In terms of versatility, the Internet of Things (IoT) is a technology that is easily one of the most versatile technologies in the world today. In the era of the internet, the network connection capacity is increasing and the…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Navigating the Delicate Balance: Transparency and Information Security in NATO
In the complex world of international relations and military alliances, NATO (North Atlantic Treaty Organization) is a critical pillar of collective defense. As NATO conducts its largest military exercise since 1988, the Steadfast Defender Exercise, it grapples with a fundamental…
Apple iOS and iPadOS Memory Corruption Vulnerabilities: A Critical Alert
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) raised the alarm by adding two such vulnerabilities in Apple’s iOS and iPad to its Known Exploited Vulnerabilities catalog. These vulnerabilities are actively exploited, posing significant risks to users’ privacy, data, and…
Security Concerns Arise Over Chinese-Manufactured Surveillance Cameras Deployed at Romanian Military Locations
A routine procurement made by the Romanian military on January 16 for surveillance equipment manufactured in China has sparked concerns regarding national security implications. Valued at under $1,000, an employee of the Romanian Defense Ministry purchased an eight-port switch…
Microsoft Claims Russian Hackers are Attempting to Break into Company Networks.
Microsoft warned on Friday that hackers affiliated to Russia’s foreign intelligence were attempting to break into its systems again, using data collected from corporate emails in January to seek new access to the software behemoth whose products are widely…
Technical Glitch Causes Global Disruption for Meta Users
In a recent setback for Meta users, a widespread service outage occurred on March 5th, affecting hundreds of thousands worldwide. Meta’s spokesperson, Andy Stone, attributed the disruption to a “technical issue,” apologising for any inconvenience caused. Shortly after the…
Signal Protocol Links WhatsApp, Messenger in DMA-Compliant Fusion
As part of the launch of the new EU regulations governing the use of digital “gatekeepers,” Meta is ready to answer all of your questions about WhatsApp and Messenger providing end-to-end encryption (E2EE), while also complying with the requirements…
Microsoft Employee Raises Alarms Over Copilot Designer and Urges Government Intervention
Shane Jones, a principal software engineering manager at Microsoft, has sounded the alarm about the safety of Copilot Designer, a generative AI tool introduced by the company in March 2023. His concerns have prompted him to submit a letter…
CSI/NSA Joint Best Practices for Cloud Security
The NSA and CISA have released a set of five cybersecurity bulletins to help make cloud environments safer. These bulletins share important tips for keeping cloud systems secure, which are used a lot by businesses. Cloud services are popular…
TeamCity Software Vulnerability Exploited Globally
Over the past few days a security breach has transpired, hackers are taking advantage of a significant flaw in TeamCity On-Premises software, allowing them to create unauthorised admin accounts. This flaw, known as CVE-2024-27198, has prompted urgent action from…
Former Google Employee Charged with Stealing AI Secrets
A former Google software engineer has been charged with stealing the company’s artificial intelligence trade secrets while surreptitiously working for two Chinese companies, the Justice Department announced Wednesday. Linwei Ding, a Chinese national, was arrested in Newark, California, for…
Ransomware Group Stormous Takes Responsibility for Cyberattack on Belgian Brewery
Stormous, a ransomware group, has admitted to orchestrating the cyber assault on Duvel Moortgat Brewery last Wednesday. Fortunately for beer enthusiasts, the brewery has ample stock to withstand the disruption. The ransom group announced their involvement via the dark…
China State-Sponsored Spies Hack Site and Target User Systems in Asia
Chinese threat actors strike again Users of a Tibetan language translation app and website visitors to a Buddhist festival were compromised by a focused watering-hole malware connected to a Chinese threat group. According to recent data from ESET, the so-called…
South St. Paul Public Schools Grapple with Ongoing Tech Disruption
South St. Paul Public Schools recently alerted families to ongoing technology disruption, shedding light on potential disruptions to online platforms, emails, and other digital services. In a note on Monday, the district acknowledged technical difficulties and later revealed the…
Fidelity Faces Second Data Breach Linked to Third-Party Provider: Infosys McCamish
Fidelity Investments Life Insurance Company (FILI) faces another data breach challenge as it discloses a breach affecting a significant number of individuals. The breach, linked to third-party service provider Infosys McCamish (IMS), heightens worries over data security in today’s…
New Email Scam Targets NTLM Hashes in Covert Data Theft Operation
TA577 has been identified as a notorious threat actor who orchestrated a sophisticated phishing campaign, according to researchers at security firm Proofpoint. Currently, the group is utilizing a new method of phishing involving ZIP archive attachments. This tactic is…
NSA Shares Key Strategies for Improved Network Security
The National Security Agency (NSA) has rolled out a comprehensive roadmap to strengthen internal network security. Stepping away from the traditional trust-all model, the focus is on embracing a cutting-edge zero-trust framework. This transformative approach assumes the presence of…
Researchers Develop AI “Worms” Capable of Inter-System Spread, Enabling Data Theft Along the Way
A team of researchers has developed a self-replicating computer worm designed to target AI-powered applications like Gemini Pro, ChatGPT 4.0, and LLaVA. The aim of this project was to showcase the vulnerabilities in AI-enabled systems, particularly how interconnections between…
Canadian City Says Timescale for Recovering from Ransomware Attack ‘Unknown’
The Canadian city of Hamilton is still getting over a ransomware attack that compromised nearly every facet of municipal operations. Since February 25, when the ransomware attack was first reported, city officials have been working nonstop. Foundational services, such…
GhostLocker 2.0 Unleashes Cyber Haunting Spree in the Middle East, Africa, and Asia
A new version of the infamous GhostLocker ransomware has been developed by cyber criminals, and they are now targeting users across the Middle East, Africa, and Asia with this ransomware. With the help of the new GhostLocker 2.0 ransomware,…