The Rising Cost of Ransomware Attacks on Critical Infrastructure The costs of ransomware attacks on critical national infrastructure (CNI) firms have soared over the last year. According to Sophos‘ newest numbers, which were revealed today, the typical ransom payment increased…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cyberattack Exposes Patient Data in Leicestershire
A recent cyberattack has compromised sensitive patient data in Leicestershire, affecting several healthcare practices across the region. The breach, which targeted electronic patient records, has led to significant concerns over privacy and the potential misuse of personal information. Those…
Here’s Why You Shouldn’t Use Public USB Charging Ports
We’ve all been there: stranded in a coffee shop with a dropping phone battery and no connector, only to find a free USB charging station nearby. Relieved, you plug in your device and go about your business, unaware that…
Security Nightmare with Hackers Releasing 1,000 Crore Passwords in Major Breach
Cyber-security breaches are becoming more and more prevalent and this is causing a lot of concerns amongst the public. The report by Semafor claims that some 10 billion (1,000 crore) passwords have been leaked from a hacking forum online…
Activist Hacking Group Claims Leak of Disney’s Internal Data
An activist hacking group has alleged that it leaked a substantial amount of Disney’s internal communications, including details about unreleased projects, raw images, computer code, and some login credentials. The group, known as Nullbulge, has claimed responsibility for the…
The Role of IoT in Modern Infrastructure
Imagine if someone told you in the early 2000s that entire industries would run almost by themselves, thanks to a network of connected devices. Today, this is no longer science fiction but our reality, thanks to the Internet of Things…
How to Protect Your Online Accounts from Hackers
Hackers are increasingly targeting individuals to steal cryptocurrency, access bank accounts, or engage in stalking. Although these attacks are relatively rare, it’s crucial to know how to protect yourself if you suspect someone has accessed your email or social…
NATO Collaborates with Start-Ups to Address Growing Security Threats
Marking its 75th anniversary at a summit in Washington DC this week, the North Atlantic Treaty Organization (NATO) focused on Ukraine while emphasizing the importance of new technologies and start-ups to adapt to modern security threats. In its Washington…
Here’s How Nvidia’s Chips Can Disrupt Large-Scale Indian Weddings
The big large Indian wedding is all about making memories that will last a lifetime. Weddings of a significant size can budget anywhere between Rs 15 lakh and Rs 50 lakh specifically for photographs and videos that capture every…
Breaking Down the Clock PoC Exploits Utilized by Hackers Within 22 Minutes
It has been shown that threat actors are swift in weaponizing available proof-of-concept (PoC) exploits in real attacks, often within 22 minutes of publicly releasing these exploits. In that regard, Cloudflare has published its annual Application Security report for…
Hacker Subscription Service Exposes 600,000 Bank Card Details
A disturbing new hacker subscription service has emerged, offering access to 600,000 stolen bank card details for a fee of just £120. This service, identified by cybersecurity researchers from Flare, is named “Breaking Security” and allows its subscribers to…
3 Billion Attacks and Counting: The IDF’s Cyber Resilience
The Battlefield: Cloud Computing Cloud computing has become an integral part of modern military operations. The IDF relies heavily on cloud-based systems from troop management to logistics, communication, and intelligence gathering. These systems allow for flexibility, scalability, and efficient resource…
Are We Ready for the Next Wave of Cyber Threats?
In our increasingly digital world, cybersecurity is a growing concern for everyone— from businesses and governments to everyday individuals. As technology advances, it opens up exciting possibilities and creates new, sophisticated cyber threats. Recent high-profile attacks, like those on Ascension…
AT&T Paid Attackers $370K to Delete Stolen Customer Data
AT&T reportedly paid a hacker more than $370,000 to remove stolen customer data. In an extraordinary turn of events, the ransom may not have gone to those responsible for the breach. Last Friday, AT&T disclosed that an April data…
AT&T Data Breach: Essential Steps for Victims to Protect Themselves
Telecom giant AT&T recently disclosed a massive data breach affecting nearly all of its approximately 110 million customers. If you were a customer between May 2022 and January 2023, there is a high chance your data, including call and…
Subscription Services Accused of Using ‘Dark Patterns’ to Manipulate Customers
It is a widespread practice among subscription sites to manipulate customers’ behaviour around subscriptions and personal data to influence their decisions, according to a new report by two international consumer protection organizations. It is defined as the practice of…
New Hacking Method: Akami DNS Data Exfiltration
When it comes to cybercrime, getting into a system is only half the battle; the real challenge is extracting the stolen data without being detected. Companies often focus on preventing unauthorised access, but they must also ensure that data…
Unveiling the Mule Accounts Menace in Modern Money Laundering
In a recent statement, a member of the RBI’s board of governors has urged banks to step up efforts against mule accounts. According to Piyush Shukla, money mules in India do much more than move money. A MULE ACCOUNT…
Raman Research Institute’s Breakthrough in Quantum Cybersecurity
Scientists at the Raman Research Institute have achieved a significant breakthrough in cybersecurity by developing a novel method for generating truly unpredictable random numbers. This development is essential for strengthening encryption in quantum communications, addressing one of the most…
AI Minefield: Risks of Gen AI in Your Personal Sphere
Many customers are captivated by Gen AI, employing new technologies for a variety of personal and corporate purposes. However, many people ignore the serious privacy implications. Is Generative AI all sunshine and rainbows? Consumer AI products, such as OpenAI’s ChatGPT,…