In response to the escalating cyber threats faced by businesses, the U.S. Securities and Exchange Commission (SEC) has introduced a groundbreaking cybersecurity risk management rule. This development comes on the heels of a concerning 68% increase in data breaches in…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Innovation Unleashed: Indian AI and Robotics Giant Attains Level 5 Autonomy
With a breakthrough achievement, Indian autonomous driving company Swaayatt Robots has achieved Level 5 autonomy in their autonomous driving operations. It is a landmark agreement regarding self-driving technology, especially for the Indian market, as this represents a huge leap…
Anthropic Research Indicates That AI Algorithms May Turn Into “Sleeper Cell” Backdoors
While AI tools offer companies and online users novel avenues, they also have the potential to significantly boost the accessibility and potency of certain forms of illegal activity and crimes. For example, take the latest study that revealed large…
Bill Gates Explains How AI will be Transformative in 5 Years
It is a known fact that Bill Gates is positive about the future of artificial intelligence, however, he is now predicting that technology will be transformative for everyone in the next five years. The boom in AI technology has raised…
Time to bring order to Cyber Chaos
In today’s digital era, businesses are embracing rapid changes to enhance efficiency, but with it comes a surge in cybersecurity challenges. Last year saw a staggering 29,000 new IT vulnerabilities reported globally, emphasising the need for a strategic approach. …
As Deepfake of Sachin Tendulkar Surface, India’s IT Minister Promises Tighter Rules
On Monday, Indian minister of State for Information Technology Rajeev Chandrasekhar confirmed that the government will notify robust rules under the Information Technology Act in order to ensure compliance by platform in the country. Union Minister, on X, expressed gratitude…
Creator of ‘Ready Player One’ Ventures into Launching Metaverse
Oscar Wilde once humorously remarked that life imitates art, a sentiment that Ernest Cline, the author of the 2011 virtual reality adventure novel “Ready Player One,” seems to be embodying quite literally. Teaming up with Dan Farah, the producer…
Data is the Missing Piece in the AI Jigsaw, Here’s How to Bridge the Gap
The skills gap that is stifling development in artificial intelligence (AI) is well documented, but another aspect stands out: data complexity. According to a new IBM study, the most common barriers to AI success are limited AI skills and…
Addressing Deceptive AI: OpenAI Rival Anthropic Uncovers Difficulties in Correction
There is a possibility that artificial intelligence (AI) models can be trained to deceive. According to a new research led by Google-backed AI startup Anthropic, if a model exhibits deceptive behaviour, standard techniques cannot remove the deception and create…
Your iPhone is at risk – Signs of Viruses You Shouldn’t Ignore!
Apple usually excels in shielding us from spam and pop-ups. With the myriad functions Apple packs into iPhones, users engage in diverse activities, from work to photos and gaming. While iPhones are considered less susceptible to cyber threats than…
Surge in Police Adoption of Private Cameras for Video Evidence Raises Privacy Concerns
Major cities like Los Angeles and Washington, D.C., are gearing up to establish Real-Time Crime Centers, positioned as pivotal hubs for the seamless integration of various police technologies and data. Described as a “nerve center,” these facilities typically amalgamate…
Unused Apps Could Still be Tracking and Collecting User’s Data
While almost everyone in this era is glued to their smartphones for long hours, there still remain several mysteries about the device that are not actively being deduced by the users. So how does one begin to know their phones?…
China Backed Actors are Employing Generative AI to Breach US infrastructure
Cybercriminals of all skill levels are utilising AI to hone their skills, but security experts warn that AI is also helping to track them down. At a workshop at Fordham University, National Security Agency head of cybersecurity Rob Joyce…
Opera Browser Users Beware: MyFlaw Bug Allows Hackers to Run Any File Remotely
There has been an unearthed critical security flaw in the Opera browser that has been of concern to Opera browser enthusiasts. As a result of the “MyFlaw Bug,” hackers can remotely execute any file on users’ computers, posing a…
Microsoft ‘Cherry-picked’ Examples to Make its AI Seem Functional, Leaked Audio Revealed
According to a report by Business Insiders, Microsoft “cherry-picked” examples of generative AI’s output since the system would frequently “hallucinate” wrong responses. The intel came from a leaked audio file of an internal presentation on an early version of Microsoft’s…
Ahead of Regulatory Wave: Google’s Pivotal Announcement for EU Users
Users in the European Union will be able to prevent Google services from sharing their data across different services if they do not wish to share their data. Google and five other large technology companies must comply with the…
eBay Settles Blogger Harassment Case with $3 Million Fine
eBay has agreed to pay a substantial fine of $3 million (£2.36 million) in order to settle charges related to the harassment of bloggers who were openly critical of the company. The disturbing details emerged in court documents, revealing…
GitHub Faces Rise in Malicious Use
GitHub, a widely used platform in the tech world, is facing a rising threat from cybercriminals. They’re exploiting GitHub’s popularity to host and spread harmful content, making it a hub for malicious activities like data theft and controlling compromised…
Navigating the Paradox: Bitcoin’s Self-Custody and the Privacy Challenge
Self-custody in Bitcoin refers to individuals holding and controlling their private keys, which in turn control their bitcoin. This concept is akin to securing physical gold in a personal safe rather than relying on a bank or third-party custodian.…
Beware of Malicious YouTube Channels Propagating Lumma Stealer
Attackers have been propagating a Lumma Stealer variant via YouTube channels that post videos about cracking into popular applications. They prevent detection by Web filters by spreading the malware over open source platforms like MediaFire and GitHub rather than…