McDonald’s faced significant disruptions in its fast-food operations on Friday, attributing the widespread technical issues to a third-party provider rather than a cyber attack. The outage, which occurred during a “configuration change,” affected stores in various countries including the UK,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
User Privacy: Reddit Discloses FTC Probe into AI Data Licensing Ahead of IPO
In a surprising turn of events, Reddit, the popular social media platform, has revealed that it is under investigation by the Federal Trade Commission (FTC) regarding its practices related to AI data licensing. The disclosure comes just before Reddit’s highly…
North Korean Hackers’ $12M Ethereum Laundering Via Tornado Cash Unveiled
It has been reported that North Korean hackers associated with the Lazarus Group have exploited Tornado Cash in a recent development to launder approximately $12 million worth of stolen Ethereum (ETH) in the last 24 hours, using the coin…
Russian Hackers Breach Microsoft’s Security: What You Need to Know
In a recent set of events, reports have surfaced of a significant cyberattack on Microsoft, allegedly orchestrated by Russian hackers. This breach, attributed to a group known as Midnight Blizzard or Nobelium, has raised serious concerns among cybersecurity experts…
Decentralised Identity: The Next Revolution Enabled by Block Chain Technology
Identity is crucial in our daily digital life, from accessing websites and applications to establishing our credentials online. Traditional identity systems are no longer trusted as a result of numerous data breaches and unethical corporate usage of consumer data…
TRAI Updates Regulations to Prevent SIM Swap Fraud in Telecom Porting
The Telecom Regulatory Authority of India (TRAI) recently announced updated regulations aimed at combating SIM swap fraud in the telecom sector. According to the new regulations, telecom subscribers will be prohibited from porting out of their current network provider…
Leak of Greek Diaspora Emails Shakes Government: A Closer Look
The recent leak of Greek diaspora emails has sent shockwaves through the conservative government of Prime Minister Kyriakos Mitsotakis. The scandal, which unfolded in March 2024, has raised questions about privacy, data protection, and political accountability. Let’s delve into the…
Fraudulent Antivirus Software Faces FTC Lawsuit After Raking in Millions
The US Federal Trade Commission filed a lawsuit alleging that two antivirus software packages, Restoro and Reimage, are counterfeit goods that have defrauded customers out of “ten of millions” of dollars. FTC investigators apparently went undercover and purchased the…
Private AI Chatbot Not Safe From Hackers With Encryption
AI helpers have assimilated into our daily lives in over a year and gained access to our most private information and worries. Sensitive information, such as personal health questions and professional consultations, is entrusted to these digital companions. While providers…
Cyber Attacks Threaten Essential Services
As per a recent report by BlackBerry, it was revealed that critical infrastructure providers faced a surge in cyberattacks during the latter part of 2023. Shockingly, these providers bore the brunt of 62% of all industry-related cyberattacks tracked from…
eSIM Vulnerabilities: SIM Swappers Exploit Flaws, Hijack Phone Numbers
According to a new report, SIM-swapping crimes are rising worldwide, mainly committed by eSIM (Embedded Subscriber Identity Modules) users. eSIMs are digitally stored SIM cards that are embedded using software into devices. As a result, hackers are now attempting…
Cybersecurity Specialists Caught Moonlighting as Dark Web Criminals
A recent study conducted by the Chartered Institute of Information Security (CIISec) has uncovered a concerning trend in the cybersecurity field. The study reveals that many cybersecurity professionals, facing low pay and high stress, are resorting to engaging in…
The Surge of FakeBat Malware in Search-Based Malvertising Campaigns
In recent months, cybersecurity researchers have observed a concerning surge in search-based malvertising campaigns, with documented incidents nearly doubling compared to previous periods. Amidst this uptick in online threats, one particular malware variant has captured the attention of experts:…
Exploitation of Windows SmartScreen Bypass Flaw Facilitates Deployment of DarkGate RAT
The operators behind the DarkGate malware have been taking advantage of a recently patched flaw in Windows SmartScreen through a phishing scheme. This campaign involves circulating counterfeit Microsoft software installers to spread the malicious code. Researchers from Trend Micro,…
International Initiative Targets Cybercrime
The Cybercrime Atlas initiative has shifted into its operational phase in 2024, marking a significant milestone in global cybersecurity efforts. Originating from discussions at the RSA Conference two years prior, the initiative aims to dismantle cybercriminal networks by mapping…
Change Healthcare Detects Ransomware Attack Vector
The cyberattack’s widespread destruction underscores how threat actors can do significant damage by targeting a relatively unknown vendor that serves a vital operational function behind the scenes. The AlphV ransomware group disrupted basic operations to the critical systems of…
Unraveling Evolv Technology’s Alleged UK Government Testing Controversy
Evolv Technology, a prominent player in the field of AI-driven weapons-scanning technology, has found itself embroiled in controversy following revelations about its testing claims with the UK government. The company’s scanners, heralded as “intelligent” detectors capable of identifying concealed…
Restrictions on Gemini Chatbot’s Election Answers by Google
AI chatbot Gemini has been limited by Google in terms of its ability to respond to queries concerning several forthcoming elections in several countries, including the presidential election in the United States, this year. According to an announcement made…
Incognito Market Engages in Large-Scale Extortion of Buyers and Sellers on the Darknet
Taking a cue from ransomware operators, the illicit online drug marketplace known as Incognito Market has initiated a campaign of extortion targeting both its vendors and buyers. Users are being threatened with the exposure of their cryptocurrency transaction histories and…
Cyberattack is Wreaking Havoc on US HealthCare Providers.
Following a cyberattack on the largest health insurer in the United States last month, health care providers are still scrambling as insurance payments and prescription orders continue to be disrupted, costing physicians an estimated $100 million each day. According…
Latest SEC Cyber Rules Raise ‘Head Scratching’ Breach Disclosures
SEC disclosure mandate The Securities and Exchange Commission’s recently implemented cybersecurity regulations have prompted some breach disclosures from publicly traded firms, such as Microsoft and Hewlett Packard Enterprise. Among other things, the guidelines mandate that a “material” cybersecurity event be…
SMB Cyber Threats: Information-Stealing Malware, Ransomware, and BEC
In today’s digital landscape, small and medium-sized businesses (SMBs) are increasingly becoming prime targets for cybercriminals looking to exploit vulnerabilities for financial gain. A recent report from cybersecurity firm Sophos sheds light on the top cyber threats facing SMBs,…
Security Flaws Discovered in ChatGPT Plugins
Recent research has surfaced serious security vulnerabilities within ChatGPT plugins, raising concerns about potential data breaches and account takeovers. These flaws could allow attackers to gain control of organisational accounts on third-party platforms and access sensitive user data, including…
Privacy Perils: Experts Warn of Pitfalls in Sharing Pregnancy Photos Online
Taking pregnancy pictures online can even lead to the creation of a digital identity for your child that could be exploited, according to data scientists. When a child appears online, experts say it puts them at risk of identity…
Crypto Phishing Scams: $47M Lost in February
In February, cybercriminals orchestrated a series of sophisticated crypto phishing scams, resulting in a staggering $47 million in losses. These scams, often initiated through social media platforms like X (formerly Twitter), saw a dramatic 40% surge in victims compared…
Sophisticated Vishing Campaigns are Rising Exponentially Worldwide
Voice phishing, also known as vishing, is popular right now, with multiple active campaigns throughout the world ensnaring even savvy victims who appear to know better, defrauding them of millions of dollars. South Korea is one of the global…
MarineMax’s Cyber Resilience: Responding to SEC on Cyberattack Incident
MarineMax, a national retailer of boats and million-dollar yachts, reported on March 12 that a “cybersecurity incident” disrupted its operations, according to documents filed with the Securities and Exchange Commission (SEC). According to the company, unauthorized access to the…
Protect Yourself: Tips to Avoid Becoming the Next Target of a Microsoft Hack
The realm of cybersecurity, particularly within the Microsoft 365 environment, is in a constant state of evolution. Recent events involving major tech firms and cybersecurity entities underscore a crucial truth: grasping security best practices for Microsoft 365 isn’t synonymous…
Expert Urges iPhone and Android Users to Brace for ‘AI Tsunami’ Threat to Bank Accounts
In an interview with Techopedia, Frank Abagnale, a renowned figure in the field of security, provided invaluable advice for individuals navigating the complexities of cybersecurity in today’s digital landscape. Abagnale, whose life inspired the Steven Spielberg film “Catch Me…
Thinking of Stealing a Tesla? Just Use Flipper Zero
Researchers have found a new way of hijacking WiFi networks at Tesla charging stations for stealing vehicles- a design flaw that only needs an affordable, off-the-shelf tool. Experts find an easy way to steal a Tesla As Mysk Inc. cybersecurity…
Hackers Exploit Vulnerability in Popup Builder Plugin for WordPress
In a concerning development for website owners and administrators, hackers have been exploiting a vulnerability in the popular Popup Builder plugin for WordPress, resulting in the infection of over 3,300 websites worldwide. This security flaw, officially tracked as CVE-2023-6000,…
Where is AI Leading Content Creation?
Artificial Intelligence (AI) is reshaping the world of social media content creation, offering creators new possibilities and challenges. The fusion of art and technology is empowering creators by automating routine tasks, allowing them to channel their energy into more imaginative…
Roku Data Breach: Over 15,000 Accounts Compromised; Data Sold for Pennies
A data breach impacting more than 15,000 consumers was revealed by streaming giant Roku. The attackers employed stolen login credentials to gain unauthorised access and make fraudulent purchases. Roku notified customers of the breach last Friday, stating that hackers…
LockBit’s Double Cross: Ransom Paid, Data Remains Locked Away
In exchange for the payment of a ransom, LockBit ransomware blocks access to the computer systems of its users. With LockBit, all computers on a network can be encrypted by encrypting them, confirming that the target is valuable, spreading…
Private Operators to Manage Mobile Speed Cameras in New Zealand
In a significant shift, New Zealand Transport Agency Waka Kotahi (NZTA) has opened a tender to hand over the management of the country’s 45 mobile speed cameras to private operators from next year. This move, the first of its…
Change Ransomware Attack: UnitedHealth Profits from a Crisis it Created
Change Ransomware Incident: Details so far The change Ransomware attack Last week, an Oregon medical practice suffered a serious Ransomware attack called Change Ransomware. Due to the attack, the medical practice was left with an empty bank account. The only…
Europe’s Digital Markets Act Compels Tech Corporations to Adapt
Europeans now have the liberty to select their preferred online services, such as browsers, search engines, and iPhone apps, along with determining the usage of their personal online data. These changes stem from the implementation of the Digital Markets…
Japan Blames Lazarus for PyPi Supply Chain Attack
Japanese cybersecurity officials issued a warning that North Korea’s infamous Lazarus Group hacking group recently launched a supply chain attack on the PyPI software repository for Python apps. Threat actors disseminated contaminated packages with names like “pycryptoenv” and “pycryptoconf”…
Cybersecurity Teams Tackle AI, Automation, and Cybercrime-as-a-Service Challenges
In the digital society, defenders are grappling with the transformative impact of artificial intelligence (AI), automation, and the rise of Cybercrime-as-a-Service. Recent research commissioned by Darktrace reveals that 89% of global IT security teams believe AI-augmented cyber threats will…
Hyper-Personalization in Retail: Benefits, Challenges, and the Gen-Z Dilemma
Customers often embrace hyper-personalization, which is defined by customized product suggestions and AI-powered support. Marigold, Econsultancy, Rokt, and The Harris Poll polls reveal that a sizable majority of consumers—including 88% of Gen Zers—view personalized services as positive additions to their…
Critical Vulnerabilities in GovQA Platform Expose Sensitive Government Records
In a significant cybersecurity revelation, critical vulnerabilities were discovered in the GovQA platform, a tool extensively used by state and local governments across the U.S. to manage public records requests. Independent researcher Jason Parker uncovered flaws that, if exploited,…
Microsoft Source Code Heist: Russian Hackers Escalate Cyberwarfare
There was an update on the hacking attempts by hackers linked to Russian foreign intelligence on Friday. They used data stolen from corporate emails in January to gain access to Microsoft’s systems again, which were used by the foreign…
Rise in Phishing Attacks Targeting US Schools Raises Concerns
Through a recent report by PIXM, a cybersecurity firm specialising in artificial intelligence solutions, public schools in the United States face a significant increase in sophisticated phishing campaigns. Threat actors are employing targeted spear phishing attacks, utilising stealthy patterns…
OpenAI Bolsters Data Security with Multi-Factor Authentication for ChatGPT
OpenAI has recently rolled out a new security feature aimed at addressing one of the primary concerns surrounding the use of generative AI models such as ChatGPT: data security. In light of the growing importance of safeguarding sensitive information,…
Scaleway Introduces First RISC-V Servers on the Cloud
The world’s first line of RISC-V servers has been introduced by European cloud operator Scaleway, which claims this is a “firm commitment to technological independence” in a market where companies are increasingly vying for control over semiconductor production. The…
UnitedHealth Group Cyberattack Fallout: Government Intervention and Industry Critique
In a recent cybersecurity incident, UnitedHealth Group revealed that its tech unit, Change Healthcare, fell victim to a cyberattack orchestrated by the infamous ransomware gang, Blackcat. The attack, which disrupted healthcare organizations nationwide, targeted electronic pharmacy refills and insurance…
Unveiling the Underbelly of IoT: An In-Depth Analysis of Hacking Risks
In terms of versatility, the Internet of Things (IoT) is a technology that is easily one of the most versatile technologies in the world today. In the era of the internet, the network connection capacity is increasing and the…
Navigating the Delicate Balance: Transparency and Information Security in NATO
In the complex world of international relations and military alliances, NATO (North Atlantic Treaty Organization) is a critical pillar of collective defense. As NATO conducts its largest military exercise since 1988, the Steadfast Defender Exercise, it grapples with a fundamental…
Apple iOS and iPadOS Memory Corruption Vulnerabilities: A Critical Alert
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) raised the alarm by adding two such vulnerabilities in Apple’s iOS and iPad to its Known Exploited Vulnerabilities catalog. These vulnerabilities are actively exploited, posing significant risks to users’ privacy, data, and…
Security Concerns Arise Over Chinese-Manufactured Surveillance Cameras Deployed at Romanian Military Locations
A routine procurement made by the Romanian military on January 16 for surveillance equipment manufactured in China has sparked concerns regarding national security implications. Valued at under $1,000, an employee of the Romanian Defense Ministry purchased an eight-port switch…
Microsoft Claims Russian Hackers are Attempting to Break into Company Networks.
Microsoft warned on Friday that hackers affiliated to Russia’s foreign intelligence were attempting to break into its systems again, using data collected from corporate emails in January to seek new access to the software behemoth whose products are widely…
Technical Glitch Causes Global Disruption for Meta Users
In a recent setback for Meta users, a widespread service outage occurred on March 5th, affecting hundreds of thousands worldwide. Meta’s spokesperson, Andy Stone, attributed the disruption to a “technical issue,” apologising for any inconvenience caused. Shortly after the…
Signal Protocol Links WhatsApp, Messenger in DMA-Compliant Fusion
As part of the launch of the new EU regulations governing the use of digital “gatekeepers,” Meta is ready to answer all of your questions about WhatsApp and Messenger providing end-to-end encryption (E2EE), while also complying with the requirements…
Microsoft Employee Raises Alarms Over Copilot Designer and Urges Government Intervention
Shane Jones, a principal software engineering manager at Microsoft, has sounded the alarm about the safety of Copilot Designer, a generative AI tool introduced by the company in March 2023. His concerns have prompted him to submit a letter…
CSI/NSA Joint Best Practices for Cloud Security
The NSA and CISA have released a set of five cybersecurity bulletins to help make cloud environments safer. These bulletins share important tips for keeping cloud systems secure, which are used a lot by businesses. Cloud services are popular…
TeamCity Software Vulnerability Exploited Globally
Over the past few days a security breach has transpired, hackers are taking advantage of a significant flaw in TeamCity On-Premises software, allowing them to create unauthorised admin accounts. This flaw, known as CVE-2024-27198, has prompted urgent action from…
Former Google Employee Charged with Stealing AI Secrets
A former Google software engineer has been charged with stealing the company’s artificial intelligence trade secrets while surreptitiously working for two Chinese companies, the Justice Department announced Wednesday. Linwei Ding, a Chinese national, was arrested in Newark, California, for…
Ransomware Group Stormous Takes Responsibility for Cyberattack on Belgian Brewery
Stormous, a ransomware group, has admitted to orchestrating the cyber assault on Duvel Moortgat Brewery last Wednesday. Fortunately for beer enthusiasts, the brewery has ample stock to withstand the disruption. The ransom group announced their involvement via the dark…
China State-Sponsored Spies Hack Site and Target User Systems in Asia
Chinese threat actors strike again Users of a Tibetan language translation app and website visitors to a Buddhist festival were compromised by a focused watering-hole malware connected to a Chinese threat group. According to recent data from ESET, the so-called…
South St. Paul Public Schools Grapple with Ongoing Tech Disruption
South St. Paul Public Schools recently alerted families to ongoing technology disruption, shedding light on potential disruptions to online platforms, emails, and other digital services. In a note on Monday, the district acknowledged technical difficulties and later revealed the…
Fidelity Faces Second Data Breach Linked to Third-Party Provider: Infosys McCamish
Fidelity Investments Life Insurance Company (FILI) faces another data breach challenge as it discloses a breach affecting a significant number of individuals. The breach, linked to third-party service provider Infosys McCamish (IMS), heightens worries over data security in today’s…
New Email Scam Targets NTLM Hashes in Covert Data Theft Operation
TA577 has been identified as a notorious threat actor who orchestrated a sophisticated phishing campaign, according to researchers at security firm Proofpoint. Currently, the group is utilizing a new method of phishing involving ZIP archive attachments. This tactic is…
NSA Shares Key Strategies for Improved Network Security
The National Security Agency (NSA) has rolled out a comprehensive roadmap to strengthen internal network security. Stepping away from the traditional trust-all model, the focus is on embracing a cutting-edge zero-trust framework. This transformative approach assumes the presence of…
Researchers Develop AI “Worms” Capable of Inter-System Spread, Enabling Data Theft Along the Way
A team of researchers has developed a self-replicating computer worm designed to target AI-powered applications like Gemini Pro, ChatGPT 4.0, and LLaVA. The aim of this project was to showcase the vulnerabilities in AI-enabled systems, particularly how interconnections between…
Canadian City Says Timescale for Recovering from Ransomware Attack ‘Unknown’
The Canadian city of Hamilton is still getting over a ransomware attack that compromised nearly every facet of municipal operations. Since February 25, when the ransomware attack was first reported, city officials have been working nonstop. Foundational services, such…
GhostLocker 2.0 Unleashes Cyber Haunting Spree in the Middle East, Africa, and Asia
A new version of the infamous GhostLocker ransomware has been developed by cyber criminals, and they are now targeting users across the Middle East, Africa, and Asia with this ransomware. With the help of the new GhostLocker 2.0 ransomware,…
Scam: Chennai Woman Exposes Cyber Crime Involving Adhaar Card, Courier, Drugs
Woman discloses scam, alerts netizens By bringing attention to a fresh cybercrime strategy, a marketing expert from Chennai has assisted others in avoiding the scam. Lavanya Mohan, the woman, talked about her experience on X, (formerly Twitter). She said how…
Web-Based PLC Malware: A New Frontier in Industrial Cybersecurity Threats
The increasing prevalence of programmable logic controllers (PLCs) featuring embedded web servers has opened avenues for potential catastrophic remote attacks on operational technology (OT) within industrial control systems (ICS) in critical infrastructure sectors. Researchers from the Georgia Institute of…
Woman in Noida Swindled of Rs 3.7 Lakh During 7-Hour Skype Call in Recent ‘Digital Arrest’ Scam
A 32-year-old female IT engineer residing in Noida fell victim to cyber criminals who reportedly swindled Rs 3.75 lakh from her during a seven-hour Skype call, where they held her “hostage” and gradually siphoned money from her account. According…
Red Sea Cable Damage Disrupts Internet Traffic Across Continents
Recently, in a telecommunications setback, damage to submarine cables in the Red Sea is causing disruptions in communication networks, affecting a quarter of the traffic between Asia, Europe, and the Middle East, including internet services. Four major telecom networks,…
United Health Allegedly Paid $22M Ransomware
Change Healthcare breach There is evidence that the ransomware group behind the Change Healthcare breach, which has caused chaos for hospitals and pharmacies attempting to handle prescriptions, may have received $22 million from UnitedHealth Group. Researchers studying security issues discovered…
5 Simple Steps to Bulletproof Your API Integrations and Keep Hackers at Bay
In today’s tech-driven world, APIs (Application Programming Interfaces) are like the connective tissue that allows different software to talk to each other, making our digital experiences seamless. But because they are so crucial, they are also prime targets for hackers. …
UnitedHealth’s Cyberattack Should Serve as a ‘Wake-up Call’ for HealthCare Sector
The US Health and Human Services Department (HHS) announced Tuesday that it would assist doctors and hospitals in locating alternate claims processing platforms to help restart the flow of business following a cyberattack on a UnitedHealth Group (UNH) subsidiary…
American Express Breach: Safeguarding Your Finances Amidst Third-Party Data Exposure
In a recent development, American Express has issued a warning to its customers regarding a potential data breach originating from a third-party merchant processor. Although the breach did not directly involve American Express systems, the credit card data of…
Security Breach at Mr. Green Gaming: 27,000 User Data Compromises
Several internet forums are bombarded with headlines claiming that a “Mr Green Gaming user database has been leaked” as a serious security breach threatens the online gaming community. Significant concerns about online security and privacy have been raised due…
Web3: A New Dawn for the Internet?
In the fast-paced world of technology, a revolutionary concept is gaining traction: Web3. Coined by computer scientist Gavin Wood, Web3 represents a paradigm shift towards a decentralized internet infrastructure, powered by blockchain technology. The traditional internet, often referred to…
Cyberattack on Hamilton City Hall Expands to Impact Additional Services
Hamilton is currently facing a ransomware attack, causing widespread disruptions to city services for more than a week. City manager Marnie Cluckie disclosed the nature of the cyber attack during a virtual press conference on Monday, marking the first…
Meta’s Facebook, Instagram Back Online After Two Hour Long Outage
On March 5, a technical failure resulted in widespread login issues across Meta’s Facebook, Instagram, Threads, and Messenger platforms. Meta’s head of communications, Andy Stone, confirmed the issues on X, formerly known as Twitter, and stated that the company…
Phind-70B: Transforming Coding with Unmatched Speed and Precision
In the dynamic realm of technology, a luminary is ascending—Phind-70B. This transformative force in coding combines speed, intelligence, and a resolute challenge to GPT-4 Turbo, promising to redefine the coding paradigm. Rooted in the robust CodeLlama-70B foundation and fortified…
Advocating for the Persistence of Cash to Counteract Intrusive Banking Practices
The Bank of England released news this week that the value of notes in circulation has increased by nearly 16 percent since last year as it announced the opening of a new exhibition on the future of money (who…
Classic Scam the Scammers? Epic Games Hackers Faked the Hack
Hackers stage Epic hack A group announced earlier this week that they had successfully breached Epic Games and taken 189GB of data, including user information. They are now retracting their statements, claiming that they staged the whole event to deceive…
Dark Web Sale Exposes 3.6 Crore Stolen AI Gaming Accounts
The widespread sale of credentials obtained from AI-based gaming platforms and services is a worrying trend in the cyber underworld, as shown by a new analysis by antivirus company Kaspersky. An astounding 3.6 crore credentials, including login and password information,…
Look Out For This New Emerging Threat In The World Of AI
As per a recent discovery, a team of researchers has surfaced a groundbreaking AI worm named ‘Morris II,’ capable of infiltrating AI-powered email systems, spreading malware, and stealing sensitive data. This creation, reminiscent of the notorious computer worm from…
Unveiling the Power of Zero-Knowledge Proofs in Blockchain Technology
In the dynamic realm of blockchain technology, a groundbreaking innovation is emerging as a beacon of privacy and security: Zero-Knowledge Proofs (ZKPs). These cryptographic marvels are poised to redefine the landscape of blockchain transactions, offering unparalleled privacy and integrity. Let’s…
Lazarus Group Exploits Microsoft Zero-Day in a Covert Rootkit Assault
The North Korean government-backed hackers were able to gain a major victory when Microsoft left a zero-day vulnerability unpatched for six months after learning it was actively exploited for six months. As a result of this, attackers were able…
Cyberattack Fallout: Minnesota Hospitals Grapple with Financial Strain
Minnesota hospitals are facing financial challenges due to a recent cyberattack on a subsidiary of UnitedHealth Group, based in Minnetonka. Patient care and medication availability remain stable, but hospitals are unable to process claims for payment or estimate costs…
Experts Issue Warning Regarding Rising Threat of AI-Driven Cyber-Physical Attacks
As artificial intelligence (AI) technologies advance, researchers are voicing concerns about the possibility of AI-fueled cyber-physical attacks on critical US infrastructure. Last month, the FBI warned that Chinese hackers might impair critical sectors such as water treatment, electrical, and…
German Police Bust Massive Cybercrime Hub ‘Crimemarket’ with 180,000 Users
The Düsseldorf Police in Germany have made a significant stride in the ongoing battle against cybercrime by dismantling Crimemarket, the largest cybercrime market in the country, with over 180,000 users. This illicit trading platform served as a hub for…
Africa’s Cyber Threats Rise With AI Development
In 2023, a majority of African economies witnessed a decline in overall cyber threats, signaling a positive trend. However, notable exceptions were observed, with Kenya experiencing a substantial 68% increase in ransomware attacks, while South Africa encountered a notable…
Is Bitcoin Changing? Big Shifts and What It Means for Us
On the financial front, traditional powerhouses like Grayscale, BlackRock, and Fidelity are diving into Bitcoin, earning them the moniker ‘Bitcoin whales.’ These heavyweights are injecting billions into the digital currency, holding a sizable chunk of the finite 21 million…
Hamilton City’s Network is the Latest Casualty of the Global Cyberwar.
The attack that took down a large portion of the City of Hamilton’s digital network is only the latest weapon in a global fight against cybersecurity, claims one of Canada’s leading cybersecurity experts. Regarding the unprecedented attack on the…
Generative AI Worms: Threat of the Future?
The generative AI systems of the present are becoming more advanced due to the rise in their use, such as Google’s Gemini and OpenAI’s ChatGPT. Tech firms and startups are making AI bits and ecosystems that can do mundane tasks…
GitHub Under Siege: Unraveling the Ongoing Automated Attack on Open-Source Repositories
GitHub, a cornerstone for programmers worldwide, faces a severe threat as an unknown attacker deploys an automated assault, cloning and creating malicious code repositories. The attack, involving sophisticated obfuscation and social engineering, poses a significant challenge to GitHub’s security…
Prescription Insecurity: The Russian Connection to Healthcare Cyber Attacks
Pharmacies and hospitals nationwide are experiencing disruptions as a result of ransomware attacks, which leaves patients with difficulties filling prescriptions or obtaining medical care. UnitedHealth Group, a healthcare provider in the United States, announced on Thursday that it had…
BlackCat Ransomware Hit Healthcare Giant Optum, Stolen 6TB Sensitive Data
In a shocking development, the notorious BlackCat/ALPHV ransomware gang has stepped forward to claim responsibility for a devastating cyberattack on Optum, a subsidiary of the healthcare giant UnitedHealth Group (UHG). This malicious breach has triggered an ongoing outage that…
How Can You Safeguard Against the Dangers of AI Tax Fraud?
The digital sphere has witnessed a surge in AI-fueled tax fraud, presenting a grave threat to individuals and organisations alike. Over the past year and a half, the capabilities of artificial intelligence tools have advanced rapidly, outpacing government efforts…
Meta Plans to Launch Enhanced AI model Llama 3 in July
The Information reported that Facebook’s parent company, Meta, plans to launch Llama 3, a new AI language model, in July. As part of Meta’s attempts to enhance its large language models (LLMs), the open-source LLM was designed to offer…
Winklevoss Crypto Firm Gemini to Return $1.1B to Customers in Failed “Earn” Scheme
Gemini to return money < div>As part of a settlement with regulators on Wednesday, the cryptocurrency company Gemini, owned by the Winklevoss twins, agreed to repay at least $1.1 billion to consumers of its failed “Earn” loan scheme and pay…
Researchers Develop ‘VoltSchemer’ Assaults Aimed at Wireless Charging Systems
A team of researchers from the University of Florida, collaborating with CertiK, a Web3 smart contract auditor, have uncovered potential security threats in wireless charging systems. Their research introduces new attack methods, named VoltSchemer, which exploit vulnerabilities in these…
Sophisticated Phishing Tactics Unveiled in Targeted FCC Cybersecurity Breach
Several phishing campaigns targeting employees of cryptocurrency platforms such as Binance and Coinbase and the Federal Communications Commission (FCC) have been discovered, including one dubbed CryptoChameleon, which targets cryptocurrency platforms and employees. Based on an analysis from Lookout, the…