Monash Health, a Victorian public health agency, has announced that it had been impacted by the recent ZircoDATA hack. Earlier this year in February, ZircoDATA, which provides safe document storage, data management, and digital conversion of 9,000 clients across…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
New Cuttlefish Malware Hijacks Router Connections, Cloud Data Stolen
In the ever-evolving landscape of cybersecurity threats, a new menace has emerged: Cuttlefish. This sophisticated malware targets enterprise-grade and small office/home office (SOHO) routers, posing a significant risk to both businesses and individual users alike. Discovered by Lumen Technologies’…
Report: Spanish Authorities Discover CPF Nomination Note on iPad of Slain Singaporean Woman in Spain
Singaporean authorities, along with two banks and Hong Kong police, thwarted a scam targeting a 70-year-old victim, recovering over S$370,000. The Singapore Police Force (SPF) disclosed that DBS detected suspicious transactions amounting to about S$180,000, promptly blocking further transfers…
Hackers are Targeting Routers Across the Globe
When hackers identify an unsecured router, they penetrate it by installing malware that provides them persistence, the ability to launch distributed denial of service (DDoS) assaults, hide malicious data, and more. But what happens when the hackers discover a…
CISA Ask Companies to Fix Path Traversal Vulnerabilities
CISA and FBI urge companies to take patch actions CISA and the FBI recommended software companies today to assess their products and fix route traversal security flaws before selling. Attackers can leverage path traversal vulnerabilities (also known as directory traversal)…
NSW Cybercrime Squad Arrests Suspect in Million-Person Data Breach Case
In a significant development, the Cybercrime Squad in New South Wales (NSW) has made a crucial breakthrough in a case involving a mass data breach affecting approximately one million individuals. The arrest of a 46-year-old man from Fairfield West…
Insect Farmers Embrace AI to Drive Down Production Costs
The insect farming industry, previously thought of as an industry that was in desperate need of development, has rapidly gained popularity as a practical and sustainable solution to the severe worldwide challenges of food safety, environmental degradation, and aid…
Facial Recognition System Breach Sparks Privacy Concerns in Australia
A significant privacy breach has shaken up the club scene in Australia, as a facial recognition system deployed across multiple nightlife venues became the target of a cyberattack. Outabox, the Australian firm responsible for the technology, is facing intense scrutiny…
DropBox E-Signature Breach Exposes Customer Data
DropBox has announced a breach in its DropBox Sign eSignature platform, formerly known as HelloSign. The breach, uncovered on April 24, has left customer data vulnerable, including authentication tokens, MFA keys, hashed passwords, and personal information. The breach was…
French Hospital CHC-SV Refuses to Pay LockBit Ransomware Demand
The Hôpital de Cannes – Simone Veil (CHC-SV) in France revealed that it has received a ransom demand from the Lockbit 3.0 ransomware gang and refused to pay the ransom. On April 17, the 840-bed hospital announced a serious…
Strengthening Password Security: Addressing Misconceptions and Best Practices
According to recent research by the Institution of Engineering and Technology (IET), conducted to mark World Password Day, only one in five people in the UK can correctly identify a secure password over a risky one. This alarming statistic…
Sweden Faces Influx of DDoS Attacks Following NATO Membership
A significant uptick in distributed denial of service (DDoS) attacks has plagued Sweden as the nation navigates its path towards joining NATO, reports network performance management provider Netscout. The onslaught commenced notably in May 2023, following a colossal 500…
Google’s Med-Gemini: Advancing AI in Healthcare
On Tuesday, Google unveiled a new line of artificial intelligence (AI) models geared toward the medical industry. Although the tech giant has issued a pre-print version of its research paper that illustrates the capabilities and methodology of these AI models,…
AI vs Human Intelligence: Who Is Leading The Pack?
Artificial intelligence (AI) has surged into nearly every facet of our lives, from diagnosing diseases to deciphering ancient texts. Yet, for all its prowess, AI still falls short when compared to the complexity of the human mind. Scientists are…
AI Takes the Controller: Revolutionizing Computer Games
The computer games industry has been a part of Andrew Maximov’s life for 12 years and despite all of this experience, he still marvels at how much money it costs to build some of the biggest games of all…
Privacy Breach Rocks Australian Nightlife as Facial Recognition System Compromised
A significant privacy breach has shaken up the club scene in Australia, as a facial recognition system deployed across multiple nightlife venues became the target of a cyberattack. Outabox, the Australian firm responsible for the technology, is facing intense…
Hackers Claim Biggest Attack On UAE in History
The United Arab Emirates government was the target of a significant data breach attack that has the cybersecurity industry on edge. The attacker, who goes by the username “UAE,” has not been recognized. Unless a ransom of 150 bitcoins (about…
Cyber Criminal Sentenced for Targeting Therapy Patients
In a recent legal case that has shaken Finland, cyber offender Julius Kivimäki, known online as Zeekill, has been sentenced to six years and three months behind bars for his involvement in a sophisticated cybercrime operation. The case revolves around…
Industrial Cyberattackers Reverting to USB Tactics, Says Honeywell Report
In a surprising turn of events, the use of removable media, particularly USB devices, has resurged as a favoured tactic among industrial cyber attackers. Honeywell’s recently released “2024 USB Threat Report” sheds light on this concerning trend, emphasizing its…
Apple Working to Patch Alarming iPhone Issue
Apple claims to be working rapidly to resolve an issue that resulted in some iPhone alarms not setting off, allowing its sleeping users to have an unexpected lie-in. Many people rely on their phones as alarm clocks, and some…
No MFA, No Defense: Change Healthcare Falls Victim to Citrix Account Hijacking
A UnitedHealth spokesperson confirmed that the black cat ransomware gang had breached Change Healthcare’s network, using stolen credentials to get into the company’s Citrix remote access service, which was not set up to support multi-factor authentication. It was revealed…
Safeguarding Your Employee Data From Identity Theft
In today’s digital age, where data breaches and cyberattacks are increasingly common, safeguarding against identity-based attacks has become paramount for organizations worldwide. Identity-based attacks, which involve the unauthorized access to sensitive information through compromised user credentials, pose significant risks…
Microsoft Alerts Users as Russian Hackers Target Windows Systems
As advancements in AI technology continue to unfold, the specter of cybercrime looms larger each day. Among the chorus of cautionary voices, Microsoft, the eminent IT behemoth, adds its warning to the fray. Microsoft’s Threat Intelligence researchers have issued…
North Korean Scammers Lure Developers with Fake Job Offers
A new cyber scam, dubbed “Dev Popper,” is preying on software developers through fake job interviews. This elaborate ruse, masquerading as genuine employment opportunities, aims to infiltrate the victim’s computer with a harmful Python backdoor, posing serious cyber threats. How…
Safeguarding Reproductive Health Workers: Addressing Risks Posed by Data Brokers and Doxxing
In today’s interconnected digital landscape, the acquisition and dissemination of personal data have reached unprecedented levels, posing significant risks to individuals across various sectors, including reproductive health workers. At the forefront of this modern dilemma are entities known as…
GM Car Buyers’ Nightmare: The Unveiling of a Program Raising Insurance Rates
It is believed that auto manufacturers are selling millions of pieces of data to the insurance industry about the driving behaviours of their customers. It is my responsibility to report the story about GM sharing driving data from connected…
Is ChatGPT Secure? Risks, Data Safety, and Chatbot Privacy Explained
You’ve employed ChatGPT to make your life easier when drafting an essay or doing research. Indeed, the chatbot’s ability to accept massive volumes of data, break down it in seconds, and answer in natural language is incredibly valuable. But…
User Privacy Threats Around T-Mobile’s ‘Profiling and Automated Decisions’
In today’s digital age, it is no secret that our phones are constantly tracking our whereabouts. GPS satellites and cell towers work together to pinpoint our locations, while apps on our devices frequently ping the cell network for updates on…
Quantum Technology: Implications for Digital Security
In our modern, highly connected world, where online transactions are everywhere, the looming presence of quantum computing casts a momentous shadow. Unlike classical computers, which rely on bits to process information, quantum computers leverage the peculiar properties of quantum…
Fraudulent npm Packages Deceive Software Developers into Malware Installation
A new cyber threat dubbed DEV#POPPER is currently underway, targeting software developers with deceitful npm packages disguised as job interview opportunities, aiming to dupe them into downloading a Python backdoor. Securonix, a cybersecurity firm, has been monitoring this activity…
Redefining Education: The AI Revolution in Classrooms Everywhere
There is a new report from the World Economic Forum that discusses how artificial intelligence can revolutionize education systems and help educators and students have a better experience. AI has a huge amount of potential, ranging from personalizing learning…
Dutch Threat Experts Issues Warning to Companies Regarding Ransomware Attack
Thousands of companies have received alerts about a global ransomware attack from the Dutch cybersecurity agencies. The perpetrators, known as the Cactus Gang, hail from Eastern Europe and have been operating since the end of last year. The gang…
Ransomware Strikes St-Jerome Company: Everest Group Suspected
Les Miroirs St-Antoine Inc., a longstanding company in the St-Jérôme region, is grappling with the aftermath of an alleged ransomware attack orchestrated by the infamous Everest Group. Founded in 1956, Les Miroirs St-Antoine specializes in glazing and aluminum products…
Protecting Users Against Bugs: Software Providers’ Scalable Attempts
Ransomware assaults, such as the one on Change Healthcare, continue to create serious disruptions. However, they are not inevitable. Software developers can create products that are immune to the most frequent types of cyberattacks used by ransomware gangs. This blog…
Qlik Sense Servers Prone To Cactus Ransomware Threats
Security experts are urgently warning about the vulnerability of thousands of Qlik Sense servers to potential ransomware attacks by the troubling Cactus group. Despite prior disclosures of vulnerabilities by Qlik, many organisations remain at risk due to unpatched systems.…
Defense-in-Depth: A Layered Approach for Modern Cybersecurity
The cybersecurity landscape has shifted dramatically in recent years. Malware, phishing attempts, and data breaches have grown in frequency and scope, prompting organisations to invest more time and money into enhancing their cybersecurity strategies. Organisations should be aware of…
Japanese Authorities Deploy Counterfeit Payment Cards to Alert Victims of Support Scams
Japanese police has initiated a unique strategy involving the placement of counterfeit payment cards in convenience stores to safeguard elderly individuals from tech support scams and unpaid money fraud. These fake cards, labeled as “Virus Trojan Horse Removal Payment…
Apple ID Shuts Down: Users Panic While Trying to Reset Password
Apple IDs serve as the gateway to our digital ecosystem. They unlock access to our beloved photos, messages, apps, and more. But what happens when that gateway suddenly slams shut, leaving us confused outside? Recently, Apple users have been struggling…
Banish Browser Clutter: How to Easily Remove Junk Files on Android
A web browser on users’ Android phones may collect data, such as cookies and cache, that can be useful, but can also be unwanted and may pose a security risk to their privacy. It is recommended that users clear…
Teachers’ Taxes Fraudulently Filed in Glendale Ransomware Attack
The Glendale Unified School District recently found itself at the center of a distressing situation when teachers, nurses, counsellors, and other faculty members received an unexpected notification from the IRS: their taxes had already been filed. What unfolded was…
Why Shouldn’t You Upload Files So Readily On Your Browser?
The digital society we live in has made it abundantly clear that being cautious about online activities goes beyond avoiding suspicious links. Recent findings by cybersecurity researchers have surfaced a new ransomware threat that exploits web browsers, potentially putting users’…
Cactus Ransomware Exposes Thousands of Vulnerable Qlik Sense Servers
Many organizations remain dangerously vulnerable to the Cactus ransomware group, despite security researchers warning of the threat five months ago. The Cactus ransomware group exploits three vulnerabilities in QlikSense’s data analytics and business intelligence platform. Two vulnerabilities were released…
Researchers Successfully Sinkhole PlugX Malware Server, Recording 2.5 Million Unique IPs
Researchers successfully seized control of a command and control (C2) server linked to a variant of the PlugX malware, effectively halting its malicious operations. Over the span of six months, more than 2.5 million connections were logged from diverse…
SpaceX Data Breach: Hunters International Publishes Alleged Stolen Data
Elon Musk’s aerospace manufacturing and space transport services firm, SpaceX, is believed to have experienced a cybersecurity incident involving a data breach with Hunters International, an infamous hacker group that allegedly released samples of the SpaceX data breach. The…
5 Attack Trends Your Company Should Be Aware Of
Cybersecurity is always evolving and demands ongoing awareness Every day, Microsoft analyzes over 78 trillion security signals to gain a deeper understanding of the current threat pathways and methodologies. Since last year, we’ve seen a shift in how threat actors…
Modern Phishing Attacks: Insights from the Egress Phishing Threat Trends Report
Phishing attacks have long been a significant threat in the cybersecurity landscape, but as technology evolves, so do the tactics employed by cybercriminals. The latest insights from the Egress Phishing Threat Trends Report shed light on the sophistication and…
North Korean Hackers Exploit LinkedIn in Targeted Attacks
The North Korean hacker group Lazarus has once again made headlines, this time for exploiting LinkedIn in their cyber operations. According to a report by blockchain security analytics firm SlowMist, Lazarus hackers are leveraging the professional networking platform to…
Deceptive npm Packages Employed to Deceive Software Developers into Malware Installation
A persistent scheme aimed at software developers involves fraudulent npm packages disguised as job interview opportunities, with the intention of deploying a Python backdoor onto their systems. Securonix, a cybersecurity company, has been monitoring this campaign, dubbed DEV#POPPER, which…
The Tech Landscape: Rubrik, TikTok, and Early-Stage Startups
The idea that the public markets are not as exclusive to tech firms as some believed was reinforced by Rubrik’s aggressive IPO pricing and the positive response it received from the public markets following its listing. If Rubrik’s outcome is…
How to Erase The Personal Details Google Knows About You
One can get a sense of the volume of data they are giving away to Google every day by considering all the things they do on Chrome, Gmail, YouTube, Google Maps, and other Google services. That is… a lot…
TCS CEO Predicts AI Revolution to Decimate India’s Call Center Industry in Just One Year
As early as next year, Tata Consultancy Services’ head said, artificial intelligence will generate a “minimal” need for call centres, as AI’s rapid advancements to date are set to disrupt a vast industry across Asia and beyond. AI’s rapid…
Safeguarding Your Digital Future: Navigating Cybersecurity Challenges
In the ever-expanding realm of technology, the omnipresence of cybercrime casts an increasingly ominous shadow. What was once relegated to the realms of imagination has become a stark reality for countless individuals and businesses worldwide. Cyber threats, evolving in…
Cybercriminals Exploit Web Hosting Platforms to Spread Malware
Cybersecurity researchers at Zscaler ThreatLabz have uncovered a concerning trend in which cybercriminals are exploiting popular web hosting and blogging platforms to disseminate malware and steal sensitive data. This sophisticated tactic, known as SEO poisoning within the realm of…
Godfather Banking Trojan Multiplies, Spreading to 1.2K Variants in 57 Nations
Over a thousand variants of the Godfather mobile banking Trojan have been detected in numerous countries worldwide, targeting a wide array of banking applications. Initially uncovered in 2022, Godfather has emerged as a pervasive malware-as-a-service tool in cybercrime circles,…
Here’s How NFTs Can Transform Asset Management
NFTs are frequently discussed in terms of their role in digital art, but beneath the surface, there is a massive, unexplored potential for revolutionising real-world asset ownership and transaction. This possibility was the focus of a recent conversation between…
Junk Ransomware: Getting the Job Done For Hackers
Sophos detects ransomware In an April 17 analysis from its Sophos X-Ops research team, cybersecurity firm Sophos observed an increase in low-cost, primitive ransomware—a boon for aspiring threat actors and a headache for defenders. It’s far more difficult to find…
The GuptiMiner Attack: Lessons Learned from a Five-Year Security Breach
In a startling revelation, security researchers from Avast have uncovered a sophisticated cyberattack that exploited vulnerabilities in the update mechanism of eScan, an antivirus service, for a staggering five years. The attack, orchestrated by unknown hackers potentially linked to…
Cryptocurrency Chaos: El Salvador’s Bitcoin Wallet Code Leaked, Privacy at Risk
There was a security breach with El Salvador’s state Bitcoin wallet, Chivo, after hackers from the group CiberInteligenciaSV leaked a part of its source code to a hacking forum. In the earlier leak of personal data belonging to nearly…
Hackers Utilize Antivirus Update Mechanism to Deploy GuptiMiner Malware
North Korean hackers have been utilizing the updating system of the eScan antivirus to infiltrate major corporate networks and distribute cryptocurrency miners via the GuptiMiner malware, according to researchers. GuptiMiner, described as a highly sophisticated threat, possesses capabilities such…
Is Online Banking Truly Safe? Understanding the Safety Loopholes in Bank Websites
In today’s increasingly digital landscape, ensuring the security of online banking platforms is paramount. With cyber threats evolving and becoming more sophisticated, financial institutions face the constant challenge of fortifying their systems against unauthorized access and data breaches. Recently,…
UnitedHealth Paid Ransom After Massive Change Healthcare Cyber Assault
The Russian cybercriminals who targeted a UnitedHealth Group-owned company in February did not leave empty-handed. “A ransom was paid as part of the company’s commitment to do everything possible to protect patient data from disclosure,” a spokesperson for UnitedHealth…
DPRK Hackers Compromise South Korean Defense Contractors
It was reported on Tuesday that the North Korean hacking groups have been mounting “all-out” cyberattacks against South Korean defence companies, infiltrating their internal networks and stealing their technical data over the past year, South Korean police said. According…
Banking Malware “Brokewell” Hacks Android Devices, Steals User Data
Security experts have uncovered a new Android banking trojan called Brokewell, which can record every event on the device, from touches and information shown to text input and programs launched. The malware is distributed via a fake Google Chrome update…
General Motors Under Fire for Secretly Spying on Drivers
In a developing story that has captured public attention, General Motors (GM) finds itself embroiled in controversy amidst accusations of clandestine surveillance and unauthorised data sharing with insurance companies. The unfolding narrative, spearheaded by investigative journalist Kashmir Hill of…
Is Your VPN Safe? Or Can It be Hacked?
A virtual private network is one of the simplest ways for consumers to secure their internet activity. VPNs utilize tunneling technology to encrypt a user’s online traffic and make it unreadable to prying eyes. This additional layer of security has…
ToddyCat APT Is Siphoning Data on ‘Industrial Scale’
ToddyCat, an advanced persistent threat (APT) gang that targets the government and defence industries, has been seen collecting stolen data “on an industrial scale” from victim organisations in Asia-Pacific. Kaspersky researchers first disclosed details regarding the elusive gang’s actions…
Discord Users’ Privacy at Risk as Billions of Messages Sold Online
In a concerning breach of privacy, an internet-scraping company, Spy.pet, has been exposed for selling private data from millions of Discord users on a clear web website. The company has been gathering data from Discord since November 2023, with…
Cyberattack Fallout: UnitedHealth Reveals Personal Data Breach Impact
As part of its ongoing data breach response, UnitedHealth Group has informed its subsidiaries, Change Healthcare, that they have recently experienced a data breach. Following the February cyberattack on its subsidiary Change Healthcare, UnitedHealth Group revealed on Monday that…
Unveiling Vulnerabilities in Microsoft PlayReady DRM: Impact on Streaming Platforms
In a meticulous research endeavor, Security Explorations, a division of AG Security Research, embarked on an exhaustive analysis of Microsoft’s Warbird and Protected Media Path (PMP) technologies. The culmination of this investigation has unearthed critical deficiencies within the security…
HelloKitty Ransomware Renames to ‘HelloGookie,’ Unveils CD Projekt and Cisco Data
The operator behind the HelloKitty ransomware has rebranded it as ‘HelloGookie,’ with passwords for previously leaked CD Projekt source code, Cisco network data, and decryption keys from earlier attacks being released. Identified as ‘Gookee/kapuchin0,’ the threat actor claims to…
Here’s How to Remove Unnecessary Files from Your Android Phone’s Web Browser
The web browser on your Android phone collects a significant amount of data from the websites you visit, much of which is unnecessary to keep on your device. Regardless of whether you use Google Chrome, Mozilla Firefox, or Samsung…
Where Hackers Find Your Weak Spots: A Closer Look
Social engineering is one of the most common attack vectors used by cyber criminals to enter companies. These manipulative attacks often occur in four stages: Info stealing from targets Building relationships with target and earning trust Exploitation: Convincing the target…
Malware Author Lures Child Abusers Into Honeytrap to Extort Them
You rarely root for online criminals, but a new malware campaign targeting child exploiters does not make you feel awful about the victims. Since 2012, threat actors have developed a range of malware and ransomware that impersonate government agencies…
Stock Market Scam in Bengaluru: Businessman Loses Rs 5.2 Crore
In a recent cybercrime incident, a 52-year-old businessman from Bengaluru fell victim to a stock market scam, losing a staggering Rs 5.2 crore. The victim, referred to as Sharath for anonymity, reported the incident to the cybercrime police on April…
Dark Web Nightmare: Scots NHS Patient Data Breach Exposes Medical Files
Following a major data breach at NHS Dumfries and Galloway, patients can access their private medical records online with just a few clicks. It has been reported that an extremely large amount of data has been stolen from the…
Cyber Attack Hits UK’s Carpetright, Affecting Customer Orders
Carpetright, an eminent flooring retailer in the UK, has fallen victim to a cyber attack, causing disruption to its operations and affecting hundreds of customer orders. Last week, hackers targeted the flooring specialist’s head office in Purfleet, Essex, by…
Wells Fargo Data Breach: Safeguarding Customer Information in a Digital Age
In a digital age where data breaches have become all too common, the recent disclosure of a data breach at Wells Fargo, a prominent multinational financial services corporation, has once again brought cybersecurity concerns to the forefront. The breach,…
MITRE Breach: State Hackers Exploit Ivanti Zero-Days
A state-backed hacking group successfully breached MITRE Corporation’s systems in January 2024 by exploiting two Ivanti VPN zero-day vulnerabilities. The incident was detected after suspicious activity was observed on MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified collaborative…
Indian Banks Mull New Move for Faster Freezing of Scammers’ Accounts
Indian banks have proposed integrating their systems with the National Cybercrime Reporting Portal (NCRP), a division of the ministry of home affairs, which could enable a quicker freeze on fraudulent accounts in the wake of a cyberattack. This is…
Survey Finds Two-Thirds of Leading Pharmas Restrict ChatGPT Usage, While Many in Life Sciences Industry Deem AI ‘Overrated’
In the ongoing debate over the integration of artificial intelligence (AI) into various industries, the biopharmaceutical sector is taking a cautious approach. According to a recent survey conducted by ZoomRx among over 200 professionals in life sciences, more than…
Data Breach at Real America’s Voice: User Information Compromised
In the past few weeks, a group of homosexual, furry hackers called SiegedSec has hacked the far-right media outlet Real America’s Voice, and they have taken it down. As well as hosting far-right commentators such as Steve Bannon and…
Drop in ransomware payment, 2024 Q1 sees a record low of 28%
Ransomware actors have encountered a rocky start in 2024, as indicated by statistics from cybersecurity firm Coveware. Companies are increasingly refusing to acquiesce to extortion demands, resulting in a record low of only 28% of companies paying ransom in…
Rise In Cybercrime: Dark Web Fueling Credential Attacks
In an unsettling situation, cybercriminals are increasingly turning to credential theft as a lucrative business, aided by the rise of infostealer malware attacks. Over the past three years, these threat actors have capitalised on the opportunity, compromising millions of…
UN Agency Faces Data Crisis: Ransomware Hack Exposes Extensive Data Theft
It is reported that the United Nations Development Programme (UNDP) is investigating a cyberattack involving human resources information stolen from its IT systems due to a breach. To eradicate poverty, fight inequality, and eliminate exclusion from society, UNDP, the…
Numerous LastPass Users Fall Victim to Highly Convincing Scam, Losing Master Passwords
The hackers now have their eyes set on a crucial target: master passwords. These passwords serve as the gateway to password managers, where users store all their login credentials in one secure location. While these managers provide convenience by…
Anonymous Hackers Threaten To Publish IDF’s ‘Top Secret Projects’
The Anonymous hacker group has published a video claiming to have infiltrated Israel’s military and stolen some of its “top secret” documents. Two weeks after Israel’s Justice Ministry admitted a cybersecurity breach that may have taken hundreds of gigabytes…
Tech Outages: Exposing the Web’s Fragile Threads
Today, technology outages have become more than mere inconveniences—they’re disruptions that ripple across industries, affecting businesses, individuals, and even our daily routines. Over 1.75 million user-reported issues flooded in from across the globe. From WhatsApp to Greggs (the UK’s popular sausage…
Cybercriminals Threaten Release of Stolen World-Check Database, Exposing Millions to Financial Risk
A financially motivated criminal hacking group, self-identified as GhostR, has claimed responsibility for the theft of a confidential database containing millions of records from the renowned World-Check screening database. The stolen data, totaling 5.3 million records, includes sensitive information…
Cyberattackers Employ Elusive “CR4T” Backdoor to Target Middle Eastern Governments
A recent revelation by Russian cybersecurity firm Kaspersky sheds light on a covert cyber campaign dubbed DuneQuixote, which has been clandestinely targeting government bodies in the Middle East. This campaign involves the deployment of a newly identified backdoor called…
New AI Speed Cameras Record Drivers on Their Phones
New AI cameras have been deployed in vans to record drivers using their phones while driving or driving without a seatbelt. During a 12-hour evaluation in March, South Gloucestershire Council discovered 150 individuals not wearing seatbelts and seven drivers…
Information Stealer Malware Preys on Gamers via Deceptive Cheat Code Baits
There is a new info-stealing malware that appears as a cheat on a game called Cheat Lab, and it promises downloaders that if they convince their friends to download it too, they will receive a free copy. It is…
GenAI Presents a Fresh Challenge for SaaS Security Teams
The software industry witnessed a pivotal moment with the introduction of Open AI’s ChatGPT in November 2022, sparking a race dubbed the GenAI race. This event spurred SaaS vendors into a frenzy to enhance their tools with generative AI-driven productivity…
Harnessing AI and ChatGPT for Eye Care Triage: Advancements in Patient Management
In a groundbreaking study conducted by Dr. Arun Thirunavukarasu, a former University of Cambridge researcher, artificial intelligence (AI) emerges as a promising tool for triaging patients with eye issues. Dr. Thirunavukarasu’s research highlights the potential of AI to revolutionize…
AT&T User Discusses Safety Measures Following Data Breach
AT&T has periodically tried to downplay the gravity of its recent data breach, but the US telecoms company has now sought to reassure worried consumers with a slew of new security features. In the most recent development in the…
Soumnibot Malware Abuses Bugs to Escape Detection
A new Android banking virus called ‘SoumniBot’ employs a less prevalent obfuscation technique, attacking flaws in the Android manifest extraction and parsing method. The approach allows SoumniBot to bypass typical Android security safeguards and steal information. Kaspersky researchers found and…
The Rise of Bots: Imperva’s Report Reveals Rising Trends in Internet Traffic
In the intricate tapestry of the digital realm, where human interactions intertwine with automated processes, the rise of bots has become an undeniable phenomenon reshaping the landscape of internet traffic. Recent findings from cybersecurity leader Imperva unveil the multifaceted…
U.S. Dams Vulnerable to Cyber Threats
The cybersecurity of America’s dams has come under intense scrutiny, with experts warning of the potential for devastating cyberattacks. Concerns were raised during a recent hearing on cybersecurity threats to critical water infrastructure, where Senator Ron Wyden expressed fears…
Inside Job Exposed: T-Mobile US, Verizon Staff Solicited for SIM Swap Scam
T-Mobile and Verizon employees are being texted by criminals who are attempting to entice them into swapping SIM cards with cash. In their screenshots, the targeted employees are offering $300 as an incentive for those willing to assist the…
APT44: Unearthing Sandworm – A Cyber Threat Beyond Borders
APT44: Operations Against Ukraine A hacking group responsible for cyberattacks on water systems in the United States, Poland, and France is linked to the Russian military, according to a cybersecurity firm, indicating that Moscow may escalate its efforts to target…
Websites Engage in Deceptive Practices to Conceal the Scope of Data Collection and Sharing
Websites frequently conceal the extent to which they share our personal data, employing tactics to obscure their practices and prevent consumers from making fully informed decisions about their privacy. This lack of transparency has prompted governmental responses, such as…