Even though the National Security Agency has been investigating cyberattacks and propaganda campaigns, a National Security Agency official said Tuesday that hackers are turning to generative artificial intelligence chatbots, such as ChatGPT, to make their operations appear more convincing…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
‘BIN’ Attacks: Cybercriminals are Using Stolen ‘BIN’ Details for Card Fraud
While cybersecurity networks might be boosting themselves with newer technologies, cybercrime groups are also augmenting their tactics with more sophisticated tools. The latest example in cyberspace is the “BIN attacks,” that targeted small businesses. The tactic involved manipulation of the…
Researchers Claim Apple Was Aware of AirDrop User Identification and Tracking Risks Since 2019
Security researchers had reportedly alerted Apple about vulnerabilities in its AirDrop wireless sharing feature back in 2019. According to these researchers, Chinese authorities recently exploited these vulnerabilities to track users of the AirDrop function. This case has raised concerns about…
Bengaluru Woman Escapes a Cyber-scam Attempt, After Indigo’s Bogus ‘Agents’ Cancel Rs.15,600 Tickets
A 32-year-old woman from Bengaluru, India, suffered a cyber scam where the scammers falsely identified themselves as the agents of Indigo Airlines. The scammers attempted to obtain Rs. 15,600 from the victim. Following a few questions from the ‘agents,’ victim…
Here’s Why the World is Investing So Much in Semiconductors
Hannah Mullane, a BBC correspondent, recently visited Pragmatic Semiconductor, the UK’s newest computer chip facility in Durham. Formerly a ceramic pipe factory, from the outside it looks like a large warehouse. However, the large site is being turned into…
Morrisons’ ‘Robocop’ Pods Spark Shopper Backlash: Are Customers Feeling Like Criminals?
In a bid to enhance security, Morrisons has introduced cutting-edge anti-shoplifting technology at select stores, sparking a divisive response among customers. The high-tech, four-legged pods equipped with a 360-degree array of CCTV cameras are being considered for a nationwide…
AI Unravels the Mystery of Fingerprints: Are We Truly Unique?
Due to its uniqueness and permanence, fingerprint analysis is regarded as a valuable tool in the field of forensics and security because no two fingerprint patterns are identical, not even identical twins. There are so many unique aspects of…
Toronto Zoo Suffers a Ransomware Attack
The Toronto Zoo, located in Toronto, Ontario, Canada revealed that it was hit by ransomware attack on January 8th. The attack was first detected on Friday, January 5th. As per the official statement released by the zoo authority, an investigation…
Driving into Tomorrow: The AI powered Car Takeover
In the next decade, a tech-driven revolution is set to transform our roads as 95% of vehicles become AI-powered connected cars. These smart vehicles, while promising enhanced safety and convenience, come with a catch—each generating a whopping 25 gigabytes…
Embracing a Passwordless Future: Navigating the Shift to Decentralized Security in 2024
The world has swiftly embraced digitalization, empowering individuals to accomplish over 90% of their daily tasks through mobile apps or web interfaces. Activities like bill payments, flight bookings, health consultations, and even exploring one’s DNA lineage have become more…
Crypto Enthusiasts Embrace New Frontier: Investing in Bitcoin ETFs Explained
This was the first time the Securities and Exchange Commission approved an exchange-traded fund that contained bitcoin, but the Commission stressed that its decision does not mean it endorses or approves Bitcoin, but that it remains deeply sceptical about…
Cybersecurity Risk to Banking Sector a Significant Challenge: RBI Governor
As cybersecurity concerns become a challenge, India’s banking system is well-positioned to sustain the nation’s growth, as Reserve Bank of India (RBI) governor Shaktikanta Das stated earlier this week. He noted at the Mint BFSI conclave that a dedicated…
Growing Concerns Regarding The Dark Side Of A.I.
In recent instances on the anonymous message board 4chan, troubling trends have emerged as users leverage advanced A.I. tools for malicious purposes. Rather than being limited to harmless experimentation, some individuals have taken advantage of these tools to create…
Optimizing Education: Unleashing the Potential of Artificial Intelligence in the Classroom
The incorporation of Artificial Intelligence (AI) into educational settings holds the promise of transforming both the learning experience for students and the teaching methods employed by educators. AI algorithms, when integrated into the classroom, have the capability to offer…
Which is Better: VPN or Microsoft Security Service Edge (SSE)?
In the ever-evolving world of artificial intelligence and cybersecurity threats, Microsoft has unveiled Microsoft Global safe Access, also known as Security Service Edge (SSE), serving as a ground-breaking solution for safe remote access. Designed to improve the connectivity between workplaces,…
North Korean Hacking Outfit Lazarus Siphons $1.2M of Bitcoin From Coin Mixer
Lazarus Group, a notorious hacker group from North Korea, reportedly moved almost $1.2 million worth of Bitcoin (BTC) from a coin mixer to a holding wallet. This move, which is the largest transaction they have made in the last…
Connected Tools, Connected Risks: Cybercriminals Use Wrenches as Gateways to Ransomware
Security researchers have discovered that hackers may be able to cause mayhem by hijacking torque wrenches that are connected to Wi-Fi in car factories. According to experts, network-connected wrenches used worldwide are now vulnerable to ransomware hackers, who can…
Hays Research Reveals the Increasing AI Adoption in Scottish Workplaces
Artificial intelligence (AI) tool adoption in Scottish companies has significantly increased, according to a new survey by recruitment firm Hays. The study, which is based on a poll with almost 15,000 replies from professionals and employers—including 886 from Scotland—shows a…
Implementation Flaws Identified in Post-Quantum Encryption Algorithm
Two implementation flaws have been identified in the Kyber key encapsulation mechanism (KEM), an encryption standard intended to safeguard networks from future attacks by quantum computers. Collectively known as “KyberSlash,” these flaws could allow cybercriminals to discover encryption keys. …
This Malware is Assaulting Critical US Infrastructure for Almost a Year
Over the course of the last 11 months, a threat group has actively engaged in a phishing campaign targeting employees across various companies, distributing an open-source trojan program named AsyncRAT. The victims of this campaign notably include companies responsible…