In the last few years social media has gradually become a one stop shop for scammers. With easily available information, scammers as able to hand pick their target and create a customized scam for them. Telegram is one such…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
AlphaCodium: Your New Coding Assistant
Meet AlphaCodium, the latest creation from CodiumAI, taking AI code generation to the next level, leaving Google’s AlphaCode in its digital dust. Forget complicated terms; AlphaCodium simply means smarter, more accurate coding. Instead of following a set script, it…
The Role of Biometrics in a Zero Trust Landscape
The illicit trade of biometric data, sourced from manipulated selfies, fraudulent passports, and cyberattacks on data repositories containing fingerprints to DNA information, has been thriving on the dark web. Despite their untraceability, these compromised biometrics empower attackers to access…
Cyber Attacks by North Korean Hackers on Cryptocurrency Platforms Reach $1 Billion in 2023
A recent study by Chainalysis, a blockchain analytics firm, has revealed a surge in cyber attacks on cryptocurrency platforms linked to North Korea. The data, covering the period from 2016 to 2023, indicates that 20 crypto platforms were targeted…
Data Collaboration Platforms Ruling the Charts in Unlocking Sophisticated AI Models
Large Language Models (LLMs) have opened up exciting new possibilities for organisations in the field of artificial intelligence (AI), including enhanced decision-making, streamlined processes, and ground-breaking innovation. Leading companies like Zendesk, Slack, Goldman Sachs, GitHub, and Unilever have used…
Synthetic Data: How Does the ‘Fake’ Data Help Healthcare Sector?
As the health care industry globally continues to collapse from staff-shortage, AI is being hailed as the public and private sector’s salvation. With its capacity to learn and perform jobs like tumor detection from scans, the technology has the potential…
NSA Confession: Unlawful Surveillance on Americans Exposed
Despite attempts to conceal details of arrangements between United States spy agencies and private companies that track the location of Americans using their cell phones, United States officials fought to conceal the details. Normally, law enforcement and intelligence agencies…
23andMe Faces Privacy Breach
Recently, 23andMe, a prominent genetic testing provider, finds itself grappling with a substantial security breach spanning five months, from April 29 to September 27. This breach has exposed the health reports and raw genotype data of affected customers, shedding…
‘Mother of All Breaches’: 26 Billion Personal Records and Passwords Leaked
Even after being significantly vigilant while using online tools, a user’s personal and professional information could still be exposed to a data breach. In certain cases, hackers tend to compile credentials and information stolen in past breaches to make their…
AI Image Generation Breakthrough Predicted to Trigger Surge in Deepfakes
A recent publication by the InstantX team in Beijing introduces a novel AI image generation method named InstantID. This technology boasts the capability to swiftly identify individuals and generate new images based on a single reference image. Despite being…
Pegasus Spyware Targets Two Journalists in Togo: RSF
Reporters Without Borders (RSF) disclosed that two journalists in Togo had spyware on their phones that looked similar to the potent Pegasus surveillance tool used by the NSO group. RSF reports that the journalists are accused of defaming a…
The Rise of AI Restrictions: 25% of Firms Slam the Door on AI Magic
When ChatGPT was first released to the public, several corporate titans, from Apple to Verizon, made headlines when they announced bans on the use of this software at work shortly after it was introduced. However, a recent study confirms…
Preserving Literary Integrity: Indian Publishers Plead for Copyright Measures Against AI Models
It may become necessary to amend the Information Technology rules to ensure fair compensation and ensure that news publishers in India are fairly compensated for the use of their content in training generative artificial intelligence (GenAI) models in the…
Kasseika Ransomware Employs AntiVirus Driver to Disarm Other Antiviruses
Kasseika, a ransomware gang, has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) assault to disable security-related processes on compromised Windows hosts, following groups such as Akira, AvosLocker, BlackByte, and RobbinHood. Trend Micro claimed in…
The Future of AI: Labour Replacement or Collaboration?
In a recent interview with CNBC at the World Economic Forum in Davos, Mustafa Suleyman, co-founder and CEO of Inflection AI, expressed his views on artificial intelligence (AI). Suleyman, who left Google in 2022, highlighted that while AI is…
AllaKore RAT: Malware Target Mexican Banks and Crypto Platforms
Mexican financial institutions are suffering attacks by a new spear-phishing campaign, spreading a modified version of an open-source remote access trojan named ‘AllaKore RAT’. The activity was attributed by the BlackBerry Research and Intelligence Team to an unidentified financially motivated…
UK Cybersecurity Agency Issues Warning: AI to Enhance Authenticity of Scam Emails
The UK’s cybersecurity agency has issued a warning that artificial intelligence (AI) advancements may make it challenging to distinguish between genuine and fraudulent emails, particularly those prompting users to reset passwords. The National Cyber Security Centre (NCSC), affiliated with…
This Side of AI Might Not Be What You Expected
In the midst of our tech-driven era, there’s a new concern looming — AI prompt injection attacks. Artificial intelligence, with its transformative capabilities, has become an integral part of our digital interactions. However, the rise of AI prompt injection…
HP Enterprise Reveals Hack Conducted by State-backed Russian Hackers
Hewlett Packard (HP) enterprise reported on Wednesday that alleged state-backed Russian hackers have attacked its cloud-based email system and stolen security and employees’ data. In a Security and Exchange filing, the IT product provider noted that the attack occurred on…
X Launches Secure Login with Passkey for iOS Users in US
X (formerly known as Twitter) is set to allow users to login in with a passkey rather than a password, but only on iOS devices. X earlier announced its intention to roll out passwordless technology, and it has now…