Data breaches within the Ministry of Defence (MoD) have surged nearly fivefold over the past five years, raising concerns about the UK’s resilience against cyber threats from nations like Russia and China. MoD figures reveal 550 data incidents last…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Risks of Generative AI for Organisations and How to Manage Them
Employers should be aware of the potential data protection issues before experimenting with generative AI tools like ChatGPT. You can’t just feed human resources data into a generative AI tool because of the rise in privacy and data protection…
Combatting International Spoofed Calls: India’s New Measures to Protect Citizens
In recent times, fraudsters have increasingly used international spoofed calls displaying Indian mobile numbers to commit cybercrime and financial fraud. These calls, which appear to originate within India, are actually made by criminals abroad who manipulate the calling line…
From Courtroom to Cyber Threat: The JAVS Viewer 8 Incident
Hackers have broken into a popular brand of recording software used in courtrooms, jails, and prisons, allowing them to obtain complete control of the system via a backdoor implanted in an update to the application. Software and its purpose Justice…
ASML and TSM Face Uncertain Future in Event of Chinese Assault on Taiwan
If China invades Taiwan, chip machine maker ASML is rumoured to have the ability to disable its equipment remotely in TSMC’s fabrication facilities. In ASML’s EUV lithography systems, the most extensive client is TSMC, which uses extreme ultraviolet (EUV)…
Unmasking the Trojan: How Hackers Exploit Innocent Games for Malicious Intent
Hackers continue to find ingenious ways to infiltrate organizations and compromise sensitive data. Recently, a peculiar attack vector emerged—one that leverages an unsuspecting source: a Python clone of the classic Minesweeper game. In this blog post, we delve into the…
Windows 11: Home or Pro? A Comprehensive Comparison
With every major version of Windows, there are several editions to choose from. Windows 11 has many versions in addition to Home, Pro, Enterprise, and Windows 11 SE, which are specially designed for students. Although Windows 11 contains a…
Sharp Dragon Shifts Cyber Attacks to New Frontiers: Africa and the Caribbean
Check Point Research has been monitoring Sharp Dragon, a Chinese cyber threat group, since 2021. This group, previously known as Sharp Panda, has primarily targeted organisations in Southeast Asia with phishing campaigns. Recently, however, they have expanded their activities to…
Moroccan Cybercrime Group Storm-0539 Exploits Gift Card Systems with Advanced Phishing Attacks
A Morocco-based cybercrime group, Storm-0539, is making headlines for its sophisticated email and SMS phishing attacks aimed at stealing and reselling gift cards. Microsoft’s latest Cyber Signals report reveals that this group is responsible for significant financial theft, with…
What is GPS Jamming, a Rising Concern for Global Aviation?
Estonia has accused neighbouring Russia of jamming GPS navigation equipment in airspace over the Baltic republics, echoing airline worries that they have been dealing with such interference for months. Estonian Foreign Minister Margus Tsahkna’s accusation, for which he gave…
US Drug Distributor Cencora Reveals Major Cyberattack, Sensitive Medical Data Breached
A recent cyberattack on healthcare services has been disclosed by US drug distributor Cencora, revealing a significant breach compromising highly sensitive medical data. According to Reuters, the company notified affected individuals, stating that personal and highly sensitive medical information…
New Apple Wi-Fi Vulnerability Exposes Real-Time Location Data
Aside from Find My, maps, routes, and emergency SOS, Apple’s location services are quite handy, and they have many useful features. A research team at the University of Maryland has uncovered a critical vulnerability in Apple’s location services, which…
Massive Data Breach Exposes Sensitive Information of Indian Law Enforcement Officials
Recently, a significant data breach compromised the personal information of thousands of law enforcement officials and police officer applicants in India. Discovered by security researcher Jeremiah Fowler, the breach exposed sensitive details such as fingerprints, facial scans, signatures, and…
New ShrinkLocker Ransomware Exploits BitLocker to Encrypt Files
The new ransomware strain, ShrinkLocker, is creating significant concerns by using Windows BitLocker to encrypt corporate systems through the creation of new boot partitions. ShrinkLocker, named for its method of creating a boot volume by shrinking available non-boot partitions,…
Machine Identities Pose Major Threat to Indian Organizations: CyberArk
In an era where digital transformation is swiftly reshaping the business world, the most recent research from CyberArk, an identity security company, highlights a growing concern: identity-related breaches. The 2024 Identity Security Threat Landscape Report highlights a concerning trend…
One in Three Healthcare Providers at Risk, Report Finds
A recent report reveals that more than a third of healthcare organisations are unprepared for cyberattacks, despite an apparent rise in such incidents. Over the past three years, over 30% of these organisations have faced cyberattacks. The HHS Office…
Guarding Against SQL Injection: Securing Your Cisco Firepower Management Center
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not adequately…
Don’t Be a Victim: How to Avoid Digital House Arrest
Criminals are using a new “Digital House Arrest” method to target individuals. Scammers contact victims and compel them to stay home by pretending to be law enforcement officials such as police officers, Central Bureau of Investigation (CBI) agents, or customs…
Google Issues Emergency Update for New Chrome Vulnerability
Google has announced an urgent security update for its Chrome browser to fix a newly discovered vulnerability that is actively being exploited. This recent flaw, identified as CVE-2024-5274, is the eighth zero-day vulnerability that Google has patched in Chrome…
Truecaller Introduces AI Voice Feature for Personalized Call Responses
The Caller ID company Truecaller will now allow users to create an AI version of their voice to answer calls. Truecaller, known for identifying and blocking spam calls, is introducing a new feature for users with access to its…