Tag: CySecurity News – Latest Information Security and Hacking Incidents

Mr. Cooper Data Breach: 14 Million Customers Exposed

A major data breach at mortgage giant Mr. Cooper compromised the personal data of an astounding 14 million consumers, according to a surprising disclosure. Sensitive data susceptibility in the digital age is a worry raised by the occurrence, which has…

Digital Landline Switch Halted for Vulnerable Users in UK

UK- based phone companies have halted vulnerable customers from switching to digital landlines following “serious incidents” where telecare devices stopped working. These devices, which can be used to call for assistance in an emergency, are estimated to be utilized by…

Unveiling Storm-1152: A Top Creator of Fake Microsoft Accounts

  The Digital Crimes Unit of Microsoft disrupted a major supplier of cybercrime-as-a-service (CaaS) last week, dubbed Storm-1152. The attackers had registered over 750 million fake Microsoft accounts, which they planned to sell online to other cybercriminals, making millions of…

Telus Makes History with ISO Privacy Certification in AI Era

Telus, a prominent telecoms provider, has accomplished a significant milestone by obtaining the prestigious ISO Privacy by Design certification. This certification represents a critical turning point in the business’s dedication to prioritizing privacy. The accomplishment demonstrates Telus’ commitment to implementing…

Kraft Heinz Investigates Cybersecurity Threat

Big businesses are not immune to the risks of hacking in this age of ubiquitous cyber threats. Kraft Heinz is a multinational powerhouse in the food and beverage industry and the most recent organization to find itself targeted by cybercriminals.…

Mobile Security Alert: CERT-In Flags Risks in Top Brands

The Indian Computer Emergency Response Team (CERT-In) has discovered security flaws in high-profile smartphone brands, including Samsung, Apple, and Google Pixel devices. After carefully analyzing these devices’ security features, CERT-In has identified certain possible weaknesses that can jeopardize user privacy…