Last Friday, Prudential Financial began informing over 36,000 people of a data incident that occurred in early February 2024. The breach, first disclosed in a regulatory filing with the SEC in February, occurred on February 4 and was purportedly…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Sensitive Documents Vanish Under Mysterious Circumstances from Europol Headquarters
A significant security breach has impacted the European Union’s law enforcement agency, Europol, according to a report by Politico. Last summer, a collection of highly confidential documents containing personal information about prominent Europol figures vanished under mysterious circumstances. The…
Malware Targets End-of-Life Routers and IoT Devices
A recent investigation by Black Lotus Labs team at Lumen Technologies has revealed a concerning trend in cybercriminal activity targeting end-of-life (EoL) routers and IoT devices. The research sheds light on a sophisticated campaign utilising updated malware known as TheMoon, which…
Microsoft’s Priva Platform: Revolutionizing Enterprise Data Privacy and Compliance
Microsoft has taken a significant step forward in the realm of enterprise data privacy and compliance with the expansive expansion of its Priva platform. With the introduction of five new automated products, Microsoft aims to assist organizations worldwide in…
Defending Against IoT Ransomware Attacks in a Zero-Trust World
Defending Against IoT Ransomware Attacks in a Zero-Trust World In our interconnected digital landscape, the proliferation of Internet of Things (IoT) devices has revolutionized how we live and work. From smart homes to industrial automation, IoT devices play a pivotal…
1.3 Million Customers Affected: Pandabuy Grapples with Data Breach Fallout
A data breach allegedly occurred on Sunday at Pandabuy, an online store that aggregates items from Chinese e-commerce sites. As a result, 1,348,307 accounts were affected. A large amount of information has been leaked, including user IDs, first and…
OWASP Reveals Data Breach Stemming from Wiki Misconfiguration
The OWASP Foundation has recently made public a data breach incident where the resumes of certain members were inadvertently made accessible online due to a misconfiguration of its previous Wiki web server. OWASP, which stands for Open Worldwide Application…
Smishing Surge: Tactics, Threats, and ‘The Com’
Recently, what we are observed is that enterprises facing a persistent threat from social engineering tactics aimed at acquiring login credentials for crucial systems like Identity and Access Management (IAM), cloud resources, and Single Sign-On (SSO) platforms. Successful breaches through…
DOD Officially Launches New Cyber Policy Office
The Office of the Assistant Secretary of Defence for Cyber Policy has been formally constituted, the Pentagon announced in a statement last week. Congress directed the Pentagon to set up the office, elevating cyber policy within the office of…
Macs Vulnerable to Info-Stealing Malware via Ads and Fake Software
As cyber threats continue to evolve, Mac users are increasingly finding themselves in the crosshairs of malicious actors. In recent developments, a new strain of malware has emerged, posing a significant risk to Mac users worldwide. This malware, designed…
Despite Mounting Cyberattacks, Analysts Uncover The Primary Challenge
Data security has become a necessity since the world is completely dependent on the Internet for everything, including the most basic things. Security challenges have become increasingly important with the amount of sensitive data the Internet carries, including users’…
Google’s Incognito Mode: Privacy, Deception, and the Path Forward
In a digital age where privacy concerns loom large, the recent legal settlement involving Google’s Incognito mode has captured attention worldwide. The tech giant, known for its dominance in search, advertising, and web services, has agreed to delete billions of…
Are YouTube Game Cracks Hiding Malware?
Recently, cybersecurity researchers have unearthed a disturbing trend: threat actors are exploiting YouTube to distribute malware disguised as video game cracks. This alarming course of action poses a significant risk to unsuspecting users, especially those seeking free software downloads. According…
Google Messages’ Gemini Update: What You Need To Know
Google’s latest update to its Messages app, dubbed Gemini, has ignited discussions surrounding user privacy. Gemini introduces AI chatbots into the messaging ecosystem, but it also brings forth a critical warning regarding data security. Unlike conventional end-to-end encrypted messaging…
Navalny’s Revenge? Hackers Siphon Huge Russian Prisoner Database: Report
Following the murder of Russian opposition leader Alexey Navalny, anti-Kremlin militants seized a database comprising hundreds of thousands of Russian prisoners and hacked into a government-run online marketplace, according to a report. Navalny was the most prominent Russian opposition…
NVD’s New Phase, Industry Consortium to Oversee NIST’s Vulnerability Database
The US National Institute of Standards and Technology (NIST) has made a significant announcement regarding the management of the world’s most widely used software vulnerability repository, the US National Vulnerability Database (NVD). Since its inception in 2005, NIST has…
Cyber Slavery: Thousands of Indians Trapped in a Web of Deceit
The Promise and the Trap Many Indians are trapped in Cambodia under false promises of data entry jobs. Instead, they are forced to commit cybercrimes. More than 5000 Indians are held forcefully in Cambodia and pressured into committing cyber frauds…
USSD Call Forwarding Deactivation: India’s Move to Safeguard Against Cyber Fraud
The Department of Telecommunications (DoT) has recently taken a step to tackle the surge in online fraud cases across the country. To counter various incidents of fraud resulting from illegal call forwarding, the authorities have required all telecom operators…
Public WiFi Convenience Leads to Cyber Threats, Read to Know Everything
Cybersecurity experts are issuing a stern warning to Scots regarding the potential dangers lurking within public WiFi networks. While the convenience of accessing the internet on the go, such as during train commutes, may seem appealing, experts emphasize the…
Foiled Attempt to Hack Supply Chain Sparks Concerns in Washington DC
An attempted sabotage of a widely used software tool has sparked concerns in Washington, D.C. about the vulnerability of the open-source supply chain and the potential involvement of foreign nation-states in covert operations. A software engineer named Andres Freund,…