Funding that will support research into tech Today, the U.S. Department of Energy (DOE) announced funding of up to $70 million to support research into technologies intended to reduce risks and increase resilience to energy delivery infrastructure from a variety…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Open AI Moves to Minimize Regulatory Risk on Data Privacy in EU
While the majority of the world was celebrating the arrival of 2024, it was back to work for ChatGPT’s parent company, OpenAI. After being investigated for violating people’s privacy, the firm is believed to be rushing against the clock…
Unveiling Free VPN Risks: Protecting Online Privacy and Security
If you’re seeking enhanced security and privacy for your online activities, you might be considering the use of a Virtual Private Network (VPN). Virtual Private Networks (VPNs) are specifically crafted to accomplish this task. A quality VPN channels your…
The Biggest Tech Talent Gap Can Be Found in the SAP Ecosystem
In today’s job market, employers are facing a challenge in finding the right talent for tech roles that go beyond just coding. They’re not just looking for people who can write code; they want individuals who can implement, integrate, and…
Fortifying iPhone Security: Stolen Device Protection & Essential Tips Amid Rising Theft Concerns
Numerous iPhones, often regarded as some of the best in the market, are pilfered daily on a global scale. Apple aims to address this issue with the upcoming release of iOS 17.3, introducing a feature called Stolen Device Protection.However,…
SaaS Challenges and How to Overcome Them
According to 25% of participants in an IBM study conducted in September 2022 among 3,000 companies and tech executives worldwide, security worries stand in the way of their ability to achieve their cloud-related goals. Nowadays, a lot of organizations think…
Ahmedabad Creates History as India’s First City With AI-Linked Surveillance System
The largest city in the Indian state of Gujarat, Ahmedabad, made history by being the first to install a surveillance system connected to artificial intelligence (AI). In order to enhance public safety and security, the city has teamed up…
With Deepfakes on Rise, Where is AI Technology Headed?
Where is the Artificial Intelligence Headed? Two words, ‘Artificial’ and ‘Intelligence’, together have been one of the most evident buzzwords that have been driving lives and preparing the world for the real ride ahead, and that of the world economy. …
A Delhi Lawyer’s Encounter Exposes Hidden Perils of SIM Swap Scam
In the contemporary landscape dominated by digital interconnectedness, the escalating menace of cybercrime has assumed unprecedented proportions. The latest threat on the horizon is the insidious ‘SIM Swap’ scam, an advanced scheme exploiting vulnerabilities in the telecommunications system. In…
Identity Crisis: 14 Million Individuals at Risk After Mortgage Lender’s Data Breach
Mr Cooper, the private mortgage lender, has now admitted almost 14.7 million individuals’ private data has been stolen in a previous IT security breach, which resulted in the theft of their addresses and bank account numbers, but it is…
Records of Crucial Cases May Have Been Compromised by a Cyberattack on Victoria’s Court System
Ransomware used to assault Victoria’s court system An independent expert believes that ransomware was used to assault Victoria’s court system and that the attack was coordinated by Russian hackers. According to a representative for Court Services Victoria (CSV), hackers gained…
Future Health: AI’s Impact on Personalised Care in 2024
As we dive into the era of incorporating Artificial Intelligence (AI) into healthcare, the medical sector is poised for a profound transformation. AI holds immense potential in healthcare, offering groundbreaking advancements in diagnostics, personalised treatment approaches, and streamlined administrative…
“Pink Drainer” Siphons $4.4 Million Chainlink Through Phishing
Pink Drainer, the infamous crypto-hacking outfit, has been accused in a highly sophisticated phishing scheme that resulted in the theft of $4.4 million in Chainlink (LINK) tokens. This recent cyber crime targeted a single victim who was duped into…
Hangzhou’s Cybersecurity Breakthrough: How ChatGPT Elevated Ransomware Resolution
The Chinese media reported on Thursday that local police have arrested a criminal gang from Hangzhou who are using ChatGPT for program optimization to carry out ransomware attacks for the purpose of extortion. An organization in the Shangcheng district…
Zeppelin2 Ransomware: An Emerging Menace in the Dark Web Ecosystem
In a recent update from an underground online forum, a user is actively promoting the sale of Zeppelin2 ransomware, providing both its source code and a cracked version of its builder tool. This malicious software, known for its destructive…
Comcast-Owned Telcom Business ‘Xfinity’ Suffers Data Breach
Comcast-owned Xfinity has suffered a major data breach, affecting more than 25 million of its customers. This intrusion not only demonstrates a risky and expanding practice among hackers, but it has also greatly increased the vulnerability of millions of US-based…
Learn How to Decrypt Black Basta Ransomware Attack Without Paying Ransom
Researchers have created a tool designed to exploit a vulnerability in the Black Basta ransomware, allowing victims to recover their files without succumbing to ransom demands. This decryption tool potentially provides a remedy for individuals who fell victim to Black…
Time to Guard : Protect Your Google Account from Advanced Malware
In the ever-changing world of cybersecurity, a new type of threat has emerged, causing serious concerns among experts. Advanced malware, like Lumma Stealer, is now capable of doing something particularly alarming – manipulating authentication tokens. These tokens are like…
Google Patches Around 100 Security Bugs
Updates were released in a frenzy in December as companies like Google and Apple scrambled to release patches in time for the holidays in order to address critical vulnerabilities in their devices. Giants in enterprise software also released their fair…
New DLL Search Order Hijacking Variant Evades Windows 10 and 11 Protections
Security researchers have outlined a fresh variant of a dynamic link library (DLL) search order hijacking technique, potentially enabling threat actors to circumvent security measures and execute malicious code on computers running Microsoft Windows 10 and Windows 11. The…