligence (AI). As the…
UK Led Global Operations Disrupt LockBit’s Criminal Network
One of the most notorious cybercrime organisations in the world has been hit by an unprecedented police operation involving the arrest and indictment of members of the Lockbit ransomware group by the FBI and Britain’s National Crime Agency. The…
Cactus Ransomware Strikes Schneider Electric, Demands Ransom
In a recent cyber attack, the Cactus ransomware group claims to have infiltrated Schneider Electric’s Sustainability Business division, stealing a substantial 1.5 terabytes of data. The breach, which occurred on January 17th, has raised concerns as the gang now…
IBM Signals Major Paradigm Shift as Valid Account Attacks Surge
As a result of IBM X-Force’s findings, enterprises cannot distinguish between legitimate authentication and unauthorized access due to poor credential management. Several cybersecurity products are not designed to detect the misuse of valid credentials by illegitimate operators, and this…
AI’s Influence in Scientific Publishing Raises Concerns
The gravity of recent developments cannot be overstated, a supposedly peer-reviewed scientific journal, Frontiers in Cell and Developmental Biology, recently published a study featuring images unmistakably generated by artificial intelligence (AI). The images in question include vaguely scientific diagrams labelled…