Despite cryptocurrency no longer dominating the headlines like it did during the 2021 to 2022 boom, cybercriminals are still leveraging it to generate billions of dollars in fraudulent income every year. According to the FBI, 2023 was the most…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
NoName Hackers Use RansomHub in Recent Cyber Campaigns
Despite active attacks by gangs such as the NoName ransomware group, which has targeted small and medium-sized businesses worldwide for the past three years, the group has continued to grow by using custom malware and evolving its attack methods.…
Payment Gateway Slim CD Reports Major Data Breach Affecting 1.7 Million Users
Slim CD, a leading provider of payment processing solutions, has disclosed a significant data breach that compromised the credit card and personal data of nearly 1.7 million individuals. Hackers had unauthorized access to the company’s network for almost a…
How to Protect Your Accounts from 2FA Vulnerabilities: Avoid Common Security Pitfalls
Securing an account with only a username and password is insufficient because these can be easily stolen, guessed, or cracked. Therefore, two-factor authentication (2FA) is recommended for securing important accounts and has been a mandatory requirement for online banking…
Veeam Software Issues Fixes for Exploitable Security Flaws
Security experts recommend all Veeam Backup & Replication software customers to upgrade their software immediately to address a critical, remotely exploitable vulnerability. Veeam first revealed the flaw, dubbed CVE-2024-40711, on Thursday, when it issued fixes to address 18 vulnerabilities…
Election Sabotage via Cyberattacks Increases
Several predictions have pointed out that 2024 will not only be an election year but also a year of civil rights. Security has identified an increasing trend of malicious cyber activity aimed at imperilling sovereign elections around the world…
Hackers Use SonicWall Security Flaw in Ransomware Attacks
In the latest ransomware attack, operators have started using a critical bug in SonicWall SonicOS firewall devices as an entry point for compromising business networks. The vulnerability, identified as CVE-2024-40766, is from the management access interface of the firewall…
Why Windows 11 Requires a TPM and How It Enhances Security
When Microsoft launched Windows 11 in 2021, the new operating system came with a stringent hardware requirement: the presence of a Trusted Platform Module (TPM), specifically one that meets the TPM 2.0 standard. A TPM is a secure cryptoprocessor…
Hacktivism: How Hacktivists are Using Digital Activism to Fight for Justice
What is Hacktivism? Hacktivism, a blend of hacking and activism, has become a major threat in the digital landscape. Hacktivists are driven by political, religious, and social aims, they use different strategies to achieve their goals, and their primary targets…
Security Experts Detect SQL Injection to Bypass Airport TSA Security Checks
Security experts discovered a flaw in a critical air transport security system, allowing unauthorised personnel to possibly bypass airport security screenings and get access to aircraft cockpits. Researchers Ian Carroll and Sam Curry uncovered the security vulnerability in FlyCASS,…
Data Poisoning: The Hidden Threat to AI Models
As ongoing developments in the realms of artificial intelligence and machine learning take place at a dynamic rate, yet another new form of attack is emerging, one which can topple all those systems we use today without much ado: data…
Avis Data Breach Exposes Over 400,000 Customers’ Personal Information
Over 400,000 customers of Avis, a prominent car rental company known for its presence at U.S. airports, have had their personal data compromised in a recent cybersecurity breach. The company revealed the incident to the public on Monday, stating…
Bitcoin ATM Emerges as Major Threat to Cryptocurrency
There is an ominous growth in Bitcoin ATMs across the United States, and some experts have claimed they are also one of the biggest cybercrime threats to the country. As with other ATMs, Bitcoin ATMs share a few characteristics with…
Slim CD Data Breach Exposes Credit Card Information of 1.7 Million Customers
Payment processor Slim CD has reported a data breach that exposed the credit card and personal information of nearly 1.7 million people. According to a notification sent to those affected, the company revealed that unauthorized access to its network…
SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets
Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to grow. An advanced malware strain campaign has surfaced from North Korea, it attacks cryptocurrency wallets by…
Digital Dictatorship: The Dangers of Unchecked Spyware
The Pegasus scandal broke into the public eye three years ago and has been widely reported in the media ever since. Yet, the surveillance industry has not been fixed. On the contrary, the spyware problem seems to worsen as…
Disney Data Breach Exposes Sensitive Corporate and Personal Information
In July, Disney experienced a significant data breach that exposed far more than initially reported, compromising a wide array of sensitive information. While early reports focused on stolen Slack messages, it has since been revealed that the breach extended…
‘TIDrone’ Cybercriminals Target Taiwan’s Drone Makers
A previously unknown threat actor with possible ties to Chinese-speaking groups has primarily targeted drone makers in Taiwan as part of a cyber attack operation that started in 2024. Trend Micro is tracking the adversary under the codename TIDRONE,…
Free Russia Foundation Investigates Potential Cyberattack Amid Leak of Sensitive Documents
One of Russia’s leading pro-democracy groups, the Free Russia Foundation, announced on Friday that it is investigating a potential cyberattack following the online leak of thousands of emails and documents related to its operations. On Thursday, the Telegram channel…
AI In Wrong Hands: The Underground Demand for Malicious LLMs
In recent times, Artificial Intelligence (AI) has offered various perks across industries. But, as with any powerful tool, threat actors are trying to use it for malicious reasons. Researchers suggest that the underground market for illicit large language models is…