A team from the Gurugram Police cyber unit detained a Deputy Manager of a private bank for allegedly providing bank accounts for cyber fraud in order to attain his goals, police said. According to Priyanshu Diwan, Assistant Commissioner of…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Massive Cyber Attack on MoD Raises Job Concerns for Army Staff
There is a growing concern among soldiers in the armed forces that their information has been hacked, which may have led to a cyber attack on the Ministry of Defence. According to a law firm, these soldiers fear losing…
Microsoft’s Windows 11 Recall Feature Sparks Major Privacy Concerns
Microsoft’s introduction of the AI-driven Windows 11 Recall feature has raised significant privacy concerns, with many fearing it could create new vulnerabilities for data theft. Unveiled during a Monday AI event, the Recall feature is intended to help users…
Hidden Cyber Threat Exposed After Six Years
A newly identified cyber threat group, known as “Unfading Sea Haze,” has been secretly infiltrating military and government networks in the South China Sea region since 2018, according to a recent report by Bitdefender researchers. The group’s activities align…
Case Study: Implementing an Anti-Phishing Product and Take-Down Strategy
Introduction: Phishing attacks have become one of the most prevalent cybersecurity threats, targeting individuals and organizations to steal sensitive information such as login credentials, financial data, and personal information. To combat this growing threat, a comprehensive approach involving the deployment…
APT41 Strikes Again: Attacks Italian Industry Via Keyplug Malware
APT41: A well-known Chinese cyberespionage group with a history of targeting various sectors globally. They are known for their sophisticated techniques and possible state backing. KeyPlug: A modular backdoor malware allegedly used by APT41. It is written in C++ and…
Shadow IT Surge Poses Growing Threat to Corporate Data Security
It was recently found that 93% of cybersecurity leaders have deployed generative artificial intelligence in their organizations, yet 34% of those implementing the technology have not taken steps to minimize security risks, according to a recent survey conducted by…
Have You Been Defrauded? This Scam Survival Toolkit Can Help You Recover
Wondering what to do in the aftermath of a fraud can be extremely difficult. The Better Business Bureau’s (BBB) new fraud Survival Toolkit helps fraud survivors navigate the recovery process. Fraudsters target people from many walks of life. BBB…
YouTube Emerging as a Hotspot for Cyber Threats: Avast Report
YouTube has become a new battleground for cybercriminals to launch phishing attacks, spread malware, and promote fraudulent investment schemes, according to a recent report by Avast, a leading security vendor. Avast’s researchers highlighted the use of tools like Lumma…
EPA Report Reveals Cybersecurity Risks in U.S. Water Systems
A recent report from the Environmental Protection Agency (EPA) revealed that over 70% of surveyed water systems have failed to meet key cybersecurity standards, making them vulnerable to cyberattacks that could disrupt wastewater and water sanitation services across the…
LockBit Ransomware Gang Claims Responsibility for London Drugs Cyberattack
In a recent turn of events, the LockBit ransomware gang has claimed responsibility for the cyberattack on Canadian pharmacy chain London Drugs, which occurred in April. The cybercriminals are now threatening to release sensitive data online after reportedly unsuccessful negotiations…
Cryptojacking Alert: GhostEngine Disables Endpoint Protections
Recently found malware uses advanced techniques to defeat antivirus safeguards, delete signs of infection, and permanently infect devices with cryptocurrency-mining software, experts said. “The first goal of the GhostEngine malware is to disable endpoint security solutions and specific Windows event…
Sharenting: What parents should consider before posting their children’s photos online
21st century parenting is firmly grounded in technology. From iPads keeping kids entertained on flights, to apps that allow parents to track their children’s feeds, development, and more, technology has changed what it means to be a parent. But…
Defending Digital Frontiers: Strategies for Organizations in an Unstable World
An overview Geopolitical Tensions: Regional stability issues, such as political conflicts and economic tensions, have a direct impact on cyber threats. As geopolitical events unfold, threat actors adapt their strategies to exploit vulnerabilities. Attack Trends: While no groundbreaking attack methods…
Breach Forums Plans Dark Web Return Despite FBI Crackdown
Breach Forums, the infamous cybercrime and hacker forum, is all set to return to the dark web under a new Onion label, Hackread reported. While the exact timing for the resuscitation of its clearnet domain is unknown, officials are…
Major Security Flaw Discovered in Popular Cloud Logging Tool
Researchers at Tenable have identified a severe memory corruption vulnerability in Fluent Bit, an open-source logging utility integral to major cloud services. With over 3 billion downloads as of 2022 and an additional 10 million deployments daily, Fluent Bit…
Legacy Windows OSes Fall Prey to Rapid Online Attacks
In 2014, Windows XP was officially retired, marking the end of a decade that has seen it occupy our desktops for more than a decade. The beloved OS was given one last security update in 2019, but for all…
EU Data Centers to Report Energy and Water Use Under New Rules
The European Union is poised to take a significant step toward regulating energy and water use in data centers. Beginning in September, all organizations operating data centers within EU nations will be required to file detailed reports on their…
Cybersecurity Risks and Solutions for Millennials and Gen Z
Millennials and Gen Z are the most concerned generations about the risk of cyber attacks on their organizations. They also worry about potentially leaving their organizations vulnerable and feel less prepared to handle such cyber threats. Research from Ernst…
Patient Privacy at Risk: Experts React to Health Company Data Leak
A report released by MediSecure states that it is the victim of a ‘large-scale ransomware’ data breach that is affecting the health and personal information of millions of individuals. According to the statement, the attack impacts personal and health…