Threat actors responsible for attacking Ledger’s connector library have stolen assets valued at approximately $484,000. This information was given by the blockchain analysis platform Lookonchain. Ledger has said that the security breach might have a large effect, possibly totalling hundreds…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cybersecurity Incident Causes Outage at Lesotho’s Central Bank
Lesotho’s central bank is grappling with widespread disruptions following a cyberattack detected earlier this week. The landlocked country, surrounded by South Africa and home to over 2 million people, disclosed multiple statements acknowledging the impact of the recent cyber…
Microsoft Shuts Down a Criminal Ring Responsible for Creating Over 750 Million Fake Accounts
Microsoft Corp. has shut down a cybercrime group’s US-based infrastructure, which created more than 750 million fake accounts across the company’s services. Microsoft carried out the takedown with the support of Arkose Labs Inc., a venture-backed cybersecurity firm. The…
China Issues Alert on Geographical Information Data Breaches Impacting Transportation and Military
China has recently issued a stern warning regarding the use of foreign geographic software, expressing serious concerns about the potential leakage of critical information related to its essential infrastructure and military. The Ministry of State Security, while refraining from…
Digital Guardianship: A Call to Arms for Safeguarding Our Children’s Future
It is no longer news that children’s lives are becoming increasingly impacted by the digital realm in our modern world. There are a wide array of educational resources, entertainment, and social connections available on the Internet. Despite this, it…
Securing Generative AI: Navigating Risks and Strategies
The introduction of generative AI has caused a paradigm change in the rapidly developing field of artificial intelligence, posing both unprecedented benefits and problems for companies. The need to strengthen security measures is becoming more and more apparent as these…
OAuth App Abuse: A Growing Cybersecurity Threat
User data security has grown critical in an era of digital transactions and networked apps. The misuse of OAuth applications is a serious danger that has recently attracted attention in the cybersecurity field. OAuth (Open Authorization) is a widely used…
Ransomware Groups are Using PR Charm Tactic to Put Pressure on Victims to Pay Ransom
Recently, ransomware groups have been increasingly adopting newer tactics, one of them being the transparent, quasi-corporate strategy with the media, with the benefits of building pressure on the victims to pay ransom. According to a report, released this week by…
Rise of OLVX: A New Haven for Cybercriminals in the Shadows
OLVX has emerged as a new cybercrime marketplace, quickly gaining a loyal following of customers seeking through the marketplace tools used to conduct online fraud and cyberattacks on other websites. The launch of the OLVX marketplace follows along with…
LockBit is Recruiting Members of ALPHV/BlackCat and NoEscape Ransomware Outfit
Recruiting affiliates and developers from the troubled BlackCat/ALPHV and NoEscape ransomware operations is one of the calculated steps being taken by the LockBit ransomware group. An ideal opportunity emerged for LockBit to expand its network due to the recent…
China Issues Warning About Theft of Military Geographic Data in Data Breaches
China issued a cautionary notice regarding the utilization of foreign geographic software due to the discovery of leaked information concerning its critical infrastructure and military. The Ministry of State Security, while refraining from assigning blame, asserted that the implicated…
Apple’s Push Notification Data Used to Investigate Capitol Rioters; Apple Sets Higher Legal bar
When it initially came to light that governments globally demanded push notification data from Apple and Google, suspicion mounted that the US government was doing the same. This has now been confirmed, with one use of it being the monitoring…
MrAnon Stealer Propagates via Email with Fake Hotel Booking PDF
FortiGuard Labs cybersecurity experts have discovered a sophisticated email phishing scheme that uses fraudulent hotel reservations to target unsuspecting victims. The phishing campaign involves the deployment of an infected PDF file, which sets off a chain of actions that…
Epic Games Wins: Historic Decision Against Google in App Store Antitrust Case
The conflict between tech behemoths Google and Apple and Fortnite creator Epic Games is a ground-breaking antitrust lawsuit that has rocked the app ecosystem. An important turning point in the dispute occurred when a jury decided to support the gaming…
The Dark Side of Digital Reading: E-Books as Corporate Surveillance Tools
There is an electronic trail behind every single reader when they read a newspaper online, buy an eBook, or watch a video on their computer. For companies and law enforcement agencies alike, this trail is likely to be a…
Custom GPTs Might Coarse Users into Giving up Their Data
In a recent study by Northwestern University, researchers uncovered a startling vulnerability in customized Generative Pre-trained Transformers (GPTs). While these GPTs can be tailored for a wide range of applications, they are also vulnerable to rapid injection attacks, which can…
China Launches Probe into Geographic Data Security
China has started a security investigation into the export of geolocation data, a development that highlights the nation’s rising concerns about data security. The probe, which was made public on December 11, 2023, represents a major advancement in China’s attempts…
New Surveillance Reform Bill Raises Concerns Regarding Americans Data Privacy
Spies might be made out of regular employees at US companies if the recently proposed and approved legislation by the House Intelligence Committee greatly expands the federal government’s surveillance powers, experts warn. The legislation, called H.R. 6611 or the…
Sandman APT Gains Traction: Chinese Hackers Amplify Cybersecurity Risks
It has been discovered that there is a strong coincidence in the targeting and tactics of Sandman, a mysterious advanced persistent threat (APT) that has been identified to use backdoors referred to as “Keypluggs,” and KEYPLUG, a China-based threat…
How are the AI-powered Robocop Keeping New York’s Busiest Subway Station Safe?
Sharing her experience with the AI-powered robot cop in a New York subway station, ZDNET’s Nina Raemont reported of the robot – K5 – patrolling in The Times Square-42nd St. subway station’s mostly deserted mezzanine. It was pacing swiftly from…