Apple IDs serve as the gateway to our digital ecosystem. They unlock access to our beloved photos, messages, apps, and more. But what happens when that gateway suddenly slams shut, leaving us confused outside? Recently, Apple users have been struggling…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Banish Browser Clutter: How to Easily Remove Junk Files on Android
A web browser on users’ Android phones may collect data, such as cookies and cache, that can be useful, but can also be unwanted and may pose a security risk to their privacy. It is recommended that users clear…
Teachers’ Taxes Fraudulently Filed in Glendale Ransomware Attack
The Glendale Unified School District recently found itself at the center of a distressing situation when teachers, nurses, counsellors, and other faculty members received an unexpected notification from the IRS: their taxes had already been filed. What unfolded was…
Why Shouldn’t You Upload Files So Readily On Your Browser?
The digital society we live in has made it abundantly clear that being cautious about online activities goes beyond avoiding suspicious links. Recent findings by cybersecurity researchers have surfaced a new ransomware threat that exploits web browsers, potentially putting users’…
Cactus Ransomware Exposes Thousands of Vulnerable Qlik Sense Servers
Many organizations remain dangerously vulnerable to the Cactus ransomware group, despite security researchers warning of the threat five months ago. The Cactus ransomware group exploits three vulnerabilities in QlikSense’s data analytics and business intelligence platform. Two vulnerabilities were released…
Researchers Successfully Sinkhole PlugX Malware Server, Recording 2.5 Million Unique IPs
Researchers successfully seized control of a command and control (C2) server linked to a variant of the PlugX malware, effectively halting its malicious operations. Over the span of six months, more than 2.5 million connections were logged from diverse…
SpaceX Data Breach: Hunters International Publishes Alleged Stolen Data
Elon Musk’s aerospace manufacturing and space transport services firm, SpaceX, is believed to have experienced a cybersecurity incident involving a data breach with Hunters International, an infamous hacker group that allegedly released samples of the SpaceX data breach. The…
5 Attack Trends Your Company Should Be Aware Of
Cybersecurity is always evolving and demands ongoing awareness Every day, Microsoft analyzes over 78 trillion security signals to gain a deeper understanding of the current threat pathways and methodologies. Since last year, we’ve seen a shift in how threat actors…
Modern Phishing Attacks: Insights from the Egress Phishing Threat Trends Report
Phishing attacks have long been a significant threat in the cybersecurity landscape, but as technology evolves, so do the tactics employed by cybercriminals. The latest insights from the Egress Phishing Threat Trends Report shed light on the sophistication and…
North Korean Hackers Exploit LinkedIn in Targeted Attacks
The North Korean hacker group Lazarus has once again made headlines, this time for exploiting LinkedIn in their cyber operations. According to a report by blockchain security analytics firm SlowMist, Lazarus hackers are leveraging the professional networking platform to…
Deceptive npm Packages Employed to Deceive Software Developers into Malware Installation
A persistent scheme aimed at software developers involves fraudulent npm packages disguised as job interview opportunities, with the intention of deploying a Python backdoor onto their systems. Securonix, a cybersecurity company, has been monitoring this campaign, dubbed DEV#POPPER, which…
The Tech Landscape: Rubrik, TikTok, and Early-Stage Startups
The idea that the public markets are not as exclusive to tech firms as some believed was reinforced by Rubrik’s aggressive IPO pricing and the positive response it received from the public markets following its listing. If Rubrik’s outcome is…
How to Erase The Personal Details Google Knows About You
One can get a sense of the volume of data they are giving away to Google every day by considering all the things they do on Chrome, Gmail, YouTube, Google Maps, and other Google services. That is… a lot…
TCS CEO Predicts AI Revolution to Decimate India’s Call Center Industry in Just One Year
As early as next year, Tata Consultancy Services’ head said, artificial intelligence will generate a “minimal” need for call centres, as AI’s rapid advancements to date are set to disrupt a vast industry across Asia and beyond. AI’s rapid…
Safeguarding Your Digital Future: Navigating Cybersecurity Challenges
In the ever-expanding realm of technology, the omnipresence of cybercrime casts an increasingly ominous shadow. What was once relegated to the realms of imagination has become a stark reality for countless individuals and businesses worldwide. Cyber threats, evolving in…
Cybercriminals Exploit Web Hosting Platforms to Spread Malware
Cybersecurity researchers at Zscaler ThreatLabz have uncovered a concerning trend in which cybercriminals are exploiting popular web hosting and blogging platforms to disseminate malware and steal sensitive data. This sophisticated tactic, known as SEO poisoning within the realm of…
Godfather Banking Trojan Multiplies, Spreading to 1.2K Variants in 57 Nations
Over a thousand variants of the Godfather mobile banking Trojan have been detected in numerous countries worldwide, targeting a wide array of banking applications. Initially uncovered in 2022, Godfather has emerged as a pervasive malware-as-a-service tool in cybercrime circles,…
Here’s How NFTs Can Transform Asset Management
NFTs are frequently discussed in terms of their role in digital art, but beneath the surface, there is a massive, unexplored potential for revolutionising real-world asset ownership and transaction. This possibility was the focus of a recent conversation between…
Junk Ransomware: Getting the Job Done For Hackers
Sophos detects ransomware In an April 17 analysis from its Sophos X-Ops research team, cybersecurity firm Sophos observed an increase in low-cost, primitive ransomware—a boon for aspiring threat actors and a headache for defenders. It’s far more difficult to find…
The GuptiMiner Attack: Lessons Learned from a Five-Year Security Breach
In a startling revelation, security researchers from Avast have uncovered a sophisticated cyberattack that exploited vulnerabilities in the update mechanism of eScan, an antivirus service, for a staggering five years. The attack, orchestrated by unknown hackers potentially linked to…