Tag: CySecurity News – Latest Information Security and Hacking Incidents

Here’s How To Steer Clear Of QR Code Hacking

  QR codes, present for years and widely embraced during COVID-19, offer great benefits. Yet, cybercriminals exploit them, creating malicious QR codes to unlawfully access your personal and financial data. These tampered codes pose a threat, potentially leading to unauthorised…

Security Issue in Banking Applications?

Recently, we tested a mobile application of a BFSI platform, which allowed the organization’s employees to view and interact with new customer leads.  The mobile app had a password-based authentication system, with the username being the mobile number of the…

Microsoft is Rolling out an AI Powered Key

  Prepare for a paradigm shift as Microsoft takes a giant leap forward with a game-changing announcement – the integration of an Artificial Intelligence (AI) key in their keyboards, the most substantial update in 30 years.  This futuristic addition promises…

Google Disables 30 Million Chrome User Cookies

Eliminating Cookies: Google’s Next Plan Google has been planning to eliminate cookies for years, and today is the first of many planned quiet periods. About 30 million users, or 1% of the total, had their cookies disabled by the Chrome…

Orbit Chain Loses $86M in Cross-Chain Bridge Hack

  Orbit Chain, a South Korean platform designed to act as a multi-asset blockchain hub, revealed a massive breach on December 31, 2023. The company disclosed an “unidentified access to Orbit Bridge,” its decentralised cross-chain technology, which resulted in the…

Russia Hacks Surveillance Cameras to Monitor Attacks in Kyiv

During Tuesday’s intense missile and drone strikes on Ukraine’s capital, Kyiv, which left over 250,000 people without internet or electricity amid dropping winter temperatures, Russian military intelligence broke into surveillance cameras to spy on Ukrainian air defenses and Kyiv’s vital…

U.S DOE Announces $70 Million Funding for Improving

Funding that will support research into tech Today, the U.S. Department of Energy (DOE) announced funding of up to $70 million to support research into technologies intended to reduce risks and increase resilience to energy delivery infrastructure from a variety…

SaaS Challenges and How to Overcome Them

According to 25% of participants in an IBM study conducted in September 2022 among 3,000 companies and tech executives worldwide, security worries stand in the way of their ability to achieve their cloud-related goals. Nowadays, a lot of organizations think…

With Deepfakes on Rise, Where is AI Technology Headed?

Where is the Artificial Intelligence Headed? Two words, ‘Artificial’ and ‘Intelligence’, together have been one of the most evident buzzwords that have been driving lives and preparing the world for the real ride ahead, and that of the world economy. …

A Delhi Lawyer’s Encounter Exposes Hidden Perils of SIM Swap Scam

  In the contemporary landscape dominated by digital interconnectedness, the escalating menace of cybercrime has assumed unprecedented proportions. The latest threat on the horizon is the insidious ‘SIM Swap’ scam, an advanced scheme exploiting vulnerabilities in the telecommunications system. In…

Future Health: AI’s Impact on Personalised Care in 2024

  As we dive into the era of incorporating Artificial Intelligence (AI) into healthcare, the medical sector is poised for a profound transformation. AI holds immense potential in healthcare, offering groundbreaking advancements in diagnostics, personalised treatment approaches, and streamlined administrative…

Google Patches Around 100 Security Bugs

Updates were released in a frenzy in December as companies like Google and Apple scrambled to release patches in time for the holidays in order to address critical vulnerabilities in their devices. Giants in enterprise software also released their fair…

A Crucial Update from EPFO Regarding Your PF Account

  The Employees’ Provident Fund Organization (EPFO), responsible for managing deductions from the salaries of employees, has issued a warning to its 6.5 crore members concerning the escalating threat of cybercrime. EPFO has observed a notable increase in fraudulent activities…

Hackers Breach Steam Discord Accounts, Launch Malware

On Christmas Day, the popular indie strategy game Slay the Spire’s fan expansion, Downfall, was compromised, allowing Epsilon information stealer malware to be distributed over the Steam update system. Developer Michael Mayhem revealed that the corrupted package is not a…

US Senators Targeted by Swatting Incidents in Multiple States

  A recent surge of “swatting” incidents across America, primarily targeting Republican politicians, has perplexed police agencies and put victims in risk this holiday season, driving lawmakers to demand for stricter anti-swatting laws and harsher penalties. Swatting entails filing a…

A Closer Look At The Future of MagSafe in Apple’s Ecosystem

Apple is actively exploring ways to enhance MagSafe, aiming to enable wireless data transfer and seamless recognition and authentication of connected accessories. Currently, placing a MagSafe-compatible iPhone on a MagSafe charger allows for charging, even with an added MagSafe iPhone…

How are LLMs with Endpoint Data Boost Cybersecurity

The issue of capturing weak signals across endpoints and predicting possible patterns of intrusion attempts is ideally suited for Large Language Models (LLMs). The objective is to mine attack data in order to improve LLMs and models and discover new…

The Growing Concern About School Record Hacking

  The confidential documents stolen from schools and dumped online by ransomware gangs are raw, intimate and graphic. They describe student sexual assaults, psychiatric hospitalizations, abusive parents, truancy — even suicide attempts.  Cybercriminals are not only seeking ransom payouts but…

Hackers are Launching DDoS Attacks During Peak Business Hours

  Threat groups’ tactics to avoid detection and cause harm are becoming increasingly sophisticated. Many security practitioners have seen distributed denial-of-service (DDoS) attacks carried out during peak business hours, when firms are more likely to be understaffed and caught off…

Five Ways the Internet Became More Dangerous in 2023

The emergence of cyber dangers presents a serious threat to people, companies, and governments globally at a time when technical breakthroughs are the norm. The need to strengthen our digital defenses against an increasing flood of cyberattacks is highlighted by…

Three Ways Smart Devices Can Compromise Your Privacy

  Any gadget that has an internet connection and can be operated by a computer or smartphone is considered a smart device. Home appliances, security cameras, thermostats, doorbells, lighting systems, and other networked gadgets are examples of such devices.  Smart…

Cullman County Courthouse Hit by Ransomware

A hostile cyberattack recently affected the Cullman County Courthouse, causing disruptions to regular operations and causing shockwaves throughout the community. The ransomware attack that affected the courthouse’s systems had serious repercussions for Cullman County residents as well as the local…

Apple Watch Series 9: Pulse Oximetry Ban Saga

The IT community is in uproar as the Apple Watch Series 9 Ultra 2 has been taken off of shops and online marketplaces in an unexpected development. The debate peaked when an American judge temporarily banned Apple Watch sales due…

Smishing: SMS Phishing Attacks And How to Thwart Them

  Smishing is a fast growing version of one of the most established and lucrative scams on the internet. Smishing, like other forms of phishing, aims to trick you into revealing sensitive data and information; however, instead of email, cybercriminals…

OpenAI Addresses ChatGPT Security Flaw

OpenAI has addressed significant security flaws in its state-of-the-art language model, ChatGPT, which has become widely used, in recent improvements. Although the business concedes that there is a defect that could pose major hazards, it reassures users that the issue…

Researchers Details the Licensing Model of Predator Spyware

A recent analysis of the sophisticated commercial spyware, Predator, reveals that its ability to persist between reboots is offered as an “add-on-feature” and is dependent upon the license options selected by the user, according to a recent analysis. Predator is…

Global Outage Strikes Social Media Giant X

The recent global outage of Social Media Platform X caused a stir in the online community during a time when digital media predominates. Users everywhere became frustrated and curious about the cause of this extraordinary disruption when they realized they…

Shimano’s Cyber Siege: A Saga of Resistance Against Ransomware

  Shimano Industries, a prominent Japanese multinational manufacturing company specializing in cycling components, fishing tackle, and rowing equipment, seems to have been hit by a massive data breach by the ransomware attacker LockBit, who has threatened to release confidential data, including information such…

Microsoft’s Cybersecurity Report 2023

Microsoft recently issued its Digital Defense Report 2023, which offers important insights into the state of cyber threats today and suggests ways to improve defenses against digital attacks. These five key insights illuminate the opportunities and difficulties in the field…

Insomniac Games Cybersecurity Breach

A cyberattack has compromised the prestigious game company Insomniac Games, exposing private data without authorization. Concerns over data security in the gaming business have been raised by this hack, which has spread throughout the community. Targeting Insomniac Games, the company…

Mr. Cooper Data Breach: 14 Million Customers Exposed

A major data breach at mortgage giant Mr. Cooper compromised the personal data of an astounding 14 million consumers, according to a surprising disclosure. Sensitive data susceptibility in the digital age is a worry raised by the occurrence, which has…

Digital Landline Switch Halted for Vulnerable Users in UK

UK- based phone companies have halted vulnerable customers from switching to digital landlines following “serious incidents” where telecare devices stopped working. These devices, which can be used to call for assistance in an emergency, are estimated to be utilized by…