The auto industry is failing to give drivers control over their data privacy, according to researchers warning that modern cars are “wiretaps on wheels.” An analysis published on Wednesday revealed that in an era when driving is becoming increasingly…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Here’s How Hackers Sell and Trade Your Data in the Metaverse
Your data might be lost in the metaverse, a place where reality takes on new forms and lovely virtual landscapes arise. Imagine yourself in a bustling digital marketplace, surrounded by avatars dressed in the latest digital attire. A secret…
Unveiling the DarkGate Malware Phishing Attack on Microsoft Teams
Cybercriminals have focused on Microsoft Teams, a widely used tool for remote collaboration, in a recent round of cyber assaults. This well-known tool is being used by a crafty phishing campaign to spread the dangerous DarkGate ransomware. This cunning scheme…
Vishing Scams: Here’s How to Spot & Defend Against Them
Vishing (voice or VoIP phishing) is a sort of cyber attack that uses voice and telephony technologies to deceive targeted persons into disclosing sensitive data to unauthorized entities. The information could be personal, such as a Social Security number…
Understanding HTTPS Spoofing: A Deceptive Online Threat
Online security is no longer a luxury but an absolute necessity in today’s digital age. For the average internet user, spotting the reassuring green padlock symbol and the “https://” prefix in their browser’s address bar has become a common…
Cisco: Leadership Awareness Fuels the Booming Identity Market
The latest research conducted by Cisco Investments with venture capital firms reveals that most CISOs believe complexity in tools, number of solutions and technical glossaries are among the many barriers to zero trust. It has been observed that around 85%…
Online Hackers Target Microsoft Teams to Propagate DarkGate Malware
Microsoft Teams conversations are being abused by a new phishing attempt to distribute malicious attachments that install the DarkGate Loader malware. When two external Office 365 accounts were found to be hijacked and were detected sending Microsoft Teams phishing…
Blockchain’s Role in Reinventing ATM Security: A Game-Changer in Banking
Blockchain technology allows for the creation of a structured data structure that is intrinsically secure. A cryptocurrency is based on the principles of cryptography, decentralization, and consensus, which is a mechanism that ensures that transactions can be trusted. Data…
Microsoft and Google’s Approach to Replace Obsolete TLS Protocols
Tech behemoths Microsoft and Google have teamed up to phase out outmoded TLS (Transport Layer Security) protocols in a decisive drive to strengthen online security. TLS protocols are essential for protecting internet connections because they guarantee that data is kept…
New York’s Geofencing Ban: A Game Changer for Advertisers
The New Law on Geofencing New York has recently passed a new provision in its state budget that prohibits advertisers from geofencing healthcare facilities. This law, which was passed in May, has made it increasingly difficult for advertisers who want…
Mirai Botnet Variant ‘Pandora’ Hijacks Android TVs
Pandora, a variant of the Mirai botnet, has been identified targeting budget-friendly Android-based television sets and TV boxes. It utilizes these devices as part of a botnet to execute distributed denial-of-service (DDoS) attacks. Mirai is a type of harmful…
Johnson & Johnson Reveals: IBM Data Breach Compromised Customer Data
Johnson & Johnson Health Care Systems (Janssen) recently informed their CarePath customers of a third-party data breach involving IBM, that has resulted in the compromise of their sensitive information. IBM is a technology service provider for Janssen. In particular, it…
Elon Musk Claims he Withheld Starlink to Deny Attack on Russian Navy Fleet
Elon Musk claimed that he turned down a proposal from the Ukrainian government to turn on his Starlink satellite network near Sevastopol, the port city of Crimea, last year in order to support an assault on the Russian navy…
From Vulnerabilities to Vigilance: Addressing Software Supply Chain Attacks
Cybersecurity experts have long been concerned about the possibility of supply chain attacks mainly due to the chain reaction that can be triggered by just one attack on one supplier, which can lead to a compromise of the entire…
LastPass Security Breach Linked to Series of Crypto Heists, Say Experts
Security experts allege that some of the LastPass password vaults, which were stolen in a security breach towards the end of 2022, have now been successfully breached, leading to a series of substantial cryptocurrency thefts. According to cybersecurity blogger…
The Cybersecurity Crisis: Dating App “Coffee Meets Bagel (CMB)” Hacked, Over 620 Million Accounts Compromised
Photo by kalhh on Pixabay In an increasingly digital world, the threat of cyber-attacks is more prevalent than ever. This article delves into an alarming case of cybersecurity breach involving a popular dating platform, which led to over 620…
Data Privacy Concerns Surround Period Tracking Apps
Period tracking apps have become increasingly popular among women seeking to monitor their menstrual cycles, plan pregnancies, or simply stay informed about their health. However, recent reports have raised serious concerns about the handling of user data by these apps.…
North Korean Threat Actors Stole $41 Million in Online Casino Heist
This week, cyber attackers set their sights on Stake.com, an online casino game and sports betting platform. They successfully made away with around $41 million in cryptocurrencies. The FBI has pinpointed North Korea and its infamous state-supported hacking group,…
Mac Users Under Attack: Malvertising Campaign Distributing Atomic Stealer Malware
An updated version of macOS stealer malware called Atomic Stealer (or AMOS) is being distributed through a new malvertising campaign. The authors of the program appear to be actively maintaining and updating malware. When the creators of AMOS found…
W3LL Store: Unmasking a Covert Phishing Operation Targeting 8,000+ Microsoft 365 Accounts
A hitherto undisclosed “phishing empire” has been identified in a series of cyber attacks targeting Microsoft 365 business email accounts spanning six years. According to a report from cybersecurity firm Group-IB, the threat actor established an underground market called…