In a significant and forward-thinking development, Microsoft has recently upgraded its AI-powered coding assistant, Copilot, introducing a groundbreaking feature that extends its capabilities into the realm of AI image editing. This not only marks a substantial expansion of Copilot’s…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Global Authorities Examine 58 Cyberattacks Linked to North Korea, Valued at $3 Billion
North Korean sanctions monitors have been investigating dozens of possible cyberattacks by the regime, which are believed to have raised $3 billion to fuel the state’s nuclear weapons program, according to excerpts released from an unpublished report by the…
Persistent Data Retention: Google and Gemini Concerns
While it competes with Microsoft for subscriptions, Google has renamed its Bard chatbot Gemini after the new artificial intelligence that powers it, called Gemini, and said consumers can pay to upgrade its reasoning capabilities to gain subscribers. Gemini Advanced…
Privacy Watchdog Issues Warning
Information about over 33 million individuals in France, roughly half of the nation’s population, was compromised in a cyber assault after January, as per statements from the country’s data protection authority. The Commission Nationale Informatique et Libertés (CNIL) disclosed…
Microsoft’s Super Bowl Pitch: We Are Now an AI Firm
Microsoft made a comeback to the Super Bowl on Sunday with a commercial for its AI-powered chatbot, highlighting the company’s resolve to shake off its reputation as a stuffy software developer and refocus its offerings on the potential of…
What Is The Virtual Chief Information Security Officer?
In our fast-paced digital age, where everything is just a click away, ensuring the safety of our online space has become more important than ever. It’s like having a virtual fortress that needs protection from unseen threats. Now, imagine…
RustDoor Malware Deceives macOS Users with Visual Studio Update Scam
In a significant and alarming development within the cybersecurity landscape, a new malware strain named RustDoor has surfaced, specifically designed to target macOS users. What sets RustDoor apart from its counterparts is its sophisticated and deceptive tactic—it masquerades as…
The Cyber Risks Of Using Unsecured Wi-Fi Networks And How To Avoid Them
In the hustle and bustle of our daily lives, public Wi-Fi has become a lifeline for many. Whether in coffee shops, airports, or local hangouts, the convenience of free Wi-Fi is undeniable. However, a recent study by NordVPN draws…
South Staffs Water Faces a Group Action Following Clop Ransomware Attack
Following the theft and disclosure of their data by the Clop/Cl0p ransomware group, nearly one thousand victims recently filed a class action lawsuit against South Staffordshire Plc. South Staffordshire Plc, which owns South Staffordshire Water and Cambridge Water, served…
Hyundai Motor Europe Grapples with Cyber Threat as Black Basta Ransomware Strikes
A California union and Hyundai Motor Europe both announced separately this week that they had suffered cyberattacks in the past month, resulting in the loss of their data. According to Black Basta, a group that first emerged in 2022…
China Caught Deploying Remote Access Trojan Tailored for FortiGate Devices
The Military Intelligence and Security Service (MIVD) of the Netherlands has issued a warning regarding the discovery of a new strain of malware believed to be orchestrated by the Chinese government. Named “Coathanger,” this persistent and highly elusive malware…
Mozilla Firefox’s Premium Dark Web Monitoring Solution
Mozilla, renowned for its commitment to an open and secure internet, has recently made a strategic foray into unexplored realms with the introduction of a subscription-based dark web monitoring service. This bold move signifies the organization’s dedication to empowering…
More than 800 False “Temu” Domains Trick Customers Into Losing Their Credentials
Cybersecurity experts caution against falling for Temu phishing scams since they use phony freebies to obtain passwords. In the last three months, more than 800 new “Temu” domains have been registered. The most recent company that con artists have used…
Protecting User Privacy by Removing Personal Data from Data Broker Sites
As part of its new subscription service model, Mozilla Firefox is offering its users the possibility of finding and removing their personal and sensitive information from data brokers across the internet. This new subscription model is known as Mozilla…
Microsoft Introduces PC Cleaner App to Boost PC Performance
In a move to enhance user experience, Microsoft has predicated its PC Cleaner app, now conveniently available on the Microsoft Store for both Windows 10 and Windows 11 users. Similar to popular third-party tools like CCleaner, this application aims…
Millions are at Risk After a French HealthCare Services Firm’s Data Leak
Viamedis, a French healthcare services provider, suffered a cyberattack that exposed the private data of policyholders and medical professionals in the country. Though the company’s website is currently not accessible, an announcement concerning the data breach has been posted…
Implementing Zero Trust Principles in Your Active Directory
In the past, many organizations relied on secure perimeters to trust users and devices. However, this approach is no longer viable with the geographical dispersion of workers and the need for access from various locations and devices. End-users now…
New Variant of Banking Trojan Discovered Targeting Mexico
In a recent discovery, cybersecurity researchers from Palo Alto Networks Unit 42 have uncovered a new variant of the stealthy banking Trojan known as Mispadu Stealer. This infostealer is specifically designed to target regions and URLs associated with Mexico, posing…
Unraveling the Aftermath of Verizon’s Insider Data Breach Impacting 63,000 Employees
In the fast-paced world of digital connectivity, data breaches have become an unfortunate reality that businesses must constantly guard against. Recently, telecommunications giant Verizon found itself in the throes of a security crisis as it grappled with the fallout of…
Meta’s AI Ambitions Raised Privacy and Toxicity Concerns
In a groundbreaking announcement following Meta CEO Mark Zuckerberg’s latest earnings report, concerns have been raised over the company’s intention to utilize vast troves of user data from Facebook and Instagram to train its own AI systems, potentially creating a…
Nationwide Banking Crisis: Servers Down, UPI Transactions in Jeopardy
Several bank servers have been reported to have been down on Tuesday, affecting Unified Payments Interface (UPI) transactions throughout the country. Several users took to social media platforms and reported that they encountered issues while making UPI transactions. They…
Identity Fraud Affects Two Million Brits in 2023
In a recent report by FICO on Fraud, Identity, and Digital Banking, it was revealed that nearly two million Brits may have fallen victim to identity theft last year. The analytics firm found that 4.3% of respondents experienced fraudsters using…
Geofencing: A Tech Set to Transform the Consumer Landscape?
One technological advancement that is subtly changing the marketing and customer engagement scene is Geofencing. It effortlessly connects your device to companies and services by drawing virtual borders around real-world locations. As soon as you cross these lines, you get…
Shim Bug Uncovered: A Ten-Year Security Breach in Linux Boot Loaders
In the dynamic realm of cybersecurity, discovering a significant flaw in every Linux boot loader signed in the past decade has underscored the pervasive nature of potential threats. This blog explores the intricacies of the Shim bug, its implications…
Ensuring Online Safety for Your Child: Tips and Measures
In the digital landscape of 2024, children are spending significant amounts of time online, whether it’s for educational purposes, gaming, or entertainment. With technology advancing rapidly, such as Apple’s Vision Pro, maintaining constant connectivity is becoming the standard even…
Identity Hijack: The Next Generation of Identity Theft
Synthetic representations of people’s likenesses, or “deepfake” technology, are not new. Picture Mark Hamill’s 2019 “The Mandalorian” episode where he played a youthful Luke Skywalker, de-aged. Similarly, artificial intelligence is not a novel concept. However, ChatGPT’s launch at the…
Malware-as-a-Service The Biggest Risk to Organizations Right Now
A recent Darktrace analysis states that the largest threat to enterprises in the second half of 2023 was malware-as-a-service (MaaS) infections. Many malware strains have become cross-functionally adaptive, as noted in the 2023 End of Year Threat Report. This comprises…
Blackbaud Faces Criticism for Cybersecurity Lapses After 2020 Data Breach
The cloud software company, Blackbaud, has come under fire from authorities for its major cybersecurity failings, stemming from a devastating ransomware attack in 2020. The attack exposed data from numerous educational institutions and non-profits that were clients of Blackbaud,…
Indian Government Warns Social Media Platforms Over Deepfake Misinformation
In a strong statement directed at social media platforms, the government of India has emphasized the critical need for swift identification and removal of misinformation, including deepfakes, or risk facing legal consequences. This warning follows a deepfake scandal involving the…
Ivanti US Faces Security Crisis, Threatening Worldwide Systems
In a recent development, a critical server-side request forgery (SSRF) vulnerability has been discovered in Ivanti Connect Secure and Ivanti Policy Secure servers, marked as CVE-2024-21893. Security experts have confirmed that this vulnerability is being actively exploited by multiple attackers,…
Canadian Cybercriminal Sentenced to Two Years Agrees to Return All Victims for Stolen Funds
A Canadian hacker hailing from Ottawa, Matthew Philbert, known for his prolific cyber exploits, particularly targeting individuals, has been sentenced to a two-year prison term. Philbert’s modus operandi involved infecting computers with malware, gaining unauthorized access to devices, and…
MoS Finance Comments Google’s Swift Response in Removing 2,200 Deceptive Loan Apps
According to the government, over 2,200 fraudulent loan apps have been suspended or removed from Google’s Play Store between September 2022 and August 2023, as outlined in a written statement issued by the government on Tuesday. As per a…
Canon Patches Seven Critical Flaws in Small Office Printers
Canon, a Japanese electronics company, released software patches on Monday that address seven major vulnerabilities impacting numerous small office printer models. Buffer overflow flaws are the issues that can be used to execute code remotely over a network or…
HPE Cybersecurity Challenge: Data Breach Sparks Investigation
Hewlett Packard Enterprise (HPE), a leading technology company, is currently grappling with a potential security breach as reports emerge of sensitive data being offered for sale on a prominent hacking forum. This latest incident underscores the persistent challenges faced…
ChatGPT Faces Data Protection Questions in Italy
OpenAI’s ChatGPT is facing renewed scrutiny in Italy as the country’s data protection authority, Garante, asserts that the AI chatbot may be in violation of data protection rules. This follows a previous ban imposed by Garante due to alleged…
Can Face Biometrics Prevent AI-Generated Deepfakes?
AI-Generated deep fakes on the rise A serious threat to the reliability of identity verification and authentication systems is the emergence of AI-generated deepfakes that attack face biometric systems. The prediction by Gartner, Inc. that by 2026, 30% of businesses…
‘Leaky Vessels’ Cloud Flaws Enable Container Escapes Worldwide
Researchers discovered a collection of four vulnerabilities in container engine components dubbed “Leaky Vessels,” three of which allow the perpetrators to escape out of containers and perform malicious operations on the host system. One of the vulnerabilities, CVE-2024-21626, affects…
Northern Light Health Ensures Patient Record Security Following Weekend Cyberattack
After some of Northern Light Health’s computer servers were compromised over the weekend, electronic health records for patients have been restored online. As a result of detecting abnormalities on a few servers, the healthcare network took off some of…
Facebook’s Two Decades: Four Transformative Impacts on the World
As Facebook celebrates its 20th anniversary, it’s a moment to reflect on the profound impact the platform has had on society. From revolutionizing social media to sparking privacy debates and reshaping political landscapes, Facebook, now under the umbrella of…
Binance Data Breach Sparks Concerns: Dark Web Sale Rumors Surface
In a surprising development, cryptocurrency giant Binance finds itself facing the looming threat of a potential data breach, as claims circulate on the dark web suggesting the sale of sensitive user information. This occurrence has sent shockwaves throughout the…
EU Takes a Leap Forward with Cybersecurity Certification Scheme
What is the EU cybersecurity certification scheme? The EUCC, or EU cybersecurity certification scheme, has an implementing rule that was adopted by the European Commission. The result is consistent with the cybersecurity certification methodology under consideration on EUCC, which was…
Watch Out for Phone Scams
At the extent of people’s gullibility, there is an increasing cybersecurity threat known as “vishing” which has become a cause for concern, impacting unsuspecting individuals and even businesses. Vishing, short for voice phishing, involves scammers attempting to trick people…
Telegram Emerges as Hub for Cybercrime, Phishing Attacks as Cheap as $230
Cybersecurity experts raise alarms as Telegram becomes a hotspot for cybercrime, fueling the rise of phishing attacks. This trend facilitates mass assaults at a shockingly low cost, highlighting the “democratization” of cyber threats. In a recent development, cybersecurity researchers shed…
Elite Supplements: The Latest Aussie Business to Fall Victim to a Cyber Attack
Consumers of a popular Australian supplement brand are being alerted about the possibility that the company’s hack exposed their personal data. In an email obtained by NCA NewsWire, Elite Supplements notified clients that the business had experienced a cyberattack…
US Authorities Identify Iranian Connection in Recent Cybersecurity Breaches
It has been announced that six Iranian officials have been sanctioned by the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC), the Iranian government organization responsible for the series of malicious cyber activities directed against critical infrastructure…
Security Breach at AnyDesk: Production Servers Hacked, Password Reset
AnyDesk, a widely used remote desktop application, is currently grappling with a significant security breach that has raised alarm among its user base. The company recently disclosed that malicious actors successfully infiltrated its production servers, gaining unauthorized access to…
Phone Scam Siphons Over $200,000 from Bank Account Holder
A bank account holder recounts losing over $200,000 due to phone accessibility issues. Heidi Diamond became a victim of a cyber scam known as sim-swapping, resulting in the depletion of her bank account. Sim-swapping involves fraudsters deceiving cell phone companies…
Cybersecurity Crisis on US Healthcare Sector Children Hospital in Alarms
In a recent and alarming development, Lurie Children’s Hospital, a distinguished pediatric care facility in Chicago, has been forced to disconnect its network due to a pressing “cybersecurity matter.” This precautionary step is a response to the escalating cyber…
Interpol’s Operation ‘Synergia’ Secures Numerous Cybercriminal Arrests, Disrupts Global C2s
An international operation aimed at countering the rising threat of phishing, banking malware, and ransomware attacks globally has successfully dismantled command-and-control (C2) servers across Africa and the Middle East. Led by Interpol, the Synergia operation engaged 60 law enforcement…
Cloudflare Faces Cybersecurity Breach in Okta Supply-Chain Attack
Cloudflare, a prominent Internet security and DDoS protection company, recently fell victim to a cyberattack linked to the widespread Okta supply-chain campaign last fall. The breach, affecting Cloudflare’s Atlassian Bitbucket, Confluence, and Jira platforms, commenced on Thanksgiving Day. Cloudflare, in…
RBI Issues Warning Against Scam Via KYC trick
On February 2, 2024, the Reserve Bank of India (RBI) reiterated its prior warning to the public, offering further suggestions in response to a rising tide of scams involving Know Your Customer (KYC) updates. RBI amplified the cautionary tips…
Ex-CIA Developer Faces 40-Year Sentence for Leaking Classified Data to WikiLeaks
In a multi-charged case that involved the disclosure of classified documents to WikiLeaks, Joshua A Schulte, a former CIA software engineer, was sentenced to 40 years for multiple counts of espionage and computer hacking, as well as one count…
Ukraine Faces PurpleFox Malware Crisis: Unraveling the Ongoing Battle and Countermeasures
In a disturbing turn of events, the insidious PurpleFox malware has recently unleashed a wave of cyber havoc in Ukraine, infiltrating and compromising thousands of computers. This highly adaptable and elusive malware variant has sent shockwaves through the cybersecurity…
Crypto In Trouble: A US Money Laundering Scandal Has Charged The Latest Exchange
In the recent crackdown on crypto-associated cybercrime, the U.S. Department of Justice issued charges against Aliaksandr Klimenka. Klimenka is accused of working with Alexander Vinnik and other individuals from July 2011 to July 2017 to operate BTC-e, an unregulated digital…
Blackbaud Enhances Security Measures Following FTC Settlement
Blackbaud, a major player in U.S. donor data management, recently settled with the Federal Trade Commission (FTC) after facing scrutiny for a ransomware attack in May 2020. This attack led to a substantial data breach affecting millions of individuals. The…
Novel Crytpojacking Campaign is Targeting Docker APIs Across the Internet
Cado security researchers recently identified a sophisticated cryptojacking campaign that exploits exposed Docker API endpoints over the internet. The campaign, called “Commando Cat”, has been operating since early 2024, the researchers noted, claiming that this was the second such…
Cybercriminals Steal $112 Million Worth of Ripple’s XRP Cryptocurrency
On Tuesday, approximately $112 million worth of the XRP cryptocurrency, which is centered around Ripple, was pilfered by hackers from a crypto wallet, as revealed by Ripple’s co-founder and executive chairman, Chris Larsen. Larsen disclosed on Wednesday that the…
Sneaky USB Hackers Pose Threat on Favorite Sites
In a recent revelation in the world of cybersecurity, a financially motivated hacker has been discovered utilizing USB devices as a means to infiltrate computer systems. This malicious group has chosen a cunning approach, hiding their harmful software in…
Cybersecurity Crisis Looms: FBI Chief Unveils Chinese Hackers’ Plan to Target US Infrastructure
As the head of the FBI pointed out Wednesday, Beijing was positioning itself to disrupt the daily lives of Americans if there was ever a war between the United States and China if it were to plant malware to…
FIRST Launched CVSS 4.0, Revolutionizing Cybersecurity Assessment and Risk Management
In a recent development, the Forum of Incident Response and Security Teams (FIRST) has made headlines by unveiling version 4.0 of the Common Vulnerability Scoring System (CVSS). This latest release, following four years since CVSS v3.1, represents a noteworthy advancement…
Payment Frauds on Rise: Organizations Suffering the Most
Payment Fraud: A Growing Threat to Organizations In today’s digital landscape, organizations face an ever-increasing risk of falling victim to payment fraud. Cybercriminals are becoming more sophisticated, employing a variety of tactics to deceive companies and siphon off funds. Let’s…
Cybersecurity Breach Raises Concerns of Data Exposure
In a recent occurrence of a cyber threat, the infamous ransomware gang known as ALPHV, or Blackcat, has claimed responsibility for breaching the Technica Corporation, a company supporting the U.S. Federal Government. ALPHV announced on the dark web that it…
City Cyber Taskforce Introduced to Safeguard Corporate Finance in UK
Two of the UK’s main accounting and security agencies are forming a new taskforce today to help organisations enhance the security of their corporate finance transactions. The effort is being led by the Institute of Chartered Accountants in England…
FritzFrog’s Evolution: Exploiting Log4Shell Vulnerability Reveals Alarming Tactics
In a startling development, the notorious FritzFrog botnet, which first emerged in 2020, has undergone a significant transformation by exploiting the Log4Shell vulnerability. Unlike its traditional approach of focusing on internet-facing applications, this latest variant is now aggressively targeting…
Locking Down ChatGPT: A User’s Guide to Strengthening Account Security
OpenAI officials said that the user who reported his ChatGPT history was a victim of a compromised ChatGPT account, which resulted in the unauthorized logins. OpenAI has confirmed that the unauthorized logins originate from Sri Lanka, according to an…
Increasing Number of Ransomware Targets Opting Against Ransom Payments
For an extended period, ransomware groups have instilled fear in various organizations, including businesses, schools, and hospitals. However, there is a positive shift as an increasing number of victims are now rejecting ransom demands. In the fourth quarter, the…
Akira Ransomware Unleashes Cyber Storm: Targets North American Companies
In the continually changing realm of cyber threats, organizations find themselves urgently needing to strengthen their cybersecurity measures to combat the increasing complexity of ransomware attacks. The focus is on Akira, a recently discovered ransomware family, highlighting a group of…
Is Your Gadget Secretly a Security Risk?
In our digital world where everything connects, keeping our devices safe is like building a strong fortress. We all know the basics – use strong passwords and be careful with downloads. But there’s a hidden world of dangers that…
Mark Zuckerberg Apologizes to Families in Fiery US Senate Hearing
In a recent US Senate hearing, Mark Zuckerberg, the CEO of Meta (formerly Facebook), faced intense scrutiny over the impact of social media platforms on children. Families who claimed their children had been harmed by online content were present, and…
Critical Windows Event Log Vulnerability Uncovered: Enterprise Security at Risk
In a recent discovery, cybersecurity researchers have identified a critical zero-day vulnerability posing a significant threat to the Windows Event Log service. This flaw, when exploited, has the potential to crash the service on all supported versions of Windows,…
Apple Raises Concerns Over UK’s Ability to ‘Secretly Veto’ Global Privacy Tools
Apple has strongly criticized the UK government’s move to require pre-approval of new security features introduced by technology companies. Proposed amendments to the Investigatory Powers Act (IPA) 2016 suggest that if the UK Home Office rejects an update, it…
Cohesity Research Shows That Most Firms Break Their “Do Not Pay” Policies by Paying Millions in Ransoms
While a “do not pay” ransomware policy may sound appealing in theory, thwarting attackers’ demand for ransom in exchange for stolen data is easier said than done. A recent study conducted by Cohesity, a leader in AI-powered data security…
AI Takes Center Stage: Microsoft’s Bold Move to Unparalleled Scalability
In the world of artificial intelligence, Microsoft is currently making some serious waves with its recent success in deploying the technology at scale, making it one of the leading players. With a market value that has been estimated to…
Mercedes-Benz Accidentally Reveals Secret Code
Mercedes-Benz faces the spotlight as a critical breach comes to light. RedHunt Labs, a cybersecurity firm, discovered a serious vulnerability in Mercedes’s digital security, allowing unauthorised entry to confidential internal data. Shubham Mittal, Chief Technology Officer at RedHunt Labs,…
Unprecedented Data Breach Exposes Personal Information of Millions in India
Described as the biggest data breach ever, a big security mistake has apparently leaked the personal info of millions of people around the world. CloudSEK, an Indian cybersecurity company, brought attention to the breach, exposing extensive sensitive data, including names,…
Hundreds of Network Operators’ Credentials Compromised on Dark Web
Leaked creds of RIPE, APNIC, AFRINIC, and LACNIC are available on the Dark Web After doing a comprehensive scan of the Dark Web, Resecurity discovered that info stealer infections had compromised over 1,572 customers of RIPE, the Asia-Pacific Network Information Centre…
AI Poison Pill App Nightshade Received 250K Downloads in Five Days
Shortly after its January release, the AI copyright infringement tool Nightshade exceeded the expectations of its developers at the University of Chicago’s computer science department, with 250,000 downloads. With Nightshade, artists can avert AI models from using their artwork…
Huber Heights Under Siege: Ransomware Attack Hits 5,000+ Residents
It has been reported in the Dayton suburb of Huber Heights, Ohio this week that the city’s computer system was disabled by a ransomware attack last November, and new details have emerged about that attack. The city manager, Rick…
The Dual Landscape of LLMs: Open vs. Closed Source
AI has emerged as a transformative force, reshaping industries, influencing decision-making processes, and fundamentally altering how we interact with the world. The field of natural language processing and artificial intelligence has undergone a groundbreaking shift with the introduction of…
Privacy Watchdog Fines Italy’s Trento City for Privacy Breaches in Use of AI
Italy’s privacy watchdog has recently fined the northern city of Trento since they failed to keep up with the data protection guidelines in how they used artificial intelligence (AI) for street surveillance projects. Trento was the first local administration in…
Cyberattack on Bucks County’s Emergency System
Bucks County is in a compromising position as a digital ambush has transpired. About a week ago, the computer-aided emergency dispatch system, the backbone of quick and efficient emergency responses, fell victim to a cyberattack. Picture it like the…
Mercedes-Benz Accidentally Leaked Private Data, Including Source Code
Mercedes-Benz unintentionally leaked a trove of internal data by leaving an obscure key online that gave “unrestricted access” to the company’s source code, according to the security research team that unearthed it. TechCrunch was notified of the exposure by…
Apple’s Shield Shattered: The Critical Flaw in iPhone Theft Defense
Several weeks ago, Joanna Stern from the Wall Street Journal reported that an increasing number of iPhone thieves have been stealing their devices from restaurants and bars and that one criminal was earning up to $300,000. During these attacks,…
Decrypting the Threat: Telegram’s Dark Markets and the Growing Menace of Phishing Networks
In the last few years social media has gradually become a one stop shop for scammers. With easily available information, scammers as able to hand pick their target and create a customized scam for them. Telegram is one such…
AlphaCodium: Your New Coding Assistant
Meet AlphaCodium, the latest creation from CodiumAI, taking AI code generation to the next level, leaving Google’s AlphaCode in its digital dust. Forget complicated terms; AlphaCodium simply means smarter, more accurate coding. Instead of following a set script, it…
The Role of Biometrics in a Zero Trust Landscape
The illicit trade of biometric data, sourced from manipulated selfies, fraudulent passports, and cyberattacks on data repositories containing fingerprints to DNA information, has been thriving on the dark web. Despite their untraceability, these compromised biometrics empower attackers to access…
Cyber Attacks by North Korean Hackers on Cryptocurrency Platforms Reach $1 Billion in 2023
A recent study by Chainalysis, a blockchain analytics firm, has revealed a surge in cyber attacks on cryptocurrency platforms linked to North Korea. The data, covering the period from 2016 to 2023, indicates that 20 crypto platforms were targeted…
Data Collaboration Platforms Ruling the Charts in Unlocking Sophisticated AI Models
Large Language Models (LLMs) have opened up exciting new possibilities for organisations in the field of artificial intelligence (AI), including enhanced decision-making, streamlined processes, and ground-breaking innovation. Leading companies like Zendesk, Slack, Goldman Sachs, GitHub, and Unilever have used…
Synthetic Data: How Does the ‘Fake’ Data Help Healthcare Sector?
As the health care industry globally continues to collapse from staff-shortage, AI is being hailed as the public and private sector’s salvation. With its capacity to learn and perform jobs like tumor detection from scans, the technology has the potential…
NSA Confession: Unlawful Surveillance on Americans Exposed
Despite attempts to conceal details of arrangements between United States spy agencies and private companies that track the location of Americans using their cell phones, United States officials fought to conceal the details. Normally, law enforcement and intelligence agencies…
23andMe Faces Privacy Breach
Recently, 23andMe, a prominent genetic testing provider, finds itself grappling with a substantial security breach spanning five months, from April 29 to September 27. This breach has exposed the health reports and raw genotype data of affected customers, shedding…
‘Mother of All Breaches’: 26 Billion Personal Records and Passwords Leaked
Even after being significantly vigilant while using online tools, a user’s personal and professional information could still be exposed to a data breach. In certain cases, hackers tend to compile credentials and information stolen in past breaches to make their…
AI Image Generation Breakthrough Predicted to Trigger Surge in Deepfakes
A recent publication by the InstantX team in Beijing introduces a novel AI image generation method named InstantID. This technology boasts the capability to swiftly identify individuals and generate new images based on a single reference image. Despite being…
Pegasus Spyware Targets Two Journalists in Togo: RSF
Reporters Without Borders (RSF) disclosed that two journalists in Togo had spyware on their phones that looked similar to the potent Pegasus surveillance tool used by the NSO group. RSF reports that the journalists are accused of defaming a…
The Rise of AI Restrictions: 25% of Firms Slam the Door on AI Magic
When ChatGPT was first released to the public, several corporate titans, from Apple to Verizon, made headlines when they announced bans on the use of this software at work shortly after it was introduced. However, a recent study confirms…
AllaKore RAT: Malware Target Mexican Banks and Crypto Platforms
Mexican financial institutions are suffering attacks by a new spear-phishing campaign, spreading a modified version of an open-source remote access trojan named ‘AllaKore RAT’. The activity was attributed by the BlackBerry Research and Intelligence Team to an unidentified financially motivated…
UK Cybersecurity Agency Issues Warning: AI to Enhance Authenticity of Scam Emails
The UK’s cybersecurity agency has issued a warning that artificial intelligence (AI) advancements may make it challenging to distinguish between genuine and fraudulent emails, particularly those prompting users to reset passwords. The National Cyber Security Centre (NCSC), affiliated with…
The Future of AI: Labour Replacement or Collaboration?
In a recent interview with CNBC at the World Economic Forum in Davos, Mustafa Suleyman, co-founder and CEO of Inflection AI, expressed his views on artificial intelligence (AI). Suleyman, who left Google in 2022, highlighted that while AI is…
Kasseika Ransomware Employs AntiVirus Driver to Disarm Other Antiviruses
Kasseika, a ransomware gang, has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) assault to disable security-related processes on compromised Windows hosts, following groups such as Akira, AvosLocker, BlackByte, and RobbinHood. Trend Micro claimed in…
Preserving Literary Integrity: Indian Publishers Plead for Copyright Measures Against AI Models
It may become necessary to amend the Information Technology rules to ensure fair compensation and ensure that news publishers in India are fairly compensated for the use of their content in training generative artificial intelligence (GenAI) models in the…