According to a new report, SIM-swapping crimes are rising worldwide, mainly committed by eSIM (Embedded Subscriber Identity Modules) users. eSIMs are digitally stored SIM cards that are embedded using software into devices. As a result, hackers are now attempting…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cybersecurity Specialists Caught Moonlighting as Dark Web Criminals
A recent study conducted by the Chartered Institute of Information Security (CIISec) has uncovered a concerning trend in the cybersecurity field. The study reveals that many cybersecurity professionals, facing low pay and high stress, are resorting to engaging in…
The Surge of FakeBat Malware in Search-Based Malvertising Campaigns
In recent months, cybersecurity researchers have observed a concerning surge in search-based malvertising campaigns, with documented incidents nearly doubling compared to previous periods. Amidst this uptick in online threats, one particular malware variant has captured the attention of experts:…
Exploitation of Windows SmartScreen Bypass Flaw Facilitates Deployment of DarkGate RAT
The operators behind the DarkGate malware have been taking advantage of a recently patched flaw in Windows SmartScreen through a phishing scheme. This campaign involves circulating counterfeit Microsoft software installers to spread the malicious code. Researchers from Trend Micro,…
International Initiative Targets Cybercrime
The Cybercrime Atlas initiative has shifted into its operational phase in 2024, marking a significant milestone in global cybersecurity efforts. Originating from discussions at the RSA Conference two years prior, the initiative aims to dismantle cybercriminal networks by mapping…
Change Healthcare Detects Ransomware Attack Vector
The cyberattack’s widespread destruction underscores how threat actors can do significant damage by targeting a relatively unknown vendor that serves a vital operational function behind the scenes. The AlphV ransomware group disrupted basic operations to the critical systems of…
Unraveling Evolv Technology’s Alleged UK Government Testing Controversy
Evolv Technology, a prominent player in the field of AI-driven weapons-scanning technology, has found itself embroiled in controversy following revelations about its testing claims with the UK government. The company’s scanners, heralded as “intelligent” detectors capable of identifying concealed…
Restrictions on Gemini Chatbot’s Election Answers by Google
AI chatbot Gemini has been limited by Google in terms of its ability to respond to queries concerning several forthcoming elections in several countries, including the presidential election in the United States, this year. According to an announcement made…
Incognito Market Engages in Large-Scale Extortion of Buyers and Sellers on the Darknet
Taking a cue from ransomware operators, the illicit online drug marketplace known as Incognito Market has initiated a campaign of extortion targeting both its vendors and buyers. Users are being threatened with the exposure of their cryptocurrency transaction histories and…
Cyberattack is Wreaking Havoc on US HealthCare Providers.
Following a cyberattack on the largest health insurer in the United States last month, health care providers are still scrambling as insurance payments and prescription orders continue to be disrupted, costing physicians an estimated $100 million each day. According…
Latest SEC Cyber Rules Raise ‘Head Scratching’ Breach Disclosures
SEC disclosure mandate The Securities and Exchange Commission’s recently implemented cybersecurity regulations have prompted some breach disclosures from publicly traded firms, such as Microsoft and Hewlett Packard Enterprise. Among other things, the guidelines mandate that a “material” cybersecurity event be…
SMB Cyber Threats: Information-Stealing Malware, Ransomware, and BEC
In today’s digital landscape, small and medium-sized businesses (SMBs) are increasingly becoming prime targets for cybercriminals looking to exploit vulnerabilities for financial gain. A recent report from cybersecurity firm Sophos sheds light on the top cyber threats facing SMBs,…
Security Flaws Discovered in ChatGPT Plugins
Recent research has surfaced serious security vulnerabilities within ChatGPT plugins, raising concerns about potential data breaches and account takeovers. These flaws could allow attackers to gain control of organisational accounts on third-party platforms and access sensitive user data, including…
Privacy Perils: Experts Warn of Pitfalls in Sharing Pregnancy Photos Online
Taking pregnancy pictures online can even lead to the creation of a digital identity for your child that could be exploited, according to data scientists. When a child appears online, experts say it puts them at risk of identity…
Crypto Phishing Scams: $47M Lost in February
In February, cybercriminals orchestrated a series of sophisticated crypto phishing scams, resulting in a staggering $47 million in losses. These scams, often initiated through social media platforms like X (formerly Twitter), saw a dramatic 40% surge in victims compared…
Sophisticated Vishing Campaigns are Rising Exponentially Worldwide
Voice phishing, also known as vishing, is popular right now, with multiple active campaigns throughout the world ensnaring even savvy victims who appear to know better, defrauding them of millions of dollars. South Korea is one of the global…
MarineMax’s Cyber Resilience: Responding to SEC on Cyberattack Incident
MarineMax, a national retailer of boats and million-dollar yachts, reported on March 12 that a “cybersecurity incident” disrupted its operations, according to documents filed with the Securities and Exchange Commission (SEC). According to the company, unauthorized access to the…
Protect Yourself: Tips to Avoid Becoming the Next Target of a Microsoft Hack
The realm of cybersecurity, particularly within the Microsoft 365 environment, is in a constant state of evolution. Recent events involving major tech firms and cybersecurity entities underscore a crucial truth: grasping security best practices for Microsoft 365 isn’t synonymous…
Expert Urges iPhone and Android Users to Brace for ‘AI Tsunami’ Threat to Bank Accounts
In an interview with Techopedia, Frank Abagnale, a renowned figure in the field of security, provided invaluable advice for individuals navigating the complexities of cybersecurity in today’s digital landscape. Abagnale, whose life inspired the Steven Spielberg film “Catch Me…
Thinking of Stealing a Tesla? Just Use Flipper Zero
Researchers have found a new way of hijacking WiFi networks at Tesla charging stations for stealing vehicles- a design flaw that only needs an affordable, off-the-shelf tool. Experts find an easy way to steal a Tesla As Mysk Inc. cybersecurity…