In a surprising turn of events, the use of removable media, particularly USB devices, has resurged as a favoured tactic among industrial cyber attackers. Honeywell’s recently released “2024 USB Threat Report” sheds light on this concerning trend, emphasizing its…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Apple Working to Patch Alarming iPhone Issue
Apple claims to be working rapidly to resolve an issue that resulted in some iPhone alarms not setting off, allowing its sleeping users to have an unexpected lie-in. Many people rely on their phones as alarm clocks, and some…
No MFA, No Defense: Change Healthcare Falls Victim to Citrix Account Hijacking
A UnitedHealth spokesperson confirmed that the black cat ransomware gang had breached Change Healthcare’s network, using stolen credentials to get into the company’s Citrix remote access service, which was not set up to support multi-factor authentication. It was revealed…
Safeguarding Your Employee Data From Identity Theft
In today’s digital age, where data breaches and cyberattacks are increasingly common, safeguarding against identity-based attacks has become paramount for organizations worldwide. Identity-based attacks, which involve the unauthorized access to sensitive information through compromised user credentials, pose significant risks…
Microsoft Alerts Users as Russian Hackers Target Windows Systems
As advancements in AI technology continue to unfold, the specter of cybercrime looms larger each day. Among the chorus of cautionary voices, Microsoft, the eminent IT behemoth, adds its warning to the fray. Microsoft’s Threat Intelligence researchers have issued…
North Korean Scammers Lure Developers with Fake Job Offers
A new cyber scam, dubbed “Dev Popper,” is preying on software developers through fake job interviews. This elaborate ruse, masquerading as genuine employment opportunities, aims to infiltrate the victim’s computer with a harmful Python backdoor, posing serious cyber threats. How…
Okta Alert: The Rise of Credential Stuffing Attacks Through Proxy Networks
According to Okta’s user warning, the availability of residential proxy services, stolen credentials, and scripting tools has led to an increase in credential-stuffing assaults that target online services. The Okta research team noticed a rise in credential-stuffing attempts against Okta…
Safeguarding Reproductive Health Workers: Addressing Risks Posed by Data Brokers and Doxxing
In today’s interconnected digital landscape, the acquisition and dissemination of personal data have reached unprecedented levels, posing significant risks to individuals across various sectors, including reproductive health workers. At the forefront of this modern dilemma are entities known as…
GM Car Buyers’ Nightmare: The Unveiling of a Program Raising Insurance Rates
It is believed that auto manufacturers are selling millions of pieces of data to the insurance industry about the driving behaviours of their customers. It is my responsibility to report the story about GM sharing driving data from connected…
Is ChatGPT Secure? Risks, Data Safety, and Chatbot Privacy Explained
You’ve employed ChatGPT to make your life easier when drafting an essay or doing research. Indeed, the chatbot’s ability to accept massive volumes of data, break down it in seconds, and answer in natural language is incredibly valuable. But…
User Privacy Threats Around T-Mobile’s ‘Profiling and Automated Decisions’
In today’s digital age, it is no secret that our phones are constantly tracking our whereabouts. GPS satellites and cell towers work together to pinpoint our locations, while apps on our devices frequently ping the cell network for updates on…
Quantum Technology: Implications for Digital Security
In our modern, highly connected world, where online transactions are everywhere, the looming presence of quantum computing casts a momentous shadow. Unlike classical computers, which rely on bits to process information, quantum computers leverage the peculiar properties of quantum…
Fraudulent npm Packages Deceive Software Developers into Malware Installation
A new cyber threat dubbed DEV#POPPER is currently underway, targeting software developers with deceitful npm packages disguised as job interview opportunities, aiming to dupe them into downloading a Python backdoor. Securonix, a cybersecurity firm, has been monitoring this activity…
Redefining Education: The AI Revolution in Classrooms Everywhere
There is a new report from the World Economic Forum that discusses how artificial intelligence can revolutionize education systems and help educators and students have a better experience. AI has a huge amount of potential, ranging from personalizing learning…
Dutch Threat Experts Issues Warning to Companies Regarding Ransomware Attack
Thousands of companies have received alerts about a global ransomware attack from the Dutch cybersecurity agencies. The perpetrators, known as the Cactus Gang, hail from Eastern Europe and have been operating since the end of last year. The gang…
Ransomware Strikes St-Jerome Company: Everest Group Suspected
Les Miroirs St-Antoine Inc., a longstanding company in the St-Jérôme region, is grappling with the aftermath of an alleged ransomware attack orchestrated by the infamous Everest Group. Founded in 1956, Les Miroirs St-Antoine specializes in glazing and aluminum products…
Protecting Users Against Bugs: Software Providers’ Scalable Attempts
Ransomware assaults, such as the one on Change Healthcare, continue to create serious disruptions. However, they are not inevitable. Software developers can create products that are immune to the most frequent types of cyberattacks used by ransomware gangs. This blog…
Qlik Sense Servers Prone To Cactus Ransomware Threats
Security experts are urgently warning about the vulnerability of thousands of Qlik Sense servers to potential ransomware attacks by the troubling Cactus group. Despite prior disclosures of vulnerabilities by Qlik, many organisations remain at risk due to unpatched systems.…
Defense-in-Depth: A Layered Approach for Modern Cybersecurity
The cybersecurity landscape has shifted dramatically in recent years. Malware, phishing attempts, and data breaches have grown in frequency and scope, prompting organisations to invest more time and money into enhancing their cybersecurity strategies. Organisations should be aware of…
Japanese Authorities Deploy Counterfeit Payment Cards to Alert Victims of Support Scams
Japanese police has initiated a unique strategy involving the placement of counterfeit payment cards in convenience stores to safeguard elderly individuals from tech support scams and unpaid money fraud. These fake cards, labeled as “Virus Trojan Horse Removal Payment…