The mobile industry is on the verge of a groundbreaking transformation, spearheaded by the advent of integrated SIMs, or iSIMs. According to a new report from Juniper Research, the number of iSIMs in connected devices is expected to soar…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Google Unhappy: Microsoft’s Cybersecurity Struggles: What Went Wrong?
Google released a study of Microsoft’s recent security vulnerabilities, finding that Microsoft is “unable to keep their systems and therefore their customers’ data safe.” Recent incidents have raised questions about Microsoft’s ability to safeguard its systems and protect customer data…
Why Deleting Your Temu Account Might Be the Best Move
In the digital age, online marketplaces have revolutionized the way we shop. One such platform is Temu, a popular e-commerce site that promises convenience and variety. However, recent revelations have shed light on some concerning aspects of Temu. If you’re…
Windows System Admins Targeted by Hackers Via Fraudulent PuTTy, WinSCP Ads
A ransomware attack targets Windows system administrators by using Google advertisements to promote fraudulent download sites for Putty and WinSCP. WinSCP and Putty are popular Windows applications; WinSCP is an SFTP and FTP client, while Putty is an SSH…
Slack Faces Backlash Over AI Data Policy: Users Demand Clearer Privacy Practices
In February, Slack introduced its AI capabilities, positioning itself as a leader in the integration of artificial intelligence within workplace communication. However, recent developments have sparked significant controversy. Slack’s current policy, which collects customer data by default for training…
Ransomware Attack Leaves Michigan Hospitals in Chaos Nine Days On
It is continuing to cause problems for Michigan Ascension hospitals as a result of a cyberattack, which has forced some ambulances to be diverted to other hospitals in the event of medical emergencies, delayed diagnostic imaging, and affected prescription…
Vermont’s Data Privacy Law Sparks State Lawmaker Alliance Against Tech Lobbyists
Vermont legislators recently disregarded national trends by passing the strictest state law protecting online data privacy — and they did so by using an unusual approach designed to avoid industrial pressure. The Vermont Data Privacy Law: An Overview Right to…
Bengaluru Man Arrested for Exploiting Woman in Online Interview
Panaji: In a disturbing cybercrime case, the Goa Cyber Crime Police arrested a Bengaluru resident, Mohan Raj V, for allegedly cyberbullying and extorting a woman from Goa. The arrest was made on Saturday after a strategic operation by the…
Punjab Police Break Up Two Scam Call Centers, Arrest 155 Suspects
Over the past 24 hours, Punjab police have busted two fake call centres based in Mohali operating under the cybercrime division. People settling in foreign countries were targeted by the illegal units operating from Industrial Area Phase-7 and Phase-8B…
Top Cybersecurity Risks in Edge Computing : Here’s All You Need to Know
Managing a large number of endpoints poses considerable challenges, especially in handling security logs. Over half of chief information security officers find the volume of daily alerts overwhelming, and monitoring a decentralized framework further heightens cybersecurity risks. Currently, 56%…
Engineering Giant Arup Falls Victim to £20m Deepfake Video Scam
The 78-year-old London-based architecture and design company Arup has a lot of accolades. With more than 18,000 employees spread over 34 offices worldwide, its accomplishments include designing the renowned Sydney Opera House and Manchester’s Etihad Stadium. Currently, it is…
Teaching AI Sarcasm: The Next Frontier in Human-Machine Communication
In a remarkable breakthrough, a team of university researchers in the Netherlands has developed an artificial intelligence (AI) platform capable of recognizing sarcasm. According to a report from The Guardian, the findings were presented at a meeting of the Acoustical…
IBM’s Exit from Cybersecurity Software Shakes the Industry
In an unexpected move that has disrupted the cybersecurity equilibrium, IBM has announced its exit from the cybersecurity software market by selling its QRadar SaaS portfolio to Palo Alto Networks. This development has left many Chief Information Security Officers…
Financial Institutions Now Required to Disclose Breaches Within 30 Days
The 30-Day Deadline The Securities and Exchange Commission (SEC) is demanding financial institutions to report security vulnerabilities within 30 days of discovering them. Why the Change? On Wednesday, the SEC adopted revisions to Regulation S-P, which controls how consumers’ personal…
Cybercriminals Exploit Windows Quick Assist in Latest Ransomware Campaign
A recent wave of cyberattacks has seen financially motivated criminals leveraging Windows Quick Assist, a built-in remote control and screen-sharing tool, to deploy Black Basta ransomware on victim networks. Microsoft has investigated these attacks since mid-April 2024, identifying the…
Deepfakes and AI’s New Threat to Cyber Security
With its potential to manipulate reality, violate privacy, and facilitate crimes like fraud and character assassination, deepfake technology presents significant risks to celebrities, prominent individuals, and the general public. This article analyses recent incidents which bring such risks to…
North Korean Hacker Group Kimsuky Deploys New Linux Malware ‘Gomir’ via Trojanized Software Installers
North Korean hacker group Kimsuky has unveiled a new Linux malware named “Gomir,” a variant of the GoBear backdoor. This development marks a significant advancement in the group’s cyber espionage tactics. Kimsuky, linked to North Korea’s military intelligence, the…
Banco Santander Reports Data Breach, Reaffirms Transaction Security
There was a malicious incident reported by Bank Santander that involved an individual who had accessed the data of one of its service providers. The malicious incident resulted in a data breach, which affected the bank’s customers and posed…
How Attackers Distribute Malware to Foxit PDF Reader Users
Threat actors are exploiting a vulnerability in Foxit PDF Reader’s alert system to deliver malware through booby-trapped PDF documents, according to researchers at Check Point. The researchers have identified several campaigns targeting Foxit Reader users with malicious PDF files.…
Quantum Navigation Systems: Safeguarding Against GPS Spoofing
Britain has achieved a world-first with a series of test flights that show the key technologies of a future quantum navigation system meant to counter one of the most potentially dangerous, yet little discussed, dangers to transportation: GPS jamming and…
Google Introduces Advanced Anti-Theft and Data Protection Features for Android Devices
Google is set to introduce multiple anti-theft and data protection features later this year, targeting devices from Android 10 up to the upcoming Android 15. These new security measures aim to enhance user protection in cases of device theft…
Self Proclaimed “Crypto King” Aiden Pleterski Charged With $30 Million Scam
Aiden Pleterski, also known as the “Crypto King,” and his partner, Colin Murphy, have been arrested and charged with allegedly defrauding investors of $40 million CAD (about $30 million USD) in a cryptocurrency and foreign exchange investment scam. Earlier…
Surge in Cyber Attacks on German Businesses Costs Billions of Euros
Around 80% of targeted firms have fallen victim to data theft, espionage, or sabotage, according to the German digital industry association Bitkom. Cybercrime is on the rise in Germany, with damages estimated to cost the economy €148 billion annually.…
Scammers Use Phony DocuSign Templates to Blackmail and Defraud Companies
Phishing emails impersonating DocuSign are on the rise, driven by a thriving underground market for fake templates and login credentials. In the past month, researchers from Abnormal Security have observed a significant increase in phishing attacks designed to mimic…
From Crisis to Continuity: Ascension Ransomware’s Ongoing Toll on Healthcare
In response to a recent ransomware attack that affected the care of eight Detroit-area hospitals, Ascension Michigan is providing more information about how a recent ransomware attack is affecting patient care. In May, St. Louis-based Ascension reported a major…
Hamilton Library Struggles to Restore Services After Cyberattack
Hamilton Public Library’s services have been severely disrupted for three months following a ransomware attack on the City of Hamilton’s computer systems. Public computers remain offline at all 23 library branches, and there’s no clear timeline for when these…
Singing River Health System Suffers Major Data Breach, 895,000 Impacted
A ransomware attack that took place in August 2023 is now estimated to have affected 895,204 people within the Singing River Health System. The Singing River Health System operates three hospitals in Mississippi, one in Pascagoula, one in Ocean…
AI Enables the Return of Private Cloud
Private cloud providers may be among the primary winners of today’s generative AI gold rush, as CIOs are reconsidering private clouds, whether on-premises or hosted by a partner, after previously dismissing them in favour of public clouds. At the…
Privacy and Security Risks in Chinese Electric Vehicles: Unraveling the Data Dilemma
The rapid rise of electric vehicles (EVs) has transformed the automotive industry, promising cleaner energy and reduced emissions. But as we enjoy this automotive transformation, we must also grapple with the intricate web of data collection and privacy concerns woven…
Government Struggles with Low Arrest Rate Amidst 31 Lakh Cyber Fraud Complaints
From the high-profile AIIMS cyber attack to widespread data leaks like that of the ICMR, the National Cyber Crime Portal (NCRP) has seen an alarming rise in cyber fraud complaints. Since 2020, the portal has received 31 lakh complaints…
Watch Out for Cyber Scams Impersonating Police
The Ministry of Home Affairs (MHA) has raised an alarm regarding a spike in cybercrime, where fraudsters impersonate law enforcement officers to extort money from unsuspecting victims. Collaborating with Microsoft, the Indian Cyber Crime Coordination Centre (I4C) has already taken…
Digital Arrest Scam: Bengaluru Man Loses Rs 3.8 Crore to Scammers
A 73-year-old man recently lost Rs 3.8 crore due to the ‘digital arrest’ threat posed by fraudsters impersonating law enforcement officers. The fraudsters held him under ‘digital arrest’ from May 5 to 10, saying that he was under Mumbai police…
64% of Indian Firms Hit by Ransomware in the Last Year: Sophos
A report by cybersecurity solutions vendor Sophos revealed that ransomware attacks against Indian organisations decreased to 64% this year from 73% recorded last year. As per the company’s yearly ‘State of Ransomware in India 2024′ report, victims are facing…
Cyber Attack Disrupts Christie’s £670m Art Auctions
Auction house Christie’s is grappling with significant disruptions in its attempt to sell art and high-value items worth an estimated $840 million (£670 million) due to a sophisticated cyberattack. This incident has significantly impacted their spring auctions, which feature…
LockBit Ransomware Group Challenges FBI: Opens Contest to Find Dmitry Yuryevich
LockBitSupp, the alleged administrator of the notorious LockBit ransomware group, has responded publicly to recent efforts by the Federal Bureau of Investigation (FBI) and international law enforcement to identify and apprehend him. Following the restoration of previously seized domains,…
Unjammable Navigation System Successfully Tested in Airborne Trial
The government, which helped fund the research, said it was the first test of its kind that was publicly acknowledged by the government, which may pave the way for a GPS backup system that is unjammable in the future.…
Hackers Tracking Victims with DNS Tricks
Cybercriminals have adopted a highly intricate technique known as DNS tunnelling to carry out malicious activities such as tracking victims and scanning network vulnerabilities, posing a significant threat to cybersecurity. DNS tunnelling involves the encoding of data or commands…
Mortgage Lender Hacked, Customer Credit Card Details Leaked on Dark Web
The non-bank mortgage lender Firstmac has been hit by a cyberattack, resulting in the theft and publication of customer details such as credit card numbers, passport numbers, Medicare numbers, and driver’s licence details on the dark web. Firstmac, a…
Here’s Why Tokens Are Like Treasure for Opportunistic Attackers
Authentication tokens are not tangible tokens, of course. However, if these digital IDs are not routinely expired or restricted to a single device, they may be worth millions of dollars in the hands of threat actors. Authentication tokens (…
Apple Warns Windows Users: Critical Security Vulnerability in iTunes
Apple confirms the finding of a critical security flaw in the iTunes program for Windows 10 and Windows 11 users, which could have allowed malicious attackers to execute code remotely at will. Willy R. Vasquez, a security researcher at the…
Australia’s Premier Non-Bank Lender Suffers Data Security Breach
One of Australia’s largest non-bank mortgage lenders, Firstmac, has suffered a cyberattack, which resulted in customer information such as credit card and passport numbers, Medicare numbers and driver’s licence numbers being stolen and published on the dark web. In…
Critical Infrastructure and the Importance of Safeguarding it in the Digital Age
In today’s digital age, our society relies heavily on critical infrastructure to function smoothly. These infrastructures, including power grids, water systems, and communication networks, form the backbone of our daily lives, facilitating everything from electricity distribution to internet connectivity. …
Student Hijacking: Cyberattack Exposes 8,000 Students’ Data in Hong Kong
The personal information of over 8,000 students at a private Hong Kong college has been taken and purportedly placed on the dark web, the latest in a string of cyberattacks in the city that have prompted calls for greater security.…
Can Legal Measures Slow Down Cybercrimes?
Cybercrime has transpired as a serious threat in India, prompting calls for comprehensive reforms and collaborative efforts from various stakeholders. Experts and officials emphasise the pressing need to address the evolving nature of cyber threats and strengthen the country’s…
Cyber Criminals Exploiting MS-SQL Severs To Deploy Mallox Ransomware
The MS-SQL (Microsoft SQL) honeypot incident that took place recently highlighted the sophisticated strategies used by cybercriminals that rely on the Mallox ransomware (also known as Fargo, TargetCompany, Mawahelper, etc.). The honeypot, set up by the Sekoia researchers, was…
Ransomware Attacks Now Targeting Corporate Executives’ Children
Mandiant, a prominent cybersecurity firm and subsidiary of Google, highlights the escalating creativity of malicious hackers as corporations reinforce their cyber defenses. These hackers have extended their targets to include the children of corporate executives, employing ransomware tactics to…
26 Million Records Leaked: The Post-Millennial Hack Raises Privacy Concerns
The data from the hack of The Post Millennial conservative news website has been added to Have I Been Pwned, which recently uncovered the information of 26,818,266 people whose data had been stolen. Human Events Media Group is a…
26 Million Records Leaked: The Post-Millennial Hack Raises Privacy Concerns
The data from the hack of The Post Millennial conservative news website has been added to Have I Been Pwned, which recently uncovered the information of 26,818,266 people whose data had been stolen. Human Events Media Group is a…
Unlocking the Mystery: Key Fob Vulnerabilities Exposed
According to security researchers, the key fob is extremely hackable, and, in addition, it is convenient. In terms of digital security, the car key fob does not have the greatest reputation when it comes to safety. As of late,…
New Ransomware Threat Hits Hundreds of Organisations Worldwide
In a recent joint report by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), a new ransomware gang named Black Basta has been identified as breaching over 500 organisations globally between April 2022 and…
Predictive AI: What Do We Need to Understand?
We all are no strangers to artificial intelligence (AI) expanding over our lives, but Predictive AI stands out as uncharted waters. What exactly fuels its predictive prowess, and how does it operate? Let’s take a detailed exploration of Predictive AI,…
Emphasizing Post-Breach Strategies in Cybersecurity
Cybersecurity discourse heavily emphasizes prevention, yet often neglects post-breach strategies. While we invest significant effort in establishing protocols to avert attacks, breaches remain an unavoidable reality. The “IBM Cyber Security Intelligence Index” report highlights human error as a leading…
Cybercriminals Are Becoming More Proficient at Exploiting Vulnerabilities
According to Fortinet, cybercriminals have their sights on the increasing number of new vulnerabilities triggered by the expansion of online services and applications, as well as the rapid rise in the number and variety of connected devices. It’s only…
Europol Confirms Web Portal Breach: No Operational Data Stolen
In a recent incident, Europol’s Europol Platform for Experts (EPE) portal experienced a security breach. The breach occurred within a closed user group, raising concerns about data security and operational integrity. In this blog post, we delve into the details…
Understanding Vishing and Quishing: Protecting Yourself Against Telephone and QR Code Scams
In our digitally interconnected world, cybercriminals continuously devise new methods to exploit technology for their malicious intents. Two prevalent schemes gaining traction are vishing and quishing scams. These fraudulent activities capitalize on telephone calls and QR codes to deceive…
Dell API Abused to Steal 49 Million Customer Records in Data Breach
The threat actor responsible for the recent Dell data breach stated that he scraped information from 49 million customer records via a partner portal API that he accessed as a phony organization. Dell had begun sending alerts to customers informing…
Understanding the Complexities of VPNs: Balancing Privacy and Security in the Digital Age
Virtual private networks (VPNs) are crafted to safeguard online privacy through the encryption of internet traffic and concealment of IP addresses, thereby preventing the determination of user locations. This functionality becomes apparent when users attempt to access websites or…
WordPress Vulnerabilities, Exploiting LiteSpeed Cache and Email Subscribers Plugins
In recent cybersecurity developments, hackers have been leveraging a critical vulnerability within the LiteSpeed Cache plugin for WordPress to exploit websites running outdated versions. LiteSpeed Cache, a popular caching plugin utilized by over five million WordPress sites, is designed…
Cyber Crime Wave: Chinese Scammers Target Europe with Fake Designer Brands
In the last couple of weeks, there has been an increase in the number of people who have been duped into sharing their card details and other personal information with a network of fake online designer shops that are…
Invoke AI Introduces Refined Control Features for Image Generation
Invoke AI has added two novel features to its AI-based image generation platform. According to the company, two new features—the Model Trainer and Control Layers—provide some of the most refined controls in image generation. Both apps provide users granular…
Dell Data Breach Exposes Personal Information Of 49 Million
Dell, the renowned computer manufacturer, has issued a cautionary notice to its customers regarding a disconcerting data breach. The breach, which affects an estimated 49 million customers, involves unauthorised access to an online portal containing sensitive customer information. Dell…
Ascension Cyber Attack Heightens Focus on Healthcare Cybersecurity Measures
The healthcare sector is increasingly targeted by cybercriminals, as evidenced by recent high-profile attacks that disrupt services and highlight vulnerabilities in this critical industry. The recent cyber attack on Ascension, in particular, has raised concerns due to its significant…
Microsoft Introduces Innovative AI Model for Intelligence Analysis
Microsoft has introduced a cutting-edge artificial intelligence (AI) model tailored specifically for the US intelligence community, marking a leap forward in secure intelligence analysis. This state-of-the-art AI model operates entirely offline, mitigating the risks associated with internet connectivity and…
New Cuckoo Malware Targeting macOS Users to Steal Sensitive Data
Cybersecurity experts have identified a new information stealer targeting Apple macOS computers that is intended to establish persistence on compromised hosts and function as spyware. Kandji’s malware, dubbed Cuckoo, is a universal Mach-O binary that can execute on both…
The Mask: A Resilient Espionage Group Returns After a Decade
An APT group that has been missing for over a decade has reappeared in a cyber-espionage campaign aimed at organizations in Latin America and Central Africa. The Mask’s history Origins: The Mask first appeared in 2007, operating with stealth and…
Unpatchable VPN Vulnerability Exposes Data to Attackers: What You Need to Know
In a recent revelation that has sent shockwaves through the cybersecurity community, researchers have unearthed a significant vulnerability in virtual private networks (VPNs) dubbed TunnelVision. This flaw, described as deep and unpatchable, poses a substantial threat to data security,…
Health Care Network in Crisis: Cyberattack Shuts Down Operations Across US
After a cyberattack this week, the largest healthcare system in the United States is diverting ambulances to “several” of its hospitals, the company said Thursday. In a statement released Thursday evening by Ascension Hospital, a nonprofit network based in…
Why Active Directory Is A Big Deal?
In a cutting-edge study by XM Cyber and the Cyentia Institute, a comprehensive analysis has unveiled a startling reality: a staggering 80% of cybersecurity vulnerabilities within organisations stem from issues related to Active Directory. This might sound like tech…
Malware Lurking in Minecraft Source Packs
In the world of gaming, customization is king. Players love tweaking their favourite games to make them even more exciting. But while mods and customizations can enhance your gaming experience, they can also hide dangerous threats. A new version of…
The 2023 USG Data Breach: 800 Accounts Compromised, A Closer Look
The Breach: Scope and impact The University System of Georgia (USG) notified 800,000 people about data breaches during the 2023 Clop MOVEit attacks. USG is a state government body that oversees 26 public colleges and universities in Georgia, serving approximately…
Akamai Expands into API Security with $450 Million Noname Deal
It was founded in 2020 and is currently one of the top API security vendors in the world. After emerging from stealth in a year, Noname has reached unicorn status, as of 2021. As a result of the $220…
US Authorities Charge LockBit Ransomware Ringleader
US officials have uncovered and indicted the ringleader of LockBit, a widespread ransomware operation that has extorted victims out of half a billion dollars. He is facing over two dozen criminal charges. According to a 26-count indictment released on…
DocGo Confirms Cyberattack: Patient Health Data Breach
In a recent turn of events, DocGo, a prominent mobile medical care firm providing healthcare services across the United States and the United Kingdom, has fallen victim to a cyberattack. The breach, confirmed by the company in a filing…
Microsoft to Enforce Executive Accountability for Cybersecurity
Microsoft is undergoing organizational adjustments to enhance cybersecurity measures throughout its products and services, focusing on holding senior leadership directly responsible. Charlie Bell, Microsoft’s executive vice president of security, outlined these changes in a recent blog post aimed at…
OpenAI and Stack Overflow Partnership: A Controversial Collaboration
The Partnership Details OpenAI and Stack Overflow are collaborating through OverflowAPI access to provide OpenAI users and customers with the correct and validated data foundation that AI technologies require to swiftly solve an issue, allowing engineers to focus on critical…
Crypto’s New Cybersecurity Initiative Led by Justine Bone
The cryptocurrency sector is on the brink of a paradigm shift in cybersecurity as it gears up to launch Crypto ISAC (Information Sharing and Analysis Center), under the adept leadership of cybersecurity expert Justine Bone. Bone, acclaimed for her…
Chinese Attackers Deployed Backdoor Quintet to Down MITRE
China-linked hackers used a variety of backdoors and Web shells to compromise the MITRE Corporation late last year. Last month, it was revealed that MITRE, widely known for its Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework, had been…
MITRE Links Recent Attack to China-Associated UNC5221
MITRE recently provided further insight into the recent cyber intrusion, shedding light on the new malicious software employed and a timeline detailing the attacker’s actions. In April 2024, MITRE announced a breach in one of its research and prototyping…
Empowering Indigenous Data Sovereignty: The TTP-Microsoft Partnership
The recent partnership between Te Tumu Paeroa (TTP), the office of the Māori Trustee, and Microsoft for the forthcoming data centres in Aotearoa New Zealand marks a groundbreaking development with potential global implications for indigenous data sovereignty. This agreement,…
Android App Security Alert: Proactive Measures to Prevent Unauthorized Control
Approximately a billion Android users have been threatened by a new malware infection. The latest security alert comes from Microsoft’s team who discovered a new vulnerability that may give hackers complete control of your smartphone. The latest security alert…
FBI Investigates Thousands of Fake Emails Warning of Cyber Threat You Must Do 1 Thing
Over the weekend, an alarming incident unfolded as thousands of fake emails flooded in, purportedly from the US Department of Homeland Security. The messages, titled “Urgent: Threat actor in systems,” raised concerns about a cyber threat allegedly posed by…
Debating the Risks and Realities of Artificial General Intelligence
In the ever-evolving landscape of artificial intelligence (AI), a notable shift in focus has emerged from the once lofty concerns about AI achieving sentience or triggering a hypothetical “singularity.” Instead, attention has pivoted towards a concept known as artificial…
BetterHelp Agrees to $7.8 Million Settlement for Health Data Sharing with 800,000 Users
The LockBit ransomware group has resurfaced, targeting Hooker Furniture, a significant player in the U.S. furniture industry. Alleging the theft of customer and business data, LockBit has set a deadline of May 08, 2024, for its publication. Meanwhile, BetterHelp,…
LAPD Website Unexpectedly Offline; Ransomware Ruled Out, Cause Unclear
On Friday afternoon, the Los Angeles Police Department’s website went down due to an overload, officials said, despite claims on social media that an online group was responsible for the outage through their “cyber attack.” It is widely believed…
Is Your iPhone at Risk? Understanding iPhone Spyware Issue
Surprisingly, one iOS user has successfully identified Apple’s iPhone Spyware Problem. Unfortunately, iPhone spyware attacks have extended to 92 nations. And it can be one of the most scary threats in the realm of technology. The blog post below…
New Attack Renders Most VPN Apps Vulnerable
A new attack, dubbed TunnelVision, has materialised as a threat to the security of virtual private network (VPN) applications, potentially compromising their ability to protect user data. Researchers have detected vulnerabilities affecting nearly all VPN apps, which could allow…
Assessing F Society’s Latest Ransomware Targets: Are They at Risk?
In recent developments, the F Society ransomware group has once again made headlines by listing four additional victims on its leak site. The alleged targets include Bitfinex, Coinmoma, Rutgers University, and SBC Global Net. Bitfinex, a renowned cryptocurrency exchange…
Scattered Spider: Hackers Attacking Commercial Sectors, Cops Troubled
Scattered Spider threat actors primarily steal data for extortion using a variety of social engineering approaches, and they have recently used BlackCat/ALPHV ransomware in addition to their usual TTPs. According to a senior bureau official, the FBI must “evolve” to…
Rising Threat: Hackers Exploit Microsoft Graph for Command-and-Control Operations
Recently, there has been a trend among nation-state espionage groups they are tapping into native Microsoft services for their command-and-control (C2) operations. Surprisingly, different groups, unrelated to each other, have reached the same conclusion that It is smarter to…
Microsoft Uncovers Major Security Flaw in Android Apps with Billions of Downloads
Microsoft recently made a troubling discovery regarding the security of numerous Android applications, including some of the most widely used ones, each boasting over 500 million installations. After uncovering a common security weakness, Microsoft promptly notified Google’s Android security…
ATM Card Trap Scam: How to Stay Safe
ATMs have become an integral part of our lives. They provide convenient access to cash and banking services. However, criminals are always finding new ways to exploit technology for their gain. One such deceptive scheme is the ATM card trap…
Scammers Targeting WhatsApp Groups in UK
When businessman Mohammed Yousaf received an urgent plea for assistance from one of his oldest friends, he rushed to the rescue. The 56-year-old received a WhatsApp message from the account of a man he had been friends with for…
Are The New AI PCs Worth The Hype?
In recent years, the realm of computing has witnessed a remarkable transformation with the rise of AI-powered PCs. These cutting-edge machines are not just your ordinary computers; they are equipped with advanced artificial intelligence capabilities that are revolutionizing the…
Microsoft Revamps Security Leadership, Empowering Deputy CISOs
There have been a series of major security breaches recently, and Microsoft is making changes to its security practices, organizational structure, and executive compensation to address the issue, as government leaders and big customers increasingly pressure the company to…
Here’s Why You Shouldn’t Trust VPNs Blindly
In an era where we should be gravely concerned about online privacy and security, Virtual Private Networks (VPNs) have come through as indispensable tools for safeguarding digital identities. However, amidst the buzz of VPN advertisements promising invincibility against cyber…
Android Flaw Exposes DNS Queries Despite VPN Kill Switch
Several months ago, a Mullvad VPN user discovered that Android users have a serious privacy concern when using Mullvad VPN. Even with the Always-On VPN feature activated, which ensures that the VPN connection is always active, and with the…
Microsoft Introduces Passkey Authentication for Personal Microsoft Accounts
Microsoft has introduced a new feature allowing Windows users to log into their Microsoft consumer accounts using a passkey, eliminating the need for traditional passwords. This passkey authentication method supports various password-less options such as Windows Hello, FIDO2 security…
Experts Warn Criminals Could Exploit Jogging Apps for Targeting People
Experts caution that users of running apps should heighten their privacy settings to thwart potential stalkers and other malicious actors from accessing sensitive information regarding their activities. While platforms like Strava enable joggers and hikers to share route details…
Backdoor Malware: Iranian Hackers Disguised as Journalists
Crafting convincing personas APT42, an Iranian state-backed threat actor, uses social engineering attacks, including posing as journalists, to access corporate networks and cloud environments in Western and Middle Eastern targets. Mandiant initially discovered APT42 in September 2022, reporting that the…
Are Big Tech Companies Getting Rich from AI?
Big Tech companies like Amazon, Microsoft, and Alphabet have showcased impressive earnings, with a substantial boost from their advancements in artificial intelligence (AI) technology. Amazon’s quarterly report revealed a 13% increase in net sales, primarily attributed to its AWS…