Hardly a day passes when we fail to notice some sort of scam on our phones or in our emails, attempting to trick us into downloading malware, revealing a password, or making a payment for something that isn’t genuine.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Massive Data Breach at Gokumarket: Over a Million Users’ Information Exposed
Several days before the leak, the GokuMarket team found an unprotected MongoDB instance, which was storing information about its users, namely those who bought and sold crypto on the exchange. In GokuMarket’s case, it is the details of more…
Mobile Security Alert: CERT-In Flags Risks in Top Brands
The Indian Computer Emergency Response Team (CERT-In) has discovered security flaws in high-profile smartphone brands, including Samsung, Apple, and Google Pixel devices. After carefully analyzing these devices’ security features, CERT-In has identified certain possible weaknesses that can jeopardize user privacy…
NKAbuse Malware Utilizes NKN Blockchain Technology for Executing DDoS Attacks
A newly identified multi-platform threat named NKAbuse has surfaced, employing a decentralized peer-to-peer network connectivity protocol known as NKN (New Kind of Network) for communication. Russian cybersecurity firm Kaspersky detailed the malware’s capabilities in a report, describing it as…
Cyber Criminals Seek $2 Million in Bitcoin After Siphoning Insomniac Games Data
The Rhysida hacker group is believed to have carried out a cyberattack against Insomniac Games and is now demanding a ransom, starting at 50 Bitcoin, or more than $2 million. Sony, which owns the Spider-Man 2 and Ratchet &…
Data Insecurity: Experts Sound the Alarm on 4 Apps Putting User Privacy at Risk
Security in the digital world continues to become more and more important with every passing year. Even though many of us rely on apps to entertain us, guide us, manage our exercise, and connect with family and friends, they…
China’s MIIT Proposes Color-coded Contingency Plan for Security Incidents
On Friday, China proposed a four-tier classification system, in an effort to address data security incidents, underscoring concerns of Beijing in regards to the widespread data leaks and hacking incidents in the country. This emergency plan comes when the country…
Hackers Steal Assets Worth $484,000 in Ledger Security Breach
Threat actors responsible for attacking Ledger’s connector library have stolen assets valued at approximately $484,000. This information was given by the blockchain analysis platform Lookonchain. Ledger has said that the security breach might have a large effect, possibly totalling hundreds…
Cybersecurity Incident Causes Outage at Lesotho’s Central Bank
Lesotho’s central bank is grappling with widespread disruptions following a cyberattack detected earlier this week. The landlocked country, surrounded by South Africa and home to over 2 million people, disclosed multiple statements acknowledging the impact of the recent cyber…
Microsoft Shuts Down a Criminal Ring Responsible for Creating Over 750 Million Fake Accounts
Microsoft Corp. has shut down a cybercrime group’s US-based infrastructure, which created more than 750 million fake accounts across the company’s services. Microsoft carried out the takedown with the support of Arkose Labs Inc., a venture-backed cybersecurity firm. The…
China Issues Alert on Geographical Information Data Breaches Impacting Transportation and Military
China has recently issued a stern warning regarding the use of foreign geographic software, expressing serious concerns about the potential leakage of critical information related to its essential infrastructure and military. The Ministry of State Security, while refraining from…
Digital Guardianship: A Call to Arms for Safeguarding Our Children’s Future
It is no longer news that children’s lives are becoming increasingly impacted by the digital realm in our modern world. There are a wide array of educational resources, entertainment, and social connections available on the Internet. Despite this, it…
Securing Generative AI: Navigating Risks and Strategies
The introduction of generative AI has caused a paradigm change in the rapidly developing field of artificial intelligence, posing both unprecedented benefits and problems for companies. The need to strengthen security measures is becoming more and more apparent as these…
OAuth App Abuse: A Growing Cybersecurity Threat
User data security has grown critical in an era of digital transactions and networked apps. The misuse of OAuth applications is a serious danger that has recently attracted attention in the cybersecurity field. OAuth (Open Authorization) is a widely used…
Ransomware Groups are Using PR Charm Tactic to Put Pressure on Victims to Pay Ransom
Recently, ransomware groups have been increasingly adopting newer tactics, one of them being the transparent, quasi-corporate strategy with the media, with the benefits of building pressure on the victims to pay ransom. According to a report, released this week by…
Rise of OLVX: A New Haven for Cybercriminals in the Shadows
OLVX has emerged as a new cybercrime marketplace, quickly gaining a loyal following of customers seeking through the marketplace tools used to conduct online fraud and cyberattacks on other websites. The launch of the OLVX marketplace follows along with…
LockBit is Recruiting Members of ALPHV/BlackCat and NoEscape Ransomware Outfit
Recruiting affiliates and developers from the troubled BlackCat/ALPHV and NoEscape ransomware operations is one of the calculated steps being taken by the LockBit ransomware group. An ideal opportunity emerged for LockBit to expand its network due to the recent…
China Issues Warning About Theft of Military Geographic Data in Data Breaches
China issued a cautionary notice regarding the utilization of foreign geographic software due to the discovery of leaked information concerning its critical infrastructure and military. The Ministry of State Security, while refraining from assigning blame, asserted that the implicated…
Apple’s Push Notification Data Used to Investigate Capitol Rioters; Apple Sets Higher Legal bar
When it initially came to light that governments globally demanded push notification data from Apple and Google, suspicion mounted that the US government was doing the same. This has now been confirmed, with one use of it being the monitoring…
MrAnon Stealer Propagates via Email with Fake Hotel Booking PDF
FortiGuard Labs cybersecurity experts have discovered a sophisticated email phishing scheme that uses fraudulent hotel reservations to target unsuspecting victims. The phishing campaign involves the deployment of an infected PDF file, which sets off a chain of actions that…