Elon Musk claimed that he turned down a proposal from the Ukrainian government to turn on his Starlink satellite network near Sevastopol, the port city of Crimea, last year in order to support an assault on the Russian navy…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
From Vulnerabilities to Vigilance: Addressing Software Supply Chain Attacks
Cybersecurity experts have long been concerned about the possibility of supply chain attacks mainly due to the chain reaction that can be triggered by just one attack on one supplier, which can lead to a compromise of the entire…
LastPass Security Breach Linked to Series of Crypto Heists, Say Experts
Security experts allege that some of the LastPass password vaults, which were stolen in a security breach towards the end of 2022, have now been successfully breached, leading to a series of substantial cryptocurrency thefts. According to cybersecurity blogger…
The Cybersecurity Crisis: Dating App “Coffee Meets Bagel (CMB)” Hacked, Over 620 Million Accounts Compromised
Photo by kalhh on Pixabay In an increasingly digital world, the threat of cyber-attacks is more prevalent than ever. This article delves into an alarming case of cybersecurity breach involving a popular dating platform, which led to over 620…
Data Privacy Concerns Surround Period Tracking Apps
Period tracking apps have become increasingly popular among women seeking to monitor their menstrual cycles, plan pregnancies, or simply stay informed about their health. However, recent reports have raised serious concerns about the handling of user data by these apps.…
North Korean Threat Actors Stole $41 Million in Online Casino Heist
This week, cyber attackers set their sights on Stake.com, an online casino game and sports betting platform. They successfully made away with around $41 million in cryptocurrencies. The FBI has pinpointed North Korea and its infamous state-supported hacking group,…
Mac Users Under Attack: Malvertising Campaign Distributing Atomic Stealer Malware
An updated version of macOS stealer malware called Atomic Stealer (or AMOS) is being distributed through a new malvertising campaign. The authors of the program appear to be actively maintaining and updating malware. When the creators of AMOS found…
W3LL Store: Unmasking a Covert Phishing Operation Targeting 8,000+ Microsoft 365 Accounts
A hitherto undisclosed “phishing empire” has been identified in a series of cyber attacks targeting Microsoft 365 business email accounts spanning six years. According to a report from cybersecurity firm Group-IB, the threat actor established an underground market called…
Check Point to Acquire Cyber Startup Atmosec to Boost Its SaaS Security Offering
Check Point Software intends to acquire an early-stage SaaS security business founded by former Armis leaders in order to anticipate and combat malicious application threats. According to Vice President of Product Management Eyal Manor, the Silicon Valley-based platform security…
North Korean Hackers Steal Crypto to Fund ‘Nuclear Weapon Program’
North Korea based hackers have reportedly carried out another attack, stealing hundreds of millions in crypto in order to fund their regime’s ‘nuclear weapon program.’ According to blockchain intelligence company TRM Labs, almost 20% of all cryptocurrency stolen this year,…
The Rise of AI-Powered Narcissism: Exploring the Impact of Digital Clones on Our Psychology
Are we entering a new age of AI-powered narcissism? This is a question that has been raised by Dazed in their recent article. The rise of AI-powered clones and their potential impact on our psychology is a topic that has…
Privacy Class Action Targets OpenAI and Microsoft
A new consumer privacy class action lawsuit has targeted OpenAI and Microsoft, which is a significant step. This legal action is a response to alleged privacy violations in how they handled user data, and it could be a turning point…
Apple Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones
On Thursday, Apple urgently issued security patches for iOS, iPadOS, macOS, and watchOS. These updates were released in response to the exploitation of two previously unknown vulnerabilities in the wild. These flaws were utilized to deploy NSO Group’s Pegasus spyware,…
UK Military Data Breach via Outdated Windows 7 System
A Windows 7 machine belonging to a high-security fencing company was the stunning weak link in a shocking cybersecurity incident that exposed vital military data. This hack not only underlines the need for organizations, including those that don’t seem to…
Dallas Ransomware Attack: Hackers Steal 800K City Files
Hackers who targeted the City of Dallas in the alleged ransomware attack have stolen nearly 1.2 terabytes of data, which equals a sum of 819,000 files, reports City officials. City’s Chief Information Officer Bill Zielinski describes that the threat actors…
How to Protect Your Personal Financial Information from Data Brokers
In today’s digital age, personal information is a hot commodity. Data brokers buy and sell this information, often without our knowledge or consent. This can include sensitive financial information, which can be used for identity theft or other fraudulent activities.…
UK’s Nuclear Submarine Base Faces Unprecedented Threats: Russia Implicated in Shocking Incidents
A Russian-linked group of hackers, which has reportedly obtained hundreds of pages of information about critical sites such as HMNB Clyde, which houses the UK’s nuclear weapons arsenal, is believed to have targeted the nuclear weapons arsenal at the…
Automakers can Exploit Your Private Data However They Want
It turns out that the answer to the question of which devices have the worst user privacy policies may be waiting for you outside. The Mozilla Foundation said in a report released on Wednesday that cars are “the official…
Okta: Cyber Attackers Target IT Help Desks to Compromise Super Admin and Disable MFA
Okta, a leading identity and access management firm, has issued a warning regarding a series of social engineering attacks aimed at IT service desk agents of U.S.-based clients. The attackers’ primary objective was to deceive these agents into resetting…
FBI Duck Hunt Operation Against Qakbot Resurgence
Last week, a pernicious and multifunctional malware was silenced as a result of Operation “Duck Hunt,” a collaborative effort led by the FBI. This operation successfully extracted the malicious code from 700,000 compromised systems, forcibly severing their connection to…