The recent partnership between Te Tumu Paeroa (TTP), the office of the Māori Trustee, and Microsoft for the forthcoming data centres in Aotearoa New Zealand marks a groundbreaking development with potential global implications for indigenous data sovereignty. This agreement,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Android App Security Alert: Proactive Measures to Prevent Unauthorized Control
Approximately a billion Android users have been threatened by a new malware infection. The latest security alert comes from Microsoft’s team who discovered a new vulnerability that may give hackers complete control of your smartphone. The latest security alert…
FBI Investigates Thousands of Fake Emails Warning of Cyber Threat You Must Do 1 Thing
Over the weekend, an alarming incident unfolded as thousands of fake emails flooded in, purportedly from the US Department of Homeland Security. The messages, titled “Urgent: Threat actor in systems,” raised concerns about a cyber threat allegedly posed by…
Debating the Risks and Realities of Artificial General Intelligence
In the ever-evolving landscape of artificial intelligence (AI), a notable shift in focus has emerged from the once lofty concerns about AI achieving sentience or triggering a hypothetical “singularity.” Instead, attention has pivoted towards a concept known as artificial…
BetterHelp Agrees to $7.8 Million Settlement for Health Data Sharing with 800,000 Users
The LockBit ransomware group has resurfaced, targeting Hooker Furniture, a significant player in the U.S. furniture industry. Alleging the theft of customer and business data, LockBit has set a deadline of May 08, 2024, for its publication. Meanwhile, BetterHelp,…
LAPD Website Unexpectedly Offline; Ransomware Ruled Out, Cause Unclear
On Friday afternoon, the Los Angeles Police Department’s website went down due to an overload, officials said, despite claims on social media that an online group was responsible for the outage through their “cyber attack.” It is widely believed…
Is Your iPhone at Risk? Understanding iPhone Spyware Issue
Surprisingly, one iOS user has successfully identified Apple’s iPhone Spyware Problem. Unfortunately, iPhone spyware attacks have extended to 92 nations. And it can be one of the most scary threats in the realm of technology. The blog post below…
New Attack Renders Most VPN Apps Vulnerable
A new attack, dubbed TunnelVision, has materialised as a threat to the security of virtual private network (VPN) applications, potentially compromising their ability to protect user data. Researchers have detected vulnerabilities affecting nearly all VPN apps, which could allow…
Assessing F Society’s Latest Ransomware Targets: Are They at Risk?
In recent developments, the F Society ransomware group has once again made headlines by listing four additional victims on its leak site. The alleged targets include Bitfinex, Coinmoma, Rutgers University, and SBC Global Net. Bitfinex, a renowned cryptocurrency exchange…
Scattered Spider: Hackers Attacking Commercial Sectors, Cops Troubled
Scattered Spider threat actors primarily steal data for extortion using a variety of social engineering approaches, and they have recently used BlackCat/ALPHV ransomware in addition to their usual TTPs. According to a senior bureau official, the FBI must “evolve” to…
Rising Threat: Hackers Exploit Microsoft Graph for Command-and-Control Operations
Recently, there has been a trend among nation-state espionage groups they are tapping into native Microsoft services for their command-and-control (C2) operations. Surprisingly, different groups, unrelated to each other, have reached the same conclusion that It is smarter to…
Microsoft Uncovers Major Security Flaw in Android Apps with Billions of Downloads
Microsoft recently made a troubling discovery regarding the security of numerous Android applications, including some of the most widely used ones, each boasting over 500 million installations. After uncovering a common security weakness, Microsoft promptly notified Google’s Android security…
ATM Card Trap Scam: How to Stay Safe
ATMs have become an integral part of our lives. They provide convenient access to cash and banking services. However, criminals are always finding new ways to exploit technology for their gain. One such deceptive scheme is the ATM card trap…
Scammers Targeting WhatsApp Groups in UK
When businessman Mohammed Yousaf received an urgent plea for assistance from one of his oldest friends, he rushed to the rescue. The 56-year-old received a WhatsApp message from the account of a man he had been friends with for…
Are The New AI PCs Worth The Hype?
In recent years, the realm of computing has witnessed a remarkable transformation with the rise of AI-powered PCs. These cutting-edge machines are not just your ordinary computers; they are equipped with advanced artificial intelligence capabilities that are revolutionizing the…
Microsoft Revamps Security Leadership, Empowering Deputy CISOs
There have been a series of major security breaches recently, and Microsoft is making changes to its security practices, organizational structure, and executive compensation to address the issue, as government leaders and big customers increasingly pressure the company to…
Here’s Why You Shouldn’t Trust VPNs Blindly
In an era where we should be gravely concerned about online privacy and security, Virtual Private Networks (VPNs) have come through as indispensable tools for safeguarding digital identities. However, amidst the buzz of VPN advertisements promising invincibility against cyber…
Android Flaw Exposes DNS Queries Despite VPN Kill Switch
Several months ago, a Mullvad VPN user discovered that Android users have a serious privacy concern when using Mullvad VPN. Even with the Always-On VPN feature activated, which ensures that the VPN connection is always active, and with the…
Microsoft Introduces Passkey Authentication for Personal Microsoft Accounts
Microsoft has introduced a new feature allowing Windows users to log into their Microsoft consumer accounts using a passkey, eliminating the need for traditional passwords. This passkey authentication method supports various password-less options such as Windows Hello, FIDO2 security…
Experts Warn Criminals Could Exploit Jogging Apps for Targeting People
Experts caution that users of running apps should heighten their privacy settings to thwart potential stalkers and other malicious actors from accessing sensitive information regarding their activities. While platforms like Strava enable joggers and hikers to share route details…