Government spying through push notifications Government authorities have been snooping on smartphone users via push notifications sent out by applications, wrote a US senator in a letter to the Department of Justice on December 6. Senator Ron Wyden of Oregon…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Expansion of FemTech Raises Women Data Safety Concerns
Globally, women are being empowered by these modern goods and services, which range from breast pumps to fertility trackers. Still, the necessity to safeguard personal data is necessary as FemTech grows. In this article, we’ll be sharing tips on…
Bluetooth Security Flaw Strikes Apple, Linux, and Android Devices
Vulnerabilities in the constantly changing technology landscape present serious risks to the safety of our online lives. A significant Bluetooth security weakness that affects Apple, Linux, and Android devices has recently come to light in the cybersecurity community, potentially putting…
Microsoft Glass Storage: A Breakthrough Technology That Can Make Ransomware Attacks Impossible
Microsoft has issued a paper for the largely-anticipated glass-based storage tech that it’s been planning to replace the traditional technology that’s best fitted into the hard drives and best SSDs out in the market today. The academic paper (which is…
Fresh SLAM Attack Extracts Sensitive Data from AMD CPUs and Upcoming Intel Processors
Academic researchers have unveiled a novel side-channel attack named SLAM, designed to exploit hardware enhancements meant to bolster security in forthcoming CPUs from major manufacturers like Intel, AMD, and Arm. The attack aims to retrieve the root password hash…
Seoul Police Reveals: North Korean Hackers Stole South Korean Anti-Aircraft Data
South Korea: Seoul police have charged Andariel, a North Korea-based hacker group for stealing critical defense secrets from South Korea’s defense companies. Allegedly, the laundering ransomware is redirected to North Korea. One of the 1.2 terabytes of data the hackers…
iPhone Security Unveiled: Navigating the BlastPass Exploit
Apple’s iPhone security has come under scrutiny in the ever-changing field of cybersecurity due to recent events. The security of these recognizable devices has come under scrutiny because to a number of attacks, notably the worrisome ‘BlastPass’ zero-click zero-day exploit.…
Bitcoin Core Flaw Raises Concerns Regarding Blockchain Integrity
The renowned Bitcoin Core developer Luke Dashjr recently disclosed a serious flaw in the programme that he dubbed “Inscription,” which is part of the Bitcoin Core. The blockchain’s defence against spam may have a weakness, as this discovery has…
Unlocking Data Privacy: Mine’s No-Code Approach Nets $30 Million in Funding
An Israeli data privacy company, Mine Inc., has announced that it has completed a $30 million Series B fundraising round led by Battery Ventures, PayPal Ventures, as well as the investment arm of US insurance giant Nationwide, with the…
Google DeepMind Researchers Uncover ChatGPT Vulnerabilities
Scientists at Google DeepMind, leading a research team, have adeptly utilized a cunning approach to uncover phone numbers and email addresses via OpenAI’s ChatGPT, according to a report from 404 Media. This discovery prompts apprehensions regarding the substantial inclusion…
AHA, Federals Urge Healthcare Ogranizations to Minimize Citrix Bleed Vulnerability
Healthcare departments under threat The alert from the Department of Health and Human Services Health Sector Cybersecurity Coordination Center on Nov. 30 and the AHA warning on Friday come amid an outbreak of ransomware attacks alleged to involve Citrix Bleed…
IronKey: What is it & How Is It Different From Other Storage Drives
The world of online cloud storage We live in a world of online cloud storage, where all our data is accessible everywhere and on any gadget. This has made the act of having physical storage media a lesser concern than…
Hugging Face’s AI Supply Chain Escapes Near Breach by Hackers
A recent report from VentureBeat reveals that HuggingFace, a prominent AI leader specializing in pre-trained models and datasets, narrowly escaped a potential devastating cyberattack on its supply chain. The incident underscores existing vulnerabilities in the rapidly expanding field of…
Malek Team: Iran-linked Hackers Claim to Leak Medical Records From Israeli Hospital
An alleged Iran-based hacker group has claimed responsibility for stealing thousands of medical records from an Israeli hospital and leaking them on online forums. The stolen data also includes medical information of Israeli soldiers. The hospital – Ziv Medical Center…
Canadian Financial Intelligence Agency Predicts Crypto Crime to Surge Rapidly
As the use of cryptocurrency grows, more criminals are likely to start using it to raise, move, and conceal money outside of the established banking system, according to Canada’s financial intelligence agency. In a report published on Monday, the…
Navigating Ethical Challenges in AI-Powered Wargames
The intersection of wargames and artificial intelligence (AI) has become a key subject in the constantly changing field of combat and technology. Experts are advocating for ethical monitoring to reduce potential hazards as nations use AI to improve military capabilities.…
Twisted Spider’s Dangerous CACTUS Ransomware Attack
In a sophisticated cyber campaign, the group Twisted Spider, also recognized as Storm-0216, has joined forces with the cybercriminal faction Storm-1044. Employing a strategic method, they target specific endpoints through the deployment of an initial access trojan known as DanaBot. …
WALA’s Shocking Data Leak: 25GB of Personal Information from Pet Owners Revealed
The Worldwide Australian Labradoodle Association (WALA) has been the target of a new cyberattack in which private data of pet owners, pet microchip numbers, veterinarians, and testing laboratories affiliated with WALA have been leaked to the public as a…
Decrypting Breach Realities: Beyond Isolation to Collective Progress
Upon discovering that the system has been breached, the initial reaction, marked by a skipped heartbeat, often prompts a common question: What steps should be taken next? According to a recent study, over the last two years, more than half…
Cyber Intrusion: Royal Family Braces for Potential Medical Data Release
A hacker with a history of releasing private information has threatened to do so unless it receives a ransom payment of $300,000 ($380,000) in bitcoins from members of the British Royal Family, including X-rays, letters from consultants, clinical notes,…