Okta stated on Friday that the recent breach at the digital identity management services provider, which resulted in the targeting of some of its customers, likely occurred when an employee logged into a personal Google account using a company…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Critical Flaw in Atlassian’s Confluence Server Allows Hackers to Run Commands
According to experts, a severe flaw in Atlassian’s Confluence corporate server program that permits malicious commands and resets servers is actively exploited by threat actors in cyber attacks that install ransomware. Glenn Thorpe, senior director of security research and detection…
KandyKorn: Apple MacOS Malware Targets Blockchain Engineers of Crypto Exchange Platform
A new malware linked to the North Korean threat group Lazarus was discovered on Apple’s macOS, and it appears that it was intended for the blockchain engineers of a crypto exchange platform. KandyKorn Malware According to a study conducted by…
Increasing Data Security in the Digital Era
Protecting our online profile has become crucial in the current digital era. Keeping up with the most recent technologies and techniques is essential to safeguarding personal data and privacy in light of the constantly changing technological landscape. To assist you…
British Library Hit by Cyber Incident, Disrupting Services
The British Library in London, known for its serene study environment and vast collection of 170 million items, has been disrupted by a “cyber incident.” This event has led to the shutdown of its website, impeding access to the…
Unlocking the Shadows: New Research Reveals AI’s Hidden Role in Unofficial Financial Markets
A bot was seen making an illegal purchase of stocks using made-up insider information at the UK’s AI safety summit in a demonstration that showed just how useful AI can be. The company denied the fact that it had…
Socks5Systemz Proxy Service Impacts 10,000 Systems Globally
A proxy botnet identified as ‘Socks5Systemz’ has been infecting computers across the globe with the ‘PrivateLoader’ and ‘Amadey’ malware loaders, with 10,000 infected devices currently. The malware infects computers and transforms them into traffic-forwarding proxies for malicious, illegal, or…
Medusa Ransomware Group Takes Ownership for Cyber-attack on Canadian Psychological Association
The Canadian Psychological Association (CPA), the main official body for psychologists in Canada, is said to have been the target of a cyberattack by the infamous Medusa ransomware group. The recent incident points out the rising risk posed by threat…
Torrent Service Data Breach: What You Need to Know
A significant data breach has affected one of the top pirate providers, according to recent developments. Security and safety issues about online torrenting platforms have been brought up by the breach, which was found by experts in cybersecurity. According…
Notorious Ransomware Gang Claims Responsibility for Cyberattack on Southwestern Ontario Hospitals
A notorious cybercrime gang known as Daixin Team has publicly admitted to pilfering millions of records from five hospitals in southern Ontario, subsequently leaking the data online when their ransom demands were not met. The targeted hospitals include those…
5 Things to Consider Before Downloading an App
Apps have become an essential means in today’s world whether it comes to communication, shopping, gaming, research, or almost anything else. And since apps are being used so widely, it has also become popular for threat actors to use them…
Phishing Scare at Bitfinex: Employee Breach Exposes Users to Cyber Threats
A phishing attack was carried out on one of Bitfinex’s customer service representatives earlier this week, which resulted in a minor security incident. It was determined that the attack was not a virus, but rather a phishing attack. The…
Google Introduces Badges to Identify Which VPN App has Passed a Security Audit
Google has recently confirmed that they will be introducing an Independent Security Review badge to identify Android VPN apps that have undergone an independent security assessment, taking into account the concerns of users regarding Android cybersecurity. The App Defense Alliance…
American Airlines Pilot Union Targeted in a Major Ransomware Attack
In the wake of the most recent in a string of cyberattacks that have affected the aviation sector, the American Airlines pilot union is attempting to restore its systems. On October 30, the union, which is in charge of…
US Focus on Cybersecurity, But Contractors Lag Behind in Preparedness
The leaders of the Five Eyes, a coalition of English-speaking intelligence agencies, have emphasized the critical nature of safeguarding sensitive information in cyberspace, especially in light of the escalating tensions with The People’s Republic of China, which they have…
How is Brave’s ‘Leo’ a Better Generative AI Option?
Brave Browser Brave is a Chromium-based browser, running on Brave search engine, that restricted tracking for personal ads. Brave’s new product – Leo – is a generative AI assistant, on top of Anthropic’s Claude and Meta’s Llama 2. Apparently, Leo…
How Blockchain Technology Can Reshape Systems Via Computer Vision?
Blockchain technology vows to bring transformative changes in several sectors. Via ‘computer vision’ integration, blockchain has the potential to enhance the abilities of computer vision in several ways. This blog provides a detailed look at the benefits of integrating blockchain…
Security Executives: Navigating Cyber Liability Risks
Businesses and organizations across all industries now prioritize cybersecurity as a top priority in an increasingly digital world. Following cyber threats and breaches, security executives are facing increasing liability issues, as reported in recent studies. In addition to highlighting the…
Here’s How RegTech is Transforming India’s Regulatory Landscape
Businesses in India finish their GST returns for the month on the 20th of each month, believing their compliance work for the month is finished. However, they soon receive automated notices pointing out inconsistencies in their reporting. This procedure…
Worldwide Alliance: 50 Countries Join Forces Against Ransomware Attacks
The technology giant has launched a new initiative in response to six high-profile cyberattacks that exploited different aspects of Microsoft’s security and cloud infrastructure in the past few years, which aimed to revamp the company’s approach to software security…