In the ongoing battle against cyber threats, government and corporate heads are increasingly turning to artificial intelligence (AI) and machine learning (ML) for a stronger defense. However, the companies are facing a trio of significant hurdles. Firstly, the reliance…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Threatening Emails Rattle Bengal Schools: Police Pursue Latvia Lead
In a statement announced Tuesday, the Kolkata Police said that more than 20 schools across the city have been threatened with bombs, which have been later revealed as hoaxes. According to the sender, bombs had been placed in numerous…
Look Out For SIM Swap Scams: Tips for Bitcoin Security
In today’s digitised world, safeguarding personal information and digital assets is of great importance. One emerging threat is the SIM swap scam, a sophisticated form of identity theft where fraudsters manipulate mobile carriers to transfer a victim’s phone number…
91,000 Smart LG TV Devices Susceptible to Unauthorised Remote Access
New vulnerabilities have been discovered in LG TVs that could allow unauthorised access to the devices’ root systems, possibly exposing thousands of units worldwide. The finding, made as part of Bitdefender’s continuing inspection of the popular Internet of Things…
Under Siege: Ukrainian Cyber Warriors Erase Vital Russian Military Data Center
On April 8 of this year, sources in the Ukrainian Security Service of Ukraine (SBU) told the Kyiv Independent that Ukrainian hackers, possibly linked to the SBU, destroyed a data centre used by Russian military, energy, and telecommunications companies.…
Sidestepping SharePoint Security: Two New Techniques to Evade Exfiltration Detection
Recently, Varonis Threat Labs uncovered two novel techniques that allow threat actors to sidestep SharePoint security controls, evading detection while exfiltrating files. In this blog, we delve into these techniques and explore their implications for organizations relying on SharePoint for…
India’s Businesses Under Huge Cyber Threats, Kaspersky Reported
Indian businesses are being warned about the looming threat of ransomware attacks by cybersecurity experts. These attacks not only jeopardize company data but also pose a serious risk to user information. To address this urgent issue, experts stress the importance…
LinkedIn Users Targeted in Complex Phishing Scheme
LinkedIn Users Targeted in Complex Phishing Scheme A concerning security threat has emerged for users of the professional networking platform LinkedIn. Known as the “Microsoft Two-Step Phishing Campaign,” this attack involves hackers using compromised profiles to deceive users and…
Fostering Cybersecurity Culture: From Awareness to Action
The recent film “The Beekeeper” opens with a portrayal of a cyberattack targeting an unsuspecting victim, highlighting the modern challenges posed by technology-driven crimes. The protagonist, Adam Clay, portrayed by Jason Statham, embarks on a mission to track down…
E-commerce Breach: Hackers Target Magento, Steal Payment Data
In a concerning development for e-commerce security, hackers have been discovered exploiting a critical flaw in the popular Magento platform, leaving numerous online stores vulnerable to data breaches. The vulnerability, identified as CVE-2024-20720 with a severity score of 9.1,…
Hackers Siphon 340,000 Social Security Numbers From U.S. Consulting Firm
Greylock McKinnon Associates (GMA) has discovered a data breach in which hackers gained access to 341,650 Social Security numbers. The data breach was disclosed last week on Friday on Maine’s government website, where the state issues data breach notifications.…
Posthumous Data Access: Can Google Assist with Deceased Loved Ones’ Data?
Amidst the grief and emotional turmoil after loosing a loved one, there are practical matters that need to be addressed, including accessing the digital assets and accounts of the deceased. In an increasingly digital world, navigating the complexities of…
Combatting iPhone Scams: Steps Towards Enhanced Security
The latest revelation in the realm of iPhone scams comes in the form of MFA (Multi-Factor Authentication) bombing. This sophisticated threat targeting Apple users underscores the need for heightened awareness and informed responses. Apple has promptly responded to the…
Security Advisory: Protecting Mobile Devices for UAE Residents
In a security update released by Microsoft on Thursday, 61 high-risk vulnerabilities, including critical ones, were addressed. The cyber threat actor may be able to exploit some of these vulnerabilities to gain control of a computer that has been…
The Fake E-Shop Scam Campaign Sweeping Southeast Asia, seizing users banking details
In recent years, cybercriminals have been increasingly employing sophisticated tactics to target individuals and organizations across the globe. One such alarming trend is the proliferation of fake e-shop scam campaigns, particularly prevalent in Southeast Asia. These campaigns, characterized by…
Privacy is ‘Virtually Impossible’ on iPhones, Experts Warn
Keeping your data hidden from Apple is ‘virtually impossible’, experts have warned. A groundbreaking study reveals that the default apps on iPhones, iPads, and MacBooks collect personal data even when they appear to be disabled. In a world where privacy…
