Tag: CySecurity News – Latest Information Security and Hacking Incidents

Microsoft Copilot: A Visual Revolution in AI Image Editing

  In a significant and forward-thinking development, Microsoft has recently upgraded its AI-powered coding assistant, Copilot, introducing a groundbreaking feature that extends its capabilities into the realm of AI image editing. This not only marks a substantial expansion of Copilot’s…

Persistent Data Retention: Google and Gemini Concerns

  While it competes with Microsoft for subscriptions, Google has renamed its Bard chatbot Gemini after the new artificial intelligence that powers it, called Gemini, and said consumers can pay to upgrade its reasoning capabilities to gain subscribers. Gemini Advanced…

Privacy Watchdog Issues Warning

  Information about over 33 million individuals in France, roughly half of the nation’s population, was compromised in a cyber assault after January, as per statements from the country’s data protection authority. The Commission Nationale Informatique et Libertés (CNIL) disclosed…

Microsoft’s Super Bowl Pitch: We Are Now an AI Firm

  Microsoft made a comeback to the Super Bowl on Sunday with a commercial for its AI-powered chatbot, highlighting the company’s resolve to shake off its reputation as a stuffy software developer and refocus its offerings on the potential of…

Mozilla Firefox’s Premium Dark Web Monitoring Solution

  Mozilla, renowned for its commitment to an open and secure internet, has recently made a strategic foray into unexplored realms with the introduction of a subscription-based dark web monitoring service. This bold move signifies the organization’s dedication to empowering…

New Variant of Banking Trojan Discovered Targeting Mexico

In a recent discovery, cybersecurity researchers from Palo Alto Networks Unit 42 have uncovered a new variant of the stealthy banking Trojan known as Mispadu Stealer. This infostealer is specifically designed to target regions and URLs associated with Mexico, posing…

Meta’s AI Ambitions Raised Privacy and Toxicity Concerns

In a groundbreaking announcement following Meta CEO Mark Zuckerberg’s latest earnings report, concerns have been raised over the company’s intention to utilize vast troves of user data from Facebook and Instagram to train its own AI systems, potentially creating a…

Identity Fraud Affects Two Million Brits in 2023

In a recent report by FICO on Fraud, Identity, and Digital Banking, it was revealed that nearly two million Brits may have fallen victim to identity theft last year. The analytics firm found that 4.3% of respondents experienced fraudsters using…

Geofencing: A Tech Set to Transform the Consumer Landscape?

One technological advancement that is subtly changing the marketing and customer engagement scene is Geofencing. It effortlessly connects your device to companies and services by drawing virtual borders around real-world locations. As soon as you cross these lines, you get…

Ensuring Online Safety for Your Child: Tips and Measures

  In the digital landscape of 2024, children are spending significant amounts of time online, whether it’s for educational purposes, gaming, or entertainment. With technology advancing rapidly, such as Apple’s Vision Pro, maintaining constant connectivity is becoming the standard even…

Identity Hijack: The Next Generation of Identity Theft

  Synthetic representations of people’s likenesses, or “deepfake” technology, are not new. Picture Mark Hamill’s 2019 “The Mandalorian” episode where he played a youthful Luke Skywalker, de-aged. Similarly, artificial intelligence is not a novel concept.  However, ChatGPT’s launch at the…

Ivanti US Faces Security Crisis, Threatening Worldwide Systems

In a recent development, a critical server-side request forgery (SSRF) vulnerability has been discovered in Ivanti Connect Secure and Ivanti Policy Secure servers, marked as CVE-2024-21893. Security experts have confirmed that this vulnerability is being actively exploited by multiple attackers,…

Canon Patches Seven Critical Flaws in Small Office Printers

  Canon, a Japanese electronics company, released software patches on Monday that address seven major vulnerabilities impacting numerous small office printer models.  Buffer overflow flaws are the issues that can be used to execute code remotely over a network or…

HPE Cybersecurity Challenge: Data Breach Sparks Investigation

  Hewlett Packard Enterprise (HPE), a leading technology company, is currently grappling with a potential security breach as reports emerge of sensitive data being offered for sale on a prominent hacking forum. This latest incident underscores the persistent challenges faced…

ChatGPT Faces Data Protection Questions in Italy

  OpenAI’s ChatGPT is facing renewed scrutiny in Italy as the country’s data protection authority, Garante, asserts that the AI chatbot may be in violation of data protection rules. This follows a previous ban imposed by Garante due to alleged…

Can Face Biometrics Prevent AI-Generated Deepfakes?

AI-Generated deep fakes on the rise A serious threat to the reliability of identity verification and authentication systems is the emergence of AI-generated deepfakes that attack face biometric systems. The prediction by Gartner, Inc. that by 2026, 30% of businesses…

‘Leaky Vessels’ Cloud Flaws Enable Container Escapes Worldwide

  Researchers discovered a collection of four vulnerabilities in container engine components dubbed “Leaky Vessels,” three of which allow the perpetrators to escape out of containers and perform malicious operations on the host system. One of the vulnerabilities, CVE-2024-21626, affects…

EU Takes a Leap Forward with Cybersecurity Certification Scheme

What is the EU cybersecurity certification scheme? The EUCC, or EU cybersecurity certification scheme, has an implementing rule that was adopted by the European Commission. The result is consistent with the cybersecurity certification methodology under consideration on EUCC, which was…

Watch Out for Phone Scams

  At the extent of people’s gullibility, there is an increasing cybersecurity threat known as “vishing” which has become a cause for concern, impacting unsuspecting individuals and even businesses. Vishing, short for voice phishing, involves scammers attempting to trick people…

Phone Scam Siphons Over $200,000 from Bank Account Holder

A bank account holder recounts losing over $200,000 due to phone accessibility issues. Heidi Diamond became a victim of a cyber scam known as sim-swapping, resulting in the depletion of her bank account. Sim-swapping involves fraudsters deceiving cell phone companies…

Cloudflare Faces Cybersecurity Breach in Okta Supply-Chain Attack

Cloudflare, a prominent Internet security and DDoS protection company, recently fell victim to a cyberattack linked to the widespread Okta supply-chain campaign last fall. The breach, affecting Cloudflare’s Atlassian Bitbucket, Confluence, and Jira platforms, commenced on Thanksgiving Day. Cloudflare, in…

RBI Issues Warning Against Scam Via KYC trick

  On February 2, 2024, the Reserve Bank of India (RBI) reiterated its prior warning to the public, offering further suggestions in response to a rising tide of scams involving Know Your Customer (KYC) updates. RBI amplified the cautionary tips…

Sneaky USB Hackers Pose Threat on Favorite Sites

  In a recent revelation in the world of cybersecurity, a financially motivated hacker has been discovered utilizing USB devices as a means to infiltrate computer systems. This malicious group has chosen a cunning approach, hiding their harmful software in…

Payment Frauds on Rise: Organizations Suffering the Most

Payment Fraud: A Growing Threat to Organizations In today’s digital landscape, organizations face an ever-increasing risk of falling victim to payment fraud. Cybercriminals are becoming more sophisticated, employing a variety of tactics to deceive companies and siphon off funds. Let’s…

Cybersecurity Breach Raises Concerns of Data Exposure

In a recent occurrence of a cyber threat, the infamous ransomware gang known as ALPHV, or Blackcat, has claimed responsibility for breaching the Technica Corporation, a company supporting the U.S. Federal Government. ALPHV announced on the dark web that it…

Is Your Gadget Secretly a Security Risk?

  In our digital world where everything connects, keeping our devices safe is like building a strong fortress. We all know the basics – use strong passwords and be careful with downloads. But there’s a hidden world of dangers that…

Mercedes-Benz Accidentally Reveals Secret Code

  Mercedes-Benz faces the spotlight as a critical breach comes to light. RedHunt Labs, a cybersecurity firm, discovered a serious vulnerability in Mercedes’s digital security, allowing unauthorised entry to confidential internal data. Shubham Mittal, Chief Technology Officer at RedHunt Labs,…

The Dual Landscape of LLMs: Open vs. Closed Source

  AI has emerged as a transformative force, reshaping industries, influencing decision-making processes, and fundamentally altering how we interact with the world.  The field of natural language processing and artificial intelligence has undergone a groundbreaking shift with the introduction of…

Cyberattack on Bucks County’s Emergency System

  Bucks County is in a compromising position as a digital ambush has transpired. About a week ago, the computer-aided emergency dispatch system, the backbone of quick and efficient emergency responses, fell victim to a cyberattack. Picture it like the…

AlphaCodium: Your New Coding Assistant

  Meet AlphaCodium, the latest creation from CodiumAI, taking AI code generation to the next level, leaving Google’s AlphaCode in its digital dust. Forget complicated terms; AlphaCodium simply means smarter, more accurate coding. Instead of following a set script, it…

The Role of Biometrics in a Zero Trust Landscape

  The illicit trade of biometric data, sourced from manipulated selfies, fraudulent passports, and cyberattacks on data repositories containing fingerprints to DNA information, has been thriving on the dark web. Despite their untraceability, these compromised biometrics empower attackers to access…

NSA Confession: Unlawful Surveillance on Americans Exposed

  Despite attempts to conceal details of arrangements between United States spy agencies and private companies that track the location of Americans using their cell phones, United States officials fought to conceal the details. Normally, law enforcement and intelligence agencies…

23andMe Faces Privacy Breach

  Recently, 23andMe, a prominent genetic testing provider, finds itself grappling with a substantial security breach spanning five months, from April 29 to September 27. This breach has exposed the health reports and raw genotype data of affected customers, shedding…

Pegasus Spyware Targets Two Journalists in Togo: RSF

  Reporters Without Borders (RSF) disclosed that two journalists in Togo had spyware on their phones that looked similar to the potent Pegasus surveillance tool used by the NSO group. RSF reports that the journalists are accused of defaming a…

AllaKore RAT: Malware Target Mexican Banks and Crypto Platforms

Mexican financial institutions are suffering attacks by a new spear-phishing campaign, spreading a modified version of an open-source remote access trojan named ‘AllaKore RAT’. The activity was attributed by the BlackBerry Research and Intelligence Team to an unidentified financially motivated…

The Future of AI: Labour Replacement or Collaboration?

  In a recent interview with CNBC at the World Economic Forum in Davos, Mustafa Suleyman, co-founder and CEO of Inflection AI, expressed his views on artificial intelligence (AI). Suleyman, who left Google in 2022, highlighted that while AI is…