Businesses are increasingly adopting security measures, from passkeys to multifactor authentication (MFA), to safeguard sensitive information and bolster their cybersecurity. However, it’s crucial for security teams to acknowledge that these measures may not provide comprehensive protection for user data.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Using Generative AI to Revolutionize Your Small Business
Staying ahead of the curve is essential for small businesses seeking to succeed in today’s fast-paced business environment. Generative artificial intelligence (AI) is a cutting-edge tool that has gained popularity. The way small firms operate, innovate and expand could be…
Guarding Against DMARC Evasion: The Google Looker Studio Vulnerability
As a free online tool, Google Looker Studio allows users to create reports that can be customized with charts, graphs, and other data points. Once users have prepared their report, they can share it with anyone they desire. It…
Resort Giant Hacked: MGM Resorts Experiences a “Cybersecurity Issue”
In the recent turn of events, MGM Resorts – known to be one of the mega-entertainment and hospitality venues in the world (operating the largest casino on their Las Vegas strip) — has got hacked. A local news outlet in…
BianLian Ransomware Gang Siphons 6.8TB of Data from Save The Children
One of the biggest and oldest charities in the world, Save the Children, has admitted it was a victim of a ransomware attack by the BianLian operation. The attack first came to light on Monday, September 11, when details…
Online Jobseekers Beware: Strategies to Outsmart Scammers
The number of employment scams is increasing, and the number of job seekers who are targets of cunning scammers is also on the rise. A person who is seeking a new job is advised to be vigilant to these…
MrTonyScam: Python-based Stealers Deployed via Facebook Messenger
A new phishing attack has recently been witnessed in Facebook Messenger where messages are being transferred with malwares attached to them, hailing from a “swarm of fake and hijacked personal accounts” and their aim is accessing targets’ business accounts. The…
Hackers Attack Telegram With DDoS After Targeting Microsoft and X
Anonymous Sudan has launched a distributed denial-of-service (DDoS) attack against Telegram in response to the messaging platform’s decision to deactivate its principal account, according to threat intelligence firm SOCRadar. Anonymous Sudan, claiming to be a hacktivist group motivated by…
Google Chrome Launches ‘Privacy Sandbox’ to Phase Out Tracking Cookies
Google has officially commenced the implementation of Privacy Sandbox within its Chrome web browser for a majority of its users. This move comes nearly four months after the initial announcement of the plan. “We believe it is vital to…
The Cybersecurity Crisis: Dating App “Coffee Meets Bagel (CMB)” Hacked again!
In an increasingly digital world, the threat of cyber-attacks is more prevalent than ever. This article delves into an alarming case of cybersecurity breach involving a popular dating platform, which led to over 620 million user accounts being compromised…
Chrome’s Invasive New Tracking Sparks Need for a New Browser
The importance of privacy issues has increased in the digital era, leading people to look for browsers that prioritize data protection. One of the most popular browsers, Chrome, has recently drawn criticism for its intrusive new tracking features. Users are…
AP Stylebook Data Breach: Associated Press Warns That The Breach Led to Phishing Attacks
The Associated Press has warned of what potentially is a data breach in AP Stylebook servers, impacting their customers. Reportedly, the data has been used by the threat actors in launching their targeted phishing attacks. The AP Stylebook is a…
Behind the Wheel, Under Surveillance: The Privacy Risks of Modern Cars
The auto industry is failing to give drivers control over their data privacy, according to researchers warning that modern cars are “wiretaps on wheels.” An analysis published on Wednesday revealed that in an era when driving is becoming increasingly…
Here’s How Hackers Sell and Trade Your Data in the Metaverse
Your data might be lost in the metaverse, a place where reality takes on new forms and lovely virtual landscapes arise. Imagine yourself in a bustling digital marketplace, surrounded by avatars dressed in the latest digital attire. A secret…
Unveiling the DarkGate Malware Phishing Attack on Microsoft Teams
Cybercriminals have focused on Microsoft Teams, a widely used tool for remote collaboration, in a recent round of cyber assaults. This well-known tool is being used by a crafty phishing campaign to spread the dangerous DarkGate ransomware. This cunning scheme…
Vishing Scams: Here’s How to Spot & Defend Against Them
Vishing (voice or VoIP phishing) is a sort of cyber attack that uses voice and telephony technologies to deceive targeted persons into disclosing sensitive data to unauthorized entities. The information could be personal, such as a Social Security number…
Understanding HTTPS Spoofing: A Deceptive Online Threat
Online security is no longer a luxury but an absolute necessity in today’s digital age. For the average internet user, spotting the reassuring green padlock symbol and the “https://” prefix in their browser’s address bar has become a common…
Cisco: Leadership Awareness Fuels the Booming Identity Market
The latest research conducted by Cisco Investments with venture capital firms reveals that most CISOs believe complexity in tools, number of solutions and technical glossaries are among the many barriers to zero trust. It has been observed that around 85%…
Online Hackers Target Microsoft Teams to Propagate DarkGate Malware
Microsoft Teams conversations are being abused by a new phishing attempt to distribute malicious attachments that install the DarkGate Loader malware. When two external Office 365 accounts were found to be hijacked and were detected sending Microsoft Teams phishing…
Blockchain’s Role in Reinventing ATM Security: A Game-Changer in Banking
Blockchain technology allows for the creation of a structured data structure that is intrinsically secure. A cryptocurrency is based on the principles of cryptography, decentralization, and consensus, which is a mechanism that ensures that transactions can be trusted. Data…