Tag: CySecurity News – Latest Information Security and Hacking Incidents

Why Deleting Your Temu Account Might Be the Best Move

In the digital age, online marketplaces have revolutionized the way we shop. One such platform is Temu, a popular e-commerce site that promises convenience and variety. However, recent revelations have shed light on some concerning aspects of Temu. If you’re…

Deepfakes and AI’s New Threat to Cyber Security

  With its potential to manipulate reality, violate privacy, and facilitate crimes like fraud and character assassination, deepfake technology presents significant risks to celebrities, prominent individuals, and the general public. This article analyses recent incidents which bring such risks to…

How Attackers Distribute Malware to Foxit PDF Reader Users

  Threat actors are exploiting a vulnerability in Foxit PDF Reader’s alert system to deliver malware through booby-trapped PDF documents, according to researchers at Check Point. The researchers have identified several campaigns targeting Foxit Reader users with malicious PDF files.…

AI Enables the Return of Private Cloud

  Private cloud providers may be among the primary winners of today’s generative AI gold rush, as CIOs are reconsidering private clouds, whether on-premises or hosted by a partner, after previously dismissing them in favour of public clouds.  At the…

Watch Out for Cyber Scams Impersonating Police

The Ministry of Home Affairs (MHA) has raised an alarm regarding a spike in cybercrime, where fraudsters impersonate law enforcement officers to extort money from unsuspecting victims. Collaborating with Microsoft, the Indian Cyber Crime Coordination Centre (I4C) has already taken…

Cyber Attack Disrupts Christie’s £670m Art Auctions

  Auction house Christie’s is grappling with significant disruptions in its attempt to sell art and high-value items worth an estimated $840 million (£670 million) due to a sophisticated cyberattack. This incident has significantly impacted their spring auctions, which feature…

Hackers Tracking Victims with DNS Tricks

  Cybercriminals have adopted a highly intricate technique known as DNS tunnelling to carry out malicious activities such as tracking victims and scanning network vulnerabilities, posing a significant threat to cybersecurity. DNS tunnelling involves the encoding of data or commands…

Can Legal Measures Slow Down Cybercrimes?

  Cybercrime has transpired as a serious threat in India, prompting calls for comprehensive reforms and collaborative efforts from various stakeholders. Experts and officials emphasise the pressing need to address the evolving nature of cyber threats and strengthen the country’s…

Ransomware Attacks Now Targeting Corporate Executives’ Children

  Mandiant, a prominent cybersecurity firm and subsidiary of Google, highlights the escalating creativity of malicious hackers as corporations reinforce their cyber defenses. These hackers have extended their targets to include the children of corporate executives, employing ransomware tactics to…

Predictive AI: What Do We Need to Understand?

We all are no strangers to artificial intelligence (AI) expanding over our lives, but Predictive AI stands out as uncharted waters. What exactly fuels its predictive prowess, and how does it operate? Let’s take a detailed exploration of Predictive AI,…

Emphasizing Post-Breach Strategies in Cybersecurity

  Cybersecurity discourse heavily emphasizes prevention, yet often neglects post-breach strategies. While we invest significant effort in establishing protocols to avert attacks, breaches remain an unavoidable reality. The “IBM Cyber Security Intelligence Index” report highlights human error as a leading…

Dell Data Breach Exposes Personal Information Of 49 Million

  Dell, the renowned computer manufacturer, has issued a cautionary notice to its customers regarding a disconcerting data breach. The breach, which affects an estimated 49 million customers, involves unauthorised access to an online portal containing sensitive customer information. Dell…

Microsoft Introduces Innovative AI Model for Intelligence Analysis

  Microsoft has introduced a cutting-edge artificial intelligence (AI) model tailored specifically for the US intelligence community, marking a leap forward in secure intelligence analysis. This state-of-the-art AI model operates entirely offline, mitigating the risks associated with internet connectivity and…

Why Active Directory Is A Big Deal?

  In a cutting-edge study by XM Cyber and the Cyentia Institute, a comprehensive analysis has unveiled a startling reality: a staggering 80% of cybersecurity vulnerabilities within organisations stem from issues related to Active Directory. This might sound like tech…

Malware Lurking in Minecraft Source Packs

In the world of gaming, customization is king. Players love tweaking their favourite games to make them even more exciting. But while mods and customizations can enhance your gaming experience, they can also hide dangerous threats. A new version of…

US Authorities Charge LockBit Ransomware Ringleader

  US officials have uncovered and indicted the ringleader of LockBit, a widespread ransomware operation that has extorted victims out of half a billion dollars. He is facing over two dozen criminal charges.  According to a 26-count indictment released on…

Microsoft to Enforce Executive Accountability for Cybersecurity

  Microsoft is undergoing organizational adjustments to enhance cybersecurity measures throughout its products and services, focusing on holding senior leadership directly responsible. Charlie Bell, Microsoft’s executive vice president of security, outlined these changes in a recent blog post aimed at…

Chinese Attackers Deployed Backdoor Quintet to Down MITRE

  China-linked hackers used a variety of backdoors and Web shells to compromise the MITRE Corporation late last year.  Last month, it was revealed that MITRE, widely known for its Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework, had been…

MITRE Links Recent Attack to China-Associated UNC5221

  MITRE recently provided further insight into the recent cyber intrusion, shedding light on the new malicious software employed and a timeline detailing the attacker’s actions. In April 2024, MITRE announced a breach in one of its research and prototyping…

New Attack Renders Most VPN Apps Vulnerable

  A new attack, dubbed TunnelVision, has materialised as a threat to the security of virtual private network (VPN) applications, potentially compromising their ability to protect user data. Researchers have detected vulnerabilities affecting nearly all VPN apps, which could allow…

ATM Card Trap Scam: How to Stay Safe

ATMs have become an integral part of our lives. They provide convenient access to cash and banking services. However, criminals are always finding new ways to exploit technology for their gain. One such deceptive scheme is the ATM card trap…

Scammers Targeting WhatsApp Groups in UK

  When businessman Mohammed Yousaf received an urgent plea for assistance from one of his oldest friends, he rushed to the rescue. The 56-year-old received a WhatsApp message from the account of a man he had been friends with for…

Are The New AI PCs Worth The Hype?

  In recent years, the realm of computing has witnessed a remarkable transformation with the rise of AI-powered PCs. These cutting-edge machines are not just your ordinary computers; they are equipped with advanced artificial intelligence capabilities that are revolutionizing the…

Here’s Why You Shouldn’t Trust VPNs Blindly

  In an era where we should be gravely concerned about online privacy and security, Virtual Private Networks (VPNs) have come through as indispensable tools for safeguarding digital identities. However, amidst the buzz of VPN advertisements promising invincibility against cyber…

Backdoor Malware: Iranian Hackers Disguised as Journalists

Crafting convincing personas APT42, an Iranian state-backed threat actor, uses social engineering attacks, including posing as journalists, to access corporate networks and cloud environments in Western and Middle Eastern targets. Mandiant initially discovered APT42 in September 2022, reporting that the…

Are Big Tech Companies Getting Rich from AI?

  Big Tech companies like Amazon, Microsoft, and Alphabet have showcased impressive earnings, with a substantial boost from their advancements in artificial intelligence (AI) technology. Amazon’s quarterly report revealed a 13% increase in net sales, primarily attributed to its AWS…