Anthropic, a leading generative AI startup, has announced that it would not employ its clients’ data to train its Large Language Model (LLM) and will step in to safeguard clients facing copyright claims. Anthropic, which was established by former…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Web3: Championing Digital Freedom and Safeguarding Liberty in the Modern Era
In an era defined by technological progress shaping our daily lives, Web3 emerges as a beacon of hope and promise, akin to early American pioneers like Thomas Jefferson who established governance systems to safeguard public liberty. Going beyond mere…
Here’s How To Steer Clear Of QR Code Hacking
QR codes, present for years and widely embraced during COVID-19, offer great benefits. Yet, cybercriminals exploit them, creating malicious QR codes to unlawfully access your personal and financial data. These tampered codes pose a threat, potentially leading to unauthorised…
Privacy at Stake: Meta’s AI-Enabled Ray-Ban Garners’ Mixed Reactions
There is a high chance that Meta is launching a new version of Ray-Ban glasses with embedded artificial intelligence assistant capabilities to revolutionize wearable technology. As a result of this innovation, users will have the ability to process audio…
Orrick Data Breach: Law Firm Dealing with Data Breaches Hit by One
An international law firm assists businesses impacted by security events has experienced a cyberattack, where it compromised the sensitive health information of hundreds of thousands of data breach victims. Orrick, Herrington & Sutcliffe, the San Francisco-based company revealed last week…
North Korean Actors Behind $600M in Crypto Thefts: TRM Labs
North Korean Hackers According to a TRM Labs analysis, hackers with ties to North Korea were responsible for one-third of all cryptocurrency exploits and thefts last year, taking away about $600 million in cash. The blockchain analytics company claimed on…
Cybercriminals Exploit X Gold Badge, Selling Compromised Accounts on Dark Web
A recent report highlights the illicit activities of cybercriminals exploiting the “Gold” verification badge on X (formerly Twitter). Following Elon Musk’s acquisition of X in 2022, a paid verification system was introduced, allowing regular users to purchase blue ticks. Additionally,…
Security Issue in Banking Applications?
Recently, we tested a mobile application of a BFSI platform, which allowed the organization’s employees to view and interact with new customer leads. The mobile app had a password-based authentication system, with the username being the mobile number of the…
Google Removes Foreign eSIM Apps Airola and Holafly from PlayStore
Google has removed Airola and Holafly from its PlayStore for Indian users due to their sale of international SIM cards without the necessary authorizations. The decision came from the department of telecommunications (DoT), which also contacted internet service providers to…
Prior to Cyber Attack, Russian Attackers Spent Months Inside the Ukraine Telecoms Giant
Kyivstar experienced a large-scale malfunction in December 2023, resulting in the outage of mobile communications and the internet for about 24 million users for several days. How? Russian hackers broke into the Ukrainian telecommunications giant’s system in May 2023.…
SBU Cybersecurity Chief Exposes Persistent Hacker Presence in Kyivstar
An attack on Kyivstar, a telco company that has some 24 million users in Ukraine, appears to have been carried out by Russia’s Sandworm crew last month. It appears they shut down mobile and internet services to these users. …
Microsoft is Rolling out an AI Powered Key
Prepare for a paradigm shift as Microsoft takes a giant leap forward with a game-changing announcement – the integration of an Artificial Intelligence (AI) key in their keyboards, the most substantial update in 30 years. This futuristic addition promises…
Google Disables 30 Million Chrome User Cookies
Eliminating Cookies: Google’s Next Plan Google has been planning to eliminate cookies for years, and today is the first of many planned quiet periods. About 30 million users, or 1% of the total, had their cookies disabled by the Chrome…
23andMe Faces Legal Backlash Over Data Breach and Blames Victims
Facing a deluge of more than 30 lawsuits from individuals impacted by a substantial data breach, genomics company 23andMe has taken a defensive stance by placing responsibility on the victims themselves. The breach came to light in October when customer…
Orbit Chain Loses $86M in Cross-Chain Bridge Hack
Orbit Chain, a South Korean platform designed to act as a multi-asset blockchain hub, revealed a massive breach on December 31, 2023. The company disclosed an “unidentified access to Orbit Bridge,” its decentralised cross-chain technology, which resulted in the…
Estes Declines Ransom Demand Amidst Personal Data Breach and Theft
Estes Express Lines, a major private freight shipping company in the United States, has notified over 20,000 customers about a security breach where their personal information was stolen by unknown hackers. The company revealed that on October 1, 2023,…
Russia Hacks Surveillance Cameras to Monitor Attacks in Kyiv
During Tuesday’s intense missile and drone strikes on Ukraine’s capital, Kyiv, which left over 250,000 people without internet or electricity amid dropping winter temperatures, Russian military intelligence broke into surveillance cameras to spy on Ukrainian air defenses and Kyiv’s vital…
Regenerate and Conquer: Wolverine’s Real-Time Damage System to Dominate the Gaming Landscape
Marvel’s Wolverine has leaked details which suggest that the game will use advanced features, even those that are not available on current PlayStation 5 hardware, to play the game. In the recent Insomniac data breach, a new rumour has…
Hackers Leak 50 Million Records in ‘Free Leaksmas’ Spree
Just before Christmas, hackers leaked around 50 million records full of private information. They shared these leaks on the Dark Web under the name “Free Leaksmas.” It seems like they were doing this to thank each other and attract new…
U.S DOE Announces $70 Million Funding for Improving
Funding that will support research into tech Today, the U.S. Department of Energy (DOE) announced funding of up to $70 million to support research into technologies intended to reduce risks and increase resilience to energy delivery infrastructure from a variety…
Open AI Moves to Minimize Regulatory Risk on Data Privacy in EU
While the majority of the world was celebrating the arrival of 2024, it was back to work for ChatGPT’s parent company, OpenAI. After being investigated for violating people’s privacy, the firm is believed to be rushing against the clock…
Unveiling Free VPN Risks: Protecting Online Privacy and Security
If you’re seeking enhanced security and privacy for your online activities, you might be considering the use of a Virtual Private Network (VPN). Virtual Private Networks (VPNs) are specifically crafted to accomplish this task. A quality VPN channels your…
The Biggest Tech Talent Gap Can Be Found in the SAP Ecosystem
In today’s job market, employers are facing a challenge in finding the right talent for tech roles that go beyond just coding. They’re not just looking for people who can write code; they want individuals who can implement, integrate, and…
Fortifying iPhone Security: Stolen Device Protection & Essential Tips Amid Rising Theft Concerns
Numerous iPhones, often regarded as some of the best in the market, are pilfered daily on a global scale. Apple aims to address this issue with the upcoming release of iOS 17.3, introducing a feature called Stolen Device Protection.However,…
SaaS Challenges and How to Overcome Them
According to 25% of participants in an IBM study conducted in September 2022 among 3,000 companies and tech executives worldwide, security worries stand in the way of their ability to achieve their cloud-related goals. Nowadays, a lot of organizations think…
Ahmedabad Creates History as India’s First City With AI-Linked Surveillance System
The largest city in the Indian state of Gujarat, Ahmedabad, made history by being the first to install a surveillance system connected to artificial intelligence (AI). In order to enhance public safety and security, the city has teamed up…
With Deepfakes on Rise, Where is AI Technology Headed?
Where is the Artificial Intelligence Headed? Two words, ‘Artificial’ and ‘Intelligence’, together have been one of the most evident buzzwords that have been driving lives and preparing the world for the real ride ahead, and that of the world economy. …
A Delhi Lawyer’s Encounter Exposes Hidden Perils of SIM Swap Scam
In the contemporary landscape dominated by digital interconnectedness, the escalating menace of cybercrime has assumed unprecedented proportions. The latest threat on the horizon is the insidious ‘SIM Swap’ scam, an advanced scheme exploiting vulnerabilities in the telecommunications system. In…
Identity Crisis: 14 Million Individuals at Risk After Mortgage Lender’s Data Breach
Mr Cooper, the private mortgage lender, has now admitted almost 14.7 million individuals’ private data has been stolen in a previous IT security breach, which resulted in the theft of their addresses and bank account numbers, but it is…
Records of Crucial Cases May Have Been Compromised by a Cyberattack on Victoria’s Court System
Ransomware used to assault Victoria’s court system An independent expert believes that ransomware was used to assault Victoria’s court system and that the attack was coordinated by Russian hackers. According to a representative for Court Services Victoria (CSV), hackers gained…
Future Health: AI’s Impact on Personalised Care in 2024
As we dive into the era of incorporating Artificial Intelligence (AI) into healthcare, the medical sector is poised for a profound transformation. AI holds immense potential in healthcare, offering groundbreaking advancements in diagnostics, personalised treatment approaches, and streamlined administrative…
“Pink Drainer” Siphons $4.4 Million Chainlink Through Phishing
Pink Drainer, the infamous crypto-hacking outfit, has been accused in a highly sophisticated phishing scheme that resulted in the theft of $4.4 million in Chainlink (LINK) tokens. This recent cyber crime targeted a single victim who was duped into…
Hangzhou’s Cybersecurity Breakthrough: How ChatGPT Elevated Ransomware Resolution
The Chinese media reported on Thursday that local police have arrested a criminal gang from Hangzhou who are using ChatGPT for program optimization to carry out ransomware attacks for the purpose of extortion. An organization in the Shangcheng district…
Zeppelin2 Ransomware: An Emerging Menace in the Dark Web Ecosystem
In a recent update from an underground online forum, a user is actively promoting the sale of Zeppelin2 ransomware, providing both its source code and a cracked version of its builder tool. This malicious software, known for its destructive…
Comcast-Owned Telcom Business ‘Xfinity’ Suffers Data Breach
Comcast-owned Xfinity has suffered a major data breach, affecting more than 25 million of its customers. This intrusion not only demonstrates a risky and expanding practice among hackers, but it has also greatly increased the vulnerability of millions of US-based…
Learn How to Decrypt Black Basta Ransomware Attack Without Paying Ransom
Researchers have created a tool designed to exploit a vulnerability in the Black Basta ransomware, allowing victims to recover their files without succumbing to ransom demands. This decryption tool potentially provides a remedy for individuals who fell victim to Black…
Time to Guard : Protect Your Google Account from Advanced Malware
In the ever-changing world of cybersecurity, a new type of threat has emerged, causing serious concerns among experts. Advanced malware, like Lumma Stealer, is now capable of doing something particularly alarming – manipulating authentication tokens. These tokens are like…
Google Patches Around 100 Security Bugs
Updates were released in a frenzy in December as companies like Google and Apple scrambled to release patches in time for the holidays in order to address critical vulnerabilities in their devices. Giants in enterprise software also released their fair…
New DLL Search Order Hijacking Variant Evades Windows 10 and 11 Protections
Security researchers have outlined a fresh variant of a dynamic link library (DLL) search order hijacking technique, potentially enabling threat actors to circumvent security measures and execute malicious code on computers running Microsoft Windows 10 and Windows 11. The…
DWP Clarifies What Bank Accounts are Targeted in Crackdown on Benefit Fraud
Identity of the bank accounts targeted in the DWP crackdown on benefit fraud have recently been made clear. The Department for Work and Pensions (DWP) will examine bank accounts as part of the Data Protection and Digital Information Bill that…
Two Cyber Scammers Arrested; Police Uncover Transactions of ₹60 crore in Bank Accounts
Two cyber fraudsters were detained last week on Friday in Gujarat for allegedly being involved in a scheme that defrauded college students of lakhs of dollars by persuading them to like YouTube videos. Authorities investigated their bank records and…
2024 Tech Landscape: AI Evolution, Emotion Tech Dominance, and Quantum Advances
Artificial Intelligence (AI) is like a game-changer in computer science. It’s becoming the key player in making new technologies like big data, robotics, and the Internet of Things (IoT) possible. In 2023, the tech landscape witnessed a surge in the…
DragonForce Ransomware Gang Prompts Ohio Lottery to Shut Down
On 25 December 2023, the Ohio Lottery faced a major cyberattack, as a result, they had to shut down some crucial systems related to the undisclosed internal application. The threat actors behind the breach are the DragonForce ransomware group. While…
A Crucial Update from EPFO Regarding Your PF Account
The Employees’ Provident Fund Organization (EPFO), responsible for managing deductions from the salaries of employees, has issued a warning to its 6.5 crore members concerning the escalating threat of cybercrime. EPFO has observed a notable increase in fraudulent activities…
Hackers Breach Steam Discord Accounts, Launch Malware
On Christmas Day, the popular indie strategy game Slay the Spire’s fan expansion, Downfall, was compromised, allowing Epsilon information stealer malware to be distributed over the Steam update system. Developer Michael Mayhem revealed that the corrupted package is not a…
US Senators Targeted by Swatting Incidents in Multiple States
A recent surge of “swatting” incidents across America, primarily targeting Republican politicians, has perplexed police agencies and put victims in risk this holiday season, driving lawmakers to demand for stricter anti-swatting laws and harsher penalties. Swatting entails filing a…
Trading Tomorrow’s Technology for Today’s Privacy: The AI Conundrum in 2024
Artificial Intelligence (AI) is a technology that continually absorbs and transfers humanity’s collective intelligence with machine learning algorithms. It is a technology that is all-pervasive, and it will soon be all-pervasive as well. It is becoming increasingly clear that,…
A Closer Look At The Future of MagSafe in Apple’s Ecosystem
Apple is actively exploring ways to enhance MagSafe, aiming to enable wireless data transfer and seamless recognition and authentication of connected accessories. Currently, placing a MagSafe-compatible iPhone on a MagSafe charger allows for charging, even with an added MagSafe iPhone…
How are LLMs with Endpoint Data Boost Cybersecurity
The issue of capturing weak signals across endpoints and predicting possible patterns of intrusion attempts is ideally suited for Large Language Models (LLMs). The objective is to mine attack data in order to improve LLMs and models and discover new…
Microsoft Implements Disablement of Widely Exploited MSIX App Installer Protocol Due to Malware Attacks
On Thursday, Microsoft announced the reactivation of the ms-appinstaller protocol handler, reverting it to its default state due to widespread exploitation by various threat actors for malware dissemination. The Microsoft Threat Intelligence team reported that the misuse of the…
Data Insights Exposes Ledger’s Granular Tracking: Is Privacy at Stake?
An investigation by Rekt Builder has raised concerns about the extent of data collection by Ledger Live, the official software for managing Ledger hardware wallets. The developer claims that Ledger Live tracks every move users make, including the apps…
The Growing Concern About School Record Hacking
The confidential documents stolen from schools and dumped online by ransomware gangs are raw, intimate and graphic. They describe student sexual assaults, psychiatric hospitalizations, abusive parents, truancy — even suicide attempts. Cybercriminals are not only seeking ransom payouts but…
RingGo: Phone Parking Service Suffers Data Breach, Customer Data Stolen
UK-based pay-by-phone parking service – RingGo – has suffered a data breach, where information including partial credit card numbers of several of its customers has been leaked. The EasyPark-owned company informed that the data of at least 950 customers had…
Hackers are Launching DDoS Attacks During Peak Business Hours
Threat groups’ tactics to avoid detection and cause harm are becoming increasingly sophisticated. Many security practitioners have seen distributed denial-of-service (DDoS) attacks carried out during peak business hours, when firms are more likely to be understaffed and caught off…
Parent Company of CBS and Paramount Discloses Cybersecurity Breach Impacting 80K Individuals
The parent company of CBS and Paramount, National Amusements, has recently reported a data breach that occurred a year ago, affecting 82,128 individuals. TechCrunch initially covered the incident, which was disclosed in a legal filing with the Attorney General…
Five Ways the Internet Became More Dangerous in 2023
The emergence of cyber dangers presents a serious threat to people, companies, and governments globally at a time when technical breakthroughs are the norm. The need to strengthen our digital defenses against an increasing flood of cyberattacks is highlighted by…
Three Ways Smart Devices Can Compromise Your Privacy
Any gadget that has an internet connection and can be operated by a computer or smartphone is considered a smart device. Home appliances, security cameras, thermostats, doorbells, lighting systems, and other networked gadgets are examples of such devices. Smart…
Cullman County Courthouse Hit by Ransomware
A hostile cyberattack recently affected the Cullman County Courthouse, causing disruptions to regular operations and causing shockwaves throughout the community. The ransomware attack that affected the courthouse’s systems had serious repercussions for Cullman County residents as well as the local…
Hackers Stole Cryptocurrency Worth $2 Billion in Year 2023
For another year, crypto-stealing cases made headlines. However, as per crypto security firms, this was the first time since 2020, that the trend has been declining. Based on dozens of cyberattacks and thefts this year, hackers stole over $2 billion…
Digital Battlefields: Artists Employ Technological Arsenal to Combat AI Copycats
Technology is always evolving, and the art field has been on the frontline of a new battle as a result – the war against artificial intelligence copycats. In the fast-paced world of artificial intelligence, it is becoming more and…
Government Advises Social Media Platforms on IT Rule Compliance Amid Deepfake Concerns
In response to escalating concerns surrounding the rise of deepfakes and misinformation fueled by artificial intelligence (AI), the government has issued a directive for all platforms to adhere to IT rules, as outlined in an official release. The advisory…
Gaming PCs as Silent Storytellers: Why Privacy Is Crucial
Online games and video games are incredibly popular as a way to connect with people and interact with them. They are a great way to connect with others and interact with them. Many people enjoy playing games online, either…
Employee Use of ‘Shadow IT’ Elevates Cyber Attack Risks for Indian Firms
In India, a recent report indicates that approximately 89% of companies faced cyber incidents within the past two years. Alarmingly, 20% of these breaches were attributed to the utilization of shadow IT, as per findings from a study. This…
Apple Watch Series 9: Pulse Oximetry Ban Saga
The IT community is in uproar as the Apple Watch Series 9 Ultra 2 has been taken off of shops and online marketplaces in an unexpected development. The debate peaked when an American judge temporarily banned Apple Watch sales due…
Hackers Threaten to Leak South Africa’s Private Financial Data, Demand R1.1 Billion Ransom
In a recent cyber threat, hackers have threatened to release all of South Africa’s private financial data unless TransUnion and Experian, the two biggest consumer credit reporting companies in the country, agree to pay ransom of R1.1 billion. The companies…
Lancashire-Based Scamming Group Jailed in £500k Charity Fraud
A group of charity scammers who pretended to be grocery store bucket collectors and deceived the public out of at least £500,000 have been imprisoned. By pretending to be collectors for children’s charities such as Children In Need, Great…
Unveiling the Unseen Cybersecurity Threats Posed by Smart Devices
The number of smart devices worldwide has surpassed the global population, with a continuous upward trend, particularly amidst remote and hybrid work settings. Ranjit Atwal, Gartner’s senior research director, attributes this surge to the increase in remote work. As…
June 2023 Review: MOVEit Exploit, UK Government’s AI Leadership Goals, NHS’ Controversial IT Project
June 2023 might have been the most thriving month for Cl0P ransomware group. Since March, the Russia-based hackers started exploiting a SQL injection vulnerability in the MOVEit file transfer service, frequently used by large organizations. However, it was not until…
Cracking the Code: The Role of AI and UBA in Mitigating Insider Threats to Businesses
Artificial Intelligence (AI) is emerging as a marvel in the landscape of rapidly developing digital technologies along with a challenge for organizations across a wide range of industries in the growing field of digital technologies. Automating mundane tasks and…
Smishing: SMS Phishing Attacks And How to Thwart Them
Smishing is a fast growing version of one of the most established and lucrative scams on the internet. Smishing, like other forms of phishing, aims to trick you into revealing sensitive data and information; however, instead of email, cybercriminals…
Small Businesses Prime Targets for Cyberattacks: Key Signs & Defense Strategies
In the wake of prominent cyberattacks targeting major entities such as casinos, tech giants, and power grids, there is a common misconception that small and midsize businesses are less susceptible to such threats. However, recent research conducted on over…
Data Breach Incident Affects Several Las Vegas Valley Hospitals
In another cybersecurity incident in Las Vegas, cyber actors have targeted several Las Vegas Valley hospitals which may have resulted in the compromise of their patients’ sensitive information. The hospitals, part of the Valley Health System, include Centennial Hills, Desert…
Game Studio Ubisoft Investigates Claims of Data Security Incident
Video gaming company Ubisoft revealed that it is looking into reports that hackers attempted to steal data this week by breaching into its networks. Ubisoft officials were “aware of an alleged data security incident and are currently investigating. At…
OpenAI Addresses ChatGPT Security Flaw
OpenAI has addressed significant security flaws in its state-of-the-art language model, ChatGPT, which has become widely used, in recent improvements. Although the business concedes that there is a defect that could pose major hazards, it reassures users that the issue…
Hacked and Exposed: BSNL’s Battle Against a Dark Web Data Breach
A hacker named Ellis is now selling thousands of internet and landline records from the telecom operator BSNL on the dark web, as a result of a data breach that saw the operator suffer a data breach in the…
Exploitation of Numerous Zero-Days in Windows CLFS Driver by Ransomware Attackers
Over the past 18 months, malevolent actors have taken advantage of a series of vulnerabilities, including four zero-day exploits, within a critical Windows kernel-level driver. Reports from Kaspersky’s Securelist this week not only highlight specific flaws but underscore a…
New Chameleon Android Trojan Can Bypass Biometric Security
A brand new variant of the Chameleon Android malware has been discovered in the wild, featuring new characteristics, the most notable of which is the ability to bypass fingerprint locks. The Chameleon Android banking malware first appeared in early…
GTA 6 Hacker: Life in Secure Hospital for Cybercrime Intent
The teenage hacker who leaked details about Grand Theft Auto 6 (GTA 6) is now facing a life sentence in a guarded institution, which is a surprise development. The person, identified as Lapsus, was placed under an indefinite hospital order…
Researchers Details the Licensing Model of Predator Spyware
A recent analysis of the sophisticated commercial spyware, Predator, reveals that its ability to persist between reboots is offered as an “add-on-feature” and is dependent upon the license options selected by the user, according to a recent analysis. Predator is…
Unveiling ‘Bandook’: A Threat that Adapts and Persists
The Bandook malware family, which was thought to be extinct, is back and may be part of a larger operation intended to sell offensive hacking tools to governments and cybercriminal groups to attack them. Several recent research papers have…
The Impact of Artificial Intelligence on the Evolution of Cybercrime
The role of artificial intelligence (AI) in the realm of cybercrime has become increasingly prominent, with cybercriminals leveraging AI tools to execute successful attacks. However, defenders in the cybersecurity field are actively combating these threats. As anticipated by cybersecurity…
Global Outage Strikes Social Media Giant X
The recent global outage of Social Media Platform X caused a stir in the online community during a time when digital media predominates. Users everywhere became frustrated and curious about the cause of this extraordinary disruption when they realized they…
Zoom Launches AI Companion, Available at No Additional Cost
Zoom has pledged to provide artificial intelligence (AI) functions on its video-conferencing platform at no additional cost to paid clients. The tech firm believes that including these extra features as part of its paid platform service will provide a…
Shimano’s Cyber Siege: A Saga of Resistance Against Ransomware
Shimano Industries, a prominent Japanese multinational manufacturing company specializing in cycling components, fishing tackle, and rowing equipment, seems to have been hit by a massive data breach by the ransomware attacker LockBit, who has threatened to release confidential data, including information such…
The MOVEit Breach Might be the Biggest Cyberattack in 2023
Despite the series of malicious cyber attacks witnessed in 2023, with a number of new trends and tactics in the campaigns, one of the breaches that stood out was the breach of the file transfer service MOVEit. In a new…
Microsoft’s Cybersecurity Report 2023
Microsoft recently issued its Digital Defense Report 2023, which offers important insights into the state of cyber threats today and suggests ways to improve defenses against digital attacks. These five key insights illuminate the opportunities and difficulties in the field…
No Code Application Development Platforms Set to Propel Your Business in 2024
The ability to develop web applications without extensive coding knowledge is a significant advantage in today’s AI-driven world. No-code web building platforms have become essential tools for entrepreneurs, businesses, and creative individuals seeking to swiftly launch web or mobile…
Operation Haechi IV: Interpol Arrest 3,500, Seize Assets Worth $300M
In a sweeping operation announced on Tuesday, the international police organization, Interpol has recently detained around 3,500 culprits who were allegedly linked to a cybercrime incident. The agency has also seized assets worth $300 million, across 34 countries. The operation,…
1.5 Billion Real Estate Records Leaked, Including Elon Musk and Kylie Jenner
Jeremiah Fowler, a cybersecurity researcher, uncovered and notified VPNMentor about an exposed database related to the New York-based online business Real Estate Wealth Network. The compromised database had 1.5 billion records, including real estate ownership data for millions of…
Sophisticated Web Injection Campaign Targets 50,000 Individuals, Pilfering Banking Data
Web injections, a favoured technique employed by various banking Trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cybercriminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In a…
The Effectiveness of AI is Limited in Cybersecurity, Yet Boundless in Cybercrime
Integrating artificial intelligence (AI) into the realm of cybersecurity has initiated a perpetual cycle. Cybersecurity professionals now leverage AI to bolster their tools and enhance detection and protection capabilities. Concurrently, cybercriminals exploit AI for orchestrating their attacks. In response,…
Rise in RaaS Operations and Implications for Business Security
Recently, there had been news regarding the cyber-attack in a Japanese port, that blocked the smooth transfer of goods – a hack in a Las Vegas resort which led to malfunction in slot machines and guest check-ins and a whopping…
Insomniac Games Cybersecurity Breach
A cyberattack has compromised the prestigious game company Insomniac Games, exposing private data without authorization. Concerns over data security in the gaming business have been raised by this hack, which has spread throughout the community. Targeting Insomniac Games, the company…
FBI Alarmed as Ransomware Strikes 300 Victims, Critical Sectors Under Siege
There was an advisory published late on Monday about the Play ransomware gang that was put out by the Federal Bureau of Investigation (FBI) together with the US Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security…
International Authorities Take Down ALPHV ransomware Gang’s Dark Web Leak Site
An international group of law enforcement groups has taken down the dark web leak site of the notorious ransomware gang known as ALPHV, or BlackCat. “The Federal Bureau of Investigation seized this site as part of a coordinated law…
Phishing Campaign Targets Instagram Users, Steals Backup Codes and Circumvent 2FA Protection
A recent phishing scheme has emerged, posing as a ‘copyright infringement’ email to deceive Instagram users and pilfer their backup codes. These codes, integral for the recovery of accounts, are used to circumvent the two-factor authentication safeguarding users’ accounts.…
HackersEra Launches Telecom Penetration Testing to Eliminate Cyber Threats
Cybercriminals have attacked telecom infrastructure, particularly as it shifts to an IP-based design with the introduction of Long-Term Evolution (LTE) networks, also referred to as LTE or 4G. Persistent attackers could spy on users’ cellular networks and record data…
Mr. Cooper Data Breach: 14 Million Customers Exposed
A major data breach at mortgage giant Mr. Cooper compromised the personal data of an astounding 14 million consumers, according to a surprising disclosure. Sensitive data susceptibility in the digital age is a worry raised by the occurrence, which has…
Decoding the Elusive ‘FedEx’ Scam: An Inside Look at the Tactics and Challenges
One type of spam that is going around lately is FedEx scam calls, which have been targeting people, and are also doing the rounds. Most people have been victims of online fraud at some point in their lives. For…
Digital Landline Switch Halted for Vulnerable Users in UK
UK- based phone companies have halted vulnerable customers from switching to digital landlines following “serious incidents” where telecare devices stopped working. These devices, which can be used to call for assistance in an emergency, are estimated to be utilized by…