There has been a considerable increase in serious organized crime over the past few years, and it continues to pose a significant threat to the EU’s internal security. The most threatening criminal networks operating in and affecting the EU…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Panera Bread and Omni Hotels Hit by Ransomware Outages: What You Need to Know
Privnote Secure Messaging App Is Under Phishing Threat
The Growing Threat of Remote Desktop Protocol (RDP) Attacks
Birmingham City Computers Breached by Hackers, Mayor Confirms
Data Brokers are Preparing to Challenge Privacy Legislation
LayerSlider Plugin Imperils 1 Million WordPress Sites, Urgent Fixes Mandated!
Fund Manager Outlines Digital Data as Rising Asset Class
Insights into Recent Malware Attacks: Key Learnings and Prevention Strategies
AI Developed to Detect Invasive Asian Hornets
Bing Ad Posing as NordVPN Aims to Propagate SecTopRAT Malware
Controversial Reverse Searches Spark Legal Debate
Alejandro Caceres: The Vigilante Hacker Who Took Down North Korea’s Internet
Unveiling the XZ Utils Backdoor: A Wake-Up Call for Linux Security
Heightened Hacking Activity Prompts Social Media Security Warning
Having social media software for managing users’ privacy settings, and security settings, and keeping track of recent news and marketing opportunities can provide a great way to keep in touch with family, and friends, and stay updated on recent…
Ontario Hospitals Dispatch 326,000 Letters to Patients Affected by Cyberattack Data Breach
Five hospitals in Ontario, which fell victim to a ransomware attack last autumn, are initiating a mass notification effort to inform over 326,000 patients whose personal data was compromised. The cyber breach on October 23, targeted Bluewater Health, Chatham-Kent Health…
Rise of Hacktivist Groups Targeting OT Systems
Recent research from Waterfall Security Solutions has revealed important insights into the changing nature of cyberattacks on Operational Technology (OT) organizations. One key finding is the rise of hacktivist groups as major players in targeting OT systems. Additionally, the study…
Prudential Financial Notifies 36,000 Victims of Data Leak
Last Friday, Prudential Financial began informing over 36,000 people of a data incident that occurred in early February 2024. The breach, first disclosed in a regulatory filing with the SEC in February, occurred on February 4 and was purportedly…
Sensitive Documents Vanish Under Mysterious Circumstances from Europol Headquarters
A significant security breach has impacted the European Union’s law enforcement agency, Europol, according to a report by Politico. Last summer, a collection of highly confidential documents containing personal information about prominent Europol figures vanished under mysterious circumstances. The…
Malware Targets End-of-Life Routers and IoT Devices
A recent investigation by Black Lotus Labs team at Lumen Technologies has revealed a concerning trend in cybercriminal activity targeting end-of-life (EoL) routers and IoT devices. The research sheds light on a sophisticated campaign utilising updated malware known as TheMoon, which…
Microsoft’s Priva Platform: Revolutionizing Enterprise Data Privacy and Compliance
Microsoft has taken a significant step forward in the realm of enterprise data privacy and compliance with the expansive expansion of its Priva platform. With the introduction of five new automated products, Microsoft aims to assist organizations worldwide in…
Defending Against IoT Ransomware Attacks in a Zero-Trust World
Defending Against IoT Ransomware Attacks in a Zero-Trust World In our interconnected digital landscape, the proliferation of Internet of Things (IoT) devices has revolutionized how we live and work. From smart homes to industrial automation, IoT devices play a pivotal…
1.3 Million Customers Affected: Pandabuy Grapples with Data Breach Fallout
A data breach allegedly occurred on Sunday at Pandabuy, an online store that aggregates items from Chinese e-commerce sites. As a result, 1,348,307 accounts were affected. A large amount of information has been leaked, including user IDs, first and…
OWASP Reveals Data Breach Stemming from Wiki Misconfiguration
The OWASP Foundation has recently made public a data breach incident where the resumes of certain members were inadvertently made accessible online due to a misconfiguration of its previous Wiki web server. OWASP, which stands for Open Worldwide Application…
Smishing Surge: Tactics, Threats, and ‘The Com’
Recently, what we are observed is that enterprises facing a persistent threat from social engineering tactics aimed at acquiring login credentials for crucial systems like Identity and Access Management (IAM), cloud resources, and Single Sign-On (SSO) platforms. Successful breaches through…
DOD Officially Launches New Cyber Policy Office
The Office of the Assistant Secretary of Defence for Cyber Policy has been formally constituted, the Pentagon announced in a statement last week. Congress directed the Pentagon to set up the office, elevating cyber policy within the office of…
Macs Vulnerable to Info-Stealing Malware via Ads and Fake Software
As cyber threats continue to evolve, Mac users are increasingly finding themselves in the crosshairs of malicious actors. In recent developments, a new strain of malware has emerged, posing a significant risk to Mac users worldwide. This malware, designed…
Despite Mounting Cyberattacks, Analysts Uncover The Primary Challenge
Data security has become a necessity since the world is completely dependent on the Internet for everything, including the most basic things. Security challenges have become increasingly important with the amount of sensitive data the Internet carries, including users’…
Google’s Incognito Mode: Privacy, Deception, and the Path Forward
In a digital age where privacy concerns loom large, the recent legal settlement involving Google’s Incognito mode has captured attention worldwide. The tech giant, known for its dominance in search, advertising, and web services, has agreed to delete billions of…
Are YouTube Game Cracks Hiding Malware?
Recently, cybersecurity researchers have unearthed a disturbing trend: threat actors are exploiting YouTube to distribute malware disguised as video game cracks. This alarming course of action poses a significant risk to unsuspecting users, especially those seeking free software downloads. According…
Google Messages’ Gemini Update: What You Need To Know
Google’s latest update to its Messages app, dubbed Gemini, has ignited discussions surrounding user privacy. Gemini introduces AI chatbots into the messaging ecosystem, but it also brings forth a critical warning regarding data security. Unlike conventional end-to-end encrypted messaging…
Navalny’s Revenge? Hackers Siphon Huge Russian Prisoner Database: Report
Following the murder of Russian opposition leader Alexey Navalny, anti-Kremlin militants seized a database comprising hundreds of thousands of Russian prisoners and hacked into a government-run online marketplace, according to a report. Navalny was the most prominent Russian opposition…
NVD’s New Phase, Industry Consortium to Oversee NIST’s Vulnerability Database
The US National Institute of Standards and Technology (NIST) has made a significant announcement regarding the management of the world’s most widely used software vulnerability repository, the US National Vulnerability Database (NVD). Since its inception in 2005, NIST has…
Cyber Slavery: Thousands of Indians Trapped in a Web of Deceit
The Promise and the Trap Many Indians are trapped in Cambodia under false promises of data entry jobs. Instead, they are forced to commit cybercrimes. More than 5000 Indians are held forcefully in Cambodia and pressured into committing cyber frauds…
USSD Call Forwarding Deactivation: India’s Move to Safeguard Against Cyber Fraud
The Department of Telecommunications (DoT) has recently taken a step to tackle the surge in online fraud cases across the country. To counter various incidents of fraud resulting from illegal call forwarding, the authorities have required all telecom operators…
Public WiFi Convenience Leads to Cyber Threats, Read to Know Everything
Cybersecurity experts are issuing a stern warning to Scots regarding the potential dangers lurking within public WiFi networks. While the convenience of accessing the internet on the go, such as during train commutes, may seem appealing, experts emphasize the…
Foiled Attempt to Hack Supply Chain Sparks Concerns in Washington DC
An attempted sabotage of a widely used software tool has sparked concerns in Washington, D.C. about the vulnerability of the open-source supply chain and the potential involvement of foreign nation-states in covert operations. A software engineer named Andres Freund,…
AT&T Data Breach Reveals 73 Million Users’ Info on Hacker Forum
A telecommunications company, AT&T Inc., has confirmed that data that has recently been found to be on the dark web relating to 73 million of its past and present customers may have come from 2019 or earlier. Originally, the…
Navigating Data Protection: What Car Shoppers Need to Know as Vehicles Turn Tech
Contemporary automobiles are brimming with cutting-edge technological features catering to the preferences of potential car buyers, ranging from proprietary operating systems to navigation aids and remote unlocking capabilities. However, these technological strides raise concerns about driver privacy, according to…
Linux Servers Targeted by DinodasRAT Malware
Recently, cybersecurity experts have noticed a concerning threat to Linux servers worldwide. Known as DinodasRAT (also referred to as XDealer), this malicious software has been identified targeting systems running Red Hat and Ubuntu operating systems. The campaign, suspected to have…
Google Strengthens Gmail Security, Blocks Spoofed Emails to Combat Phishing
Google has begun automatically blocking emails sent by bulk senders who do not satisfy tighter spam criteria and authenticating their messages in line with new requirements to strengthen defences against spam and phishing attacks. As announced in October, users…
Deciphering the Impact of Neural Networks on Artificial Intelligence Evolution
Artificial intelligence (AI) has long been a frontier of innovation, pushing the boundaries of what machines can achieve. At the heart of AI’s evolution lies the fascinating realm of neural networks, sophisticated systems inspired by the complex workings of…
Beware of the FedEx Courier Scam: How Innocent Indians Are Losing Money
The FedEx courier scam has emerged as a cunning and heartless ploy to deceive unsuspecting victims. Operating primarily in India, this scam preys on people’s trust, fear, and lack of awareness. Let’s delve into the details of this treacherous scheme…
Rising Cybercrime Threats and Prevention Measures Ahead of 2024
According to projections from Statista, the FBI, and the IMF, the global cost of cybercrime is anticipated to experience a substantial increase. By 2027, it is estimated to surge to $23.84 trillion, marking a significant rise from the $8.44…
Here’s How Smart Card Are Tracking Your Private Data
Smart cars are already the norm on our roads, thanks to increased connectivity and technological breakthroughs. However, beneath the slick exteriors and technological capabilities is a worrisome reality: your vehicle may be spying on you and documenting every step,…
Australia Takes Stride In Cybersecurity Measures
In the aftermath of several high-profile cyber attacks targeting key entities like Optus and Medibank, Australia is doubling down on its efforts to bolster cybersecurity across the nation. The Australian government has unveiled a comprehensive plan to overhaul cybersecurity laws…
The Unseen Threat: How Chinese Hackers Target Family Members to Surveil Hard Targets
According to an indictment unsealed by American prosecutors, a Chinese hacking group known as APT 31, which is linked to China’s Ministry of State Security, has been targeting thousands of U.S. and Western politicians, foreign policy experts, academics, journalists, and…
The Week of Crypto Platform Breaches: Prisma Finance Incident Highlights
The past week witnessed a series of bewildering events in the realm of cryptocurrency, marked by breaches on two prominent platforms that left the crypto community grappling with perplexing motives and unexpected outcomes. The first incident unfolded on Tuesday…
Critical Security Alert Released After Malicious Code Found in XZ Utils
On Friday, Red Hat issued a high-priority security alert regarding a discovery related to two versions of a widely-used data compression library called XZ Utils (formerly known as LZMA Utils). It was found that these specific versions of the…
Behind the LockBit Takedown: Strategies and Significance
It was widely hailed as a major victory for law enforcement to take down LockBit in the sprawling war against ransomware and was considered one of the most important victories for law enforcement. However, after law enforcement takes down…
PyPI Halts New User Registrations to Combat Malware Campaign
The Python Package Index (PyPI) has implemented a temporary halt on user registrations and the creation of new projects due to an ongoing malware scheme. PyPI serves as a central hub for Python projects, aiding developers in discovering and…
Enterprise AI Adoption Raises Cybersecurity Concerns
Enterprises are rapidly embracing Artificial Intelligence (AI) and Machine Learning (ML) tools, with transactions skyrocketing by almost 600% in less than a year, according to a recent report by Zscaler. The surge, from 521 million transactions in April 2023…
What are Deepfakes and How to Spot Them
Artificial intelligence (AI)-generated fraudulent videos that can easily deceive average viewers have become commonplace as modern computers have enhanced their ability to simulate reality. For example, modern cinema relies heavily on computer-generated sets, scenery, people, and even visual effects.…
Virtual Reality Headsets: A Gateway for Hackers?
In the ever-evolving landscape of technology, virtual reality (VR) headsets have emerged as a fascinating gateway to immersive experiences. From gaming and entertainment to professional applications, VR promises a world beyond our physical confines. However, recent research has unveiled a…
Sophisticated Dutch Bank Helpdesk Scam Unveils Database with Over 7 Million Email Addresses
In January, authorities in Amsterdam made six arrests as part of a significant cybercrime inquiry, leading to the unearthing of a database containing 7.3 million email addresses, with around 5 million linked to Dutch residents. The investigation initially targeted…
EU AI Act to Impact US Generative AI Deployments
In a move set to reshape the scope of AI deployment, the European Union’s AI Act, slated to come into effect in May or June, aims to impose stricter regulations on the development and use of generative AI technology.…
Assessing ChatGPT Impact: Memory Loss, Student Procrastination
In a study published in the International Journal of Educational Technology in Higher Education, researchers concluded that students are more likely to use ChatGPT, an artificial intelligence tool based on generative artificial intelligence when overwhelmed with academic work. The…
Data Broker Tracked Visitors to Jeffrey Epstein’s Island, New Report Reveals
The saga surrounding Jeffrey Epstein, a convicted sex offender with ties to numerous wealthy and influential figures, continues to unfold with alarming revelations surfacing about the extent of privacy intrusion. Among the latest reports is the shocking revelation that…
Protecting Your Privacy: How to Safeguard Your Smart TV Data
In an era of interconnected devices, our smart TVs have become more than just entertainment hubs. They’re now powerful data collectors, silently observing our viewing habits, preferences, and even conversations. While the convenience of voice control and personalized recommendations is…
Hackers Exploit Flaw in Ray Framework to Breach Servers
The Ray framework, a tool for scaling AI and Python workloads in open source, has been found vulnerable to multiple flaws that enable hackers to take control of devices and pilfer sensitive data. Cybersecurity researchers from Oligo disclosed their…
Novel Darcula Phishing Campaign is Targeting iPhone Users
Darcula is a new phishing-as-a-service (PhaaS) that targets Android and iPhone consumers in more than 100 countries by using 20,000 domains to impersonate brands and collect login credentials. With more than 200 templates available to fraudsters, Darcula has been…
The Rising Energy Demand of Data Centres and Its Impact on the Grid
In a recent prediction by the National Grid, it’s anticipated that the energy consumption of data centres, driven by the surge in artificial intelligence (AI) and quantum computing, will skyrocket six-fold within the next decade. This surge in energy…
Data Breach Alert: 3TB of NHS Scotland Data Held Ransom by Cyber Threat
A ransomware group targeting a small group of patients has published clinical data related to a small number of those patients on the internet that the Dumfries and Galloway Health Board is aware of. In the meantime, three terabytes…
Kiosks in Brookline is Tracking Cell Phone Data
Data is everywhere. It is at your fingertips. It’s all over town, yet your info may be shared around without your knowledge. Brookline put digital signs throughout town, which have gotten people talking since they are collecting individual cell…
Hacker Generates 1 Billion CGT Tokens Valued at $40 Million within Curio Ecosystem
The Curio decentralized finance (DeFi) initiative encountered a breach, with experts from Cyvers Alerts approximating the incurred losses to be around $16 million. The breach appears to have been orchestrated through an exploitation of vulnerabilities within the permissioned access…
Data Highways: Navigating the Privacy Pitfalls of New Automobiles
There is a possibility that these vehicles may be collecting vast amounts of information about their users that can be accessed by advertisers, data brokers, insurance companies and others, and that information could be shared with several companies including…
Unveiling the New Era of Hacking Ethics: Profit Over Principles
Hacking, once a realm of curiosity-driven exploration, has morphed into a complex ecosystem of profit-driven cybercrime. Originating in the 1960s, hacking was fueled by the insatiable curiosity of a brilliant community known as “hackers.” These early pioneers sought to…
Ransomware Strikes Tarrant Appraisal District
Tarrant Appraisal District (TAD) finds itself grappling with a major setback as its website falls prey to a criminal ransomware attack, resulting in a disruption of its essential services. The attack, which was discovered on Thursday, prompted swift action…
Unmasking Cyber Shadows: New Zealand’s Battle Against State-Backed Hackers
Recently, New Zealand accused China of engaging in “malicious cyber activity” targeting its parliament. This accusation sheds light on the growing tensions between nations and the need to safeguard democratic institutions from cyber espionage. In this blog, we delve into…
Facebook Spied on Users’ Snapchat Traffic in a Covert Operation, Documents Reveal
In 2016, Facebook initiated a secret initiative to intercept and decrypt network traffic between Snapchat users and the company’s servers. According to recently revealed court filings, the purpose was to better analyse user behaviour and help Facebook compete with…
‘Tycoon’ Malware Kit Bypasses Microsoft and Google Multifactor Authentication
An emerging phishing kit called “Tycoon 2FA” is gaining widespread use among threat actors, who are employing it to target Microsoft 365 and Gmail email accounts. This kit, discovered by researchers at Sekoia, has been active since at least…
The Great Data Heist: China’s Alleged Theft of Voter Data and Its Potential Impact
Chinese-backed hackers allegedly targeted U.S. officials, journalists, corporations, pro-democracy activists and the United Kingdom’s electoral watchdog in a comprehensive, state-backed attack on March 25, authorities announced in an announcement on March 25. The attack was aimed at targeting officials,…
Safeguarding the NHS: Protecting Against Potential Cyber Attacks from China
Recent concerns have surfaced regarding the vulnerability of the NHS to cyberattacks, particularly from China. Reports indicate that Beijing-backed actors exploited software flaws to access the personal details of millions of Britons. As experts in cybersecurity, it’s crucial to…
What Are The Risks of Generative AI?
We are all drowning in information in this digital world and the widespread adoption of artificial intelligence (AI) has become increasingly commonplace within various spheres of business. However, this technological evolution has brought about the emergence of generative AI,…
Data Breach at Giant Tiger: Protecting Customer Information in the Digital Age
In an increasingly interconnected world, data breaches have become a recurring nightmare for organizations of all sizes. The recent incident at Giant Tiger Stores Ltd., a popular discount retailer based in Ottawa, serves as a stark reminder of the importance…
Here Are Three Ways AI Will Transform Gaming Forever
Technology has been impacted by artificial intelligence in practically every field. You would struggle to identify a tech-related field where artificial intelligence hasn’t had some sort of impact, from data analysis to art programmes. AI hasn’t advanced as quickly…
Security Failure in Ray Framework Leads to Server Breach
There has been a hacking attack on a widely used open-source AI framework called Ray, which hackers have exploited to gain unauthorized access to servers and hijack their resources, as a result of an unpatched vulnerability. It has been…
Hidden Dangers of Public Wi-Fi: What A Traveler Needs To Know
Public Wi-Fi networks have become ubiquitous in our modern world, offering convenience and connectivity to travellers and commuters alike. However, beneath the surface lies a web of hidden dangers that could compromise your privacy and security. As an expert…
CHR Cautions Bacolod City Regarding QR Code Proposal for Entertainers
The Commission on Human Rights (CHR) has raised concerns over a proposal by the Bacolod city government regarding the inclusion of quick response (QR) codes on health cards issued to employees of entertainment establishments. The aim of this proposal…
Parent Company of Vans Alerts 35.5 Million Customers Following Data Breach
VF Corporation, the parent company of popular brands like Vans and North Face, has confirmed a significant data breach that occurred in December, affecting approximately 35.5 million of its customers. The breach exposed sensitive information including email addresses, names,…
Digital Arrest Scam: Woman Doctor Duped for 40 Lakhs, Loses Her Entire Savings
In today’s digital world, our lives are interconnected through the internet. From shopping on the web and managing finances to connecting with our loved ones, everything is done online these days. But the comfort also comes with some risks. Professor…
Living-Off-the-Land (LOTL) Attacks: Here’s Everything You Need to Know
In the unrelenting fight of cybersecurity, cyberattacks continue to become more elusive and sophisticated. Among these, threat actors who use Living Off the Land (LOTL) strategies have emerged as strong adversaries, exploiting legitimate system features and functionalities to stealthily…
UK Government’s New AI System to Monitor Bank Accounts
The UK’s Department for Work and Pensions (DWP) is gearing up to deploy an advanced AI system aimed at detecting fraud and overpayments in social security benefits. The system will scrutinise millions of bank accounts, including those receiving state…
New Car Owners Beware: Study Finds Serious Data Protection Flaws
Modern gadgets have been collecting every bit of user data they can gather, just to sell it off to the highest bidder, ever since tech companies realized that data could be sold for dollars. While the user’s car has…
Is iPhone’s Journal App Sharing Your Personal Data Without Permission?
In the digital age, where convenience often comes at the cost of privacy, the Journal app stands as a prime example of the fine line between utility and intrusion. Marketed as a tool for reflection and journaling, its functionality…
Are GPUs Ready for the AI Security Test?
As generative AI technology gains momentum, the focus on cybersecurity threats surrounding the chips and processing units driving these innovations intensifies. The crux of the issue lies in the limited number of manufacturers producing chips capable of handling the…
This Security Flaw Enables Hackers to Unlock Millions of Hotel Doors
Researchers have unveiled vulnerabilities impacting approximately 3 million Saflok electronic RFID locks found in 13,000 hotels and homes globally, which could potentially enable unauthorized access to any door in a hotel by creating fake keycards. Discovered by a team…
Authorities Warn of AI Being Employed by Scammers to Target Canadians
As the usage of artificial intelligence (AI) grows, fraudsters employ it more frequently in their methods, and Canadians are taking note. According to the Royal Bank of Canada’s (RBC’s) annual Fraud Prevention Month Poll, 75% of respondents are more…
Mule Recruitment Scheme: Scammers Making Innocents Accomplices Into Money Laundering
If an online offer seems too good to be true and needs managing money, it is a possible mule recruitment scam. RBI and NPCI warn users The National Payments Corporation of India (NPCI) and RBI regulations advise not using Indian…
Evasive Sign1 Malware Hits 39,000 WordPress Sites in Widespread Cyber Assault
In the past six months, a major malware campaign known as Sign1 has compromised over 39,000 WordPress sites, using malicious JavaScript injections to direct people to scams. In a report published this week by Sucuri, it is estimated that…
How Hackers Breached 3 Million Hotel Keycard Locks
The Unsaflok hack technique has raised concerns about the security of Saflok hotel locks. This sophisticated method exploits vulnerabilities in Saflok’s system, potentially compromising the safety of guests and the reputation of hospitality establishments. The Unsaflok hack technique, first uncovered…
Controversy Surrounds Flipper Zero Amid Car Theft Concerns
In the midst of rising concerns over car thefts in Canada, the Flipper Zero, a popular device known for its penetration-testing capabilities, has found itself at the centre of a heated debate. Canadian officials have proposed a ban on…
Unpatchable Security Flaw in Apple Silicon Macs: A Cryptocurrency Nightmare
In today’s cybersecurity world, vulnerabilities are discovered and patched regularly. However, what happens when a flaw is deemed unpatchable? That’s precisely the situation with a critical security issue affecting Apple Silicon Macs, including the M1, M2, and M3 chips. Let’s…
Critical Flaw Identified in Apple’s Silicon M-Series Chips – And it Can’t be Patched
Researchers have identified a novel, unpatched security vulnerability that can allow an attacker to decrypt data on the most advanced MacBooks. This newly discovered vulnerability affects all Macs utilising Apple silicon, including the M1, M2, and M3 CPUs. To…
General Motors Ceases Sharing Driver Behavior Data with Data Brokers
General Motors announced on Friday that it ceased sharing information on driving habits of its customers with two data brokers involved in creating risk assessments for insurance companies. This decision came in response to a recent report by The…
Unveiling the MaaS Campaign: Safeguarding Android Users in India
In the vast landscape of cybersecurity threats, a new campaign has emerged, targeting Android users in India. Dubbed as the “MaaS Campaign,” this nefarious operation has caught the attention of security experts worldwide due to its sophisticated nature and…
Akamai Research Exposes Vulnerability: APIs Now Prime Targets for 29% of Web Attacks
As part of the State of the Internet (SOTI) reports, a series of threats and data insights from Akamai, this year marks the 10th year in which Akamai has been publishing these reports. Since then, the focus of these…
Cyber Extortion Stoops Lowest: Fake Attacks, Whistleblowing, Cyber Extortion
Recently, a car rental company in Europe fell victim to a fake cyberattack, the hacker used ChatGPT to make it look like the stolen data was legit. It makes us think why would threat actors claim a fabricated attack? We…
GitHub Unveils AI-Driven Tool to Automatically Rectify Code Vulnerabilities
GitHub has unveiled a novel AI-driven feature aimed at expediting the resolution of vulnerabilities during the coding process. This new tool, named Code Scanning Autofix, is currently available in public beta and is automatically activated for all private repositories belonging…
Gmail and Facebook Users Advised to Secure Their Accounts Immediately
In a recent report by Action Fraud, it has been disclosed that millions of Gmail and Facebook users are at risk of cyberattacks, with Brits losing a staggering £1.3 million to hackers. The data reveals that a concerning 22,530…