Tag: CySecurity News – Latest Information Security and Hacking Incidents

The Rise of Temu: A Game-Changer in Online Shopping

  It has been reported that this year’s Super Bowl was watched by 123 million Americans, setting a record. Aside from the nation’s biggest sporting event, the blockbuster halftime performance, several camera cutaways, and several shots of Taylor Swift in…

I-Soon Leak: Exposing China’s Cyber Espionage

In the dark caves of cyberspace, where secrets are traded like currency and digital shadows gamble, a recent leak of documents reveals that China’s hacking community is not as advanced and systematic as it appears. The leak is likely from…

Massive Data Breach Sends Shockwaves Through Businesses

  A colossal breach of data has rattled the digital world affecting billions of users across various platforms and organisations. This vile breach, dubbed the “mother of all breaches” (MOAB), has exposed a staggering 26 billion entries, including those from…

Critical Bug in aiohttp: Ransomware Attackers On A Roll

In the rapidly changing world of cybersecurity, cyber threats have been a nuisance and Ransomware is a constant menace. In a recent incident, cybersecurity firm Cyble found a serious vulnerability that threat actors are exploiting to get unauthenticated remote access…

Fairness is a Critical And Challenging Feature of AI

    Artificial intelligence’s ability to process and analyse massive volumes of data has transformed decision-making processes, making operations in health care, banking, criminal justice, and other sectors of society more efficient and, in many cases, effective.  This transformational power,…

Simplifying Data Management in the Age of AI

  In today’s fast-paced business environment, the use of data has become of great importance for innovation and growth. However, alongside this opportunity comes the responsibility of managing data effectively to avoid legal issues and security breaches. With the rise…

Threat Actors Exploit the Aiohttp Bug to Locate Susceptible Networks

  The ransomware actor “ShadowSyndicate” was observed searching for servers that could be exposed to the aiohttp Python library’s directory traversal vulnerability, CVE-2024-23334.  Aiohttp is an open-source toolkit designed to manage massively concurrent HTTP requests without the need for conventional…

Innovative Web Automation Solutions Unveiled by Skyvern AI

  People can use Skyvern as more than just an automation tool; it’s a comprehensive solution that utilizes cutting-edge technologies such as large language models, computer vision, and proxy networks to streamline their online activities by leveraging cutting-edge technologies. Skyvern…

McDonald’s Attributes Worldwide Outage to Third-Party Provider

McDonald’s faced significant disruptions in its fast-food operations on Friday, attributing the widespread technical issues to a third-party provider rather than a cyber attack. The outage, which occurred during a “configuration change,” affected stores in various countries including the UK,…

Leak of Greek Diaspora Emails Shakes Government: A Closer Look

The recent leak of Greek diaspora emails has sent shockwaves through the conservative government of Prime Minister Kyriakos Mitsotakis. The scandal, which unfolded in March 2024, has raised questions about privacy, data protection, and political accountability. Let’s delve into the…

Private AI Chatbot Not Safe From Hackers With Encryption

AI helpers have assimilated into our daily lives in over a year and gained access to our most private information and worries.  Sensitive information, such as personal health questions and professional consultations, is entrusted to these digital companions. While providers…

Cyber Attacks Threaten Essential Services

  As per a recent report by BlackBerry, it was revealed that critical infrastructure providers faced a surge in cyberattacks during the latter part of 2023. Shockingly, these providers bore the brunt of 62% of all industry-related cyberattacks tracked from…

The Surge of FakeBat Malware in Search-Based Malvertising Campaigns

  In recent months, cybersecurity researchers have observed a concerning surge in search-based malvertising campaigns, with documented incidents nearly doubling compared to previous periods. Amidst this uptick in online threats, one particular malware variant has captured the attention of experts:…

International Initiative Targets Cybercrime

  The Cybercrime Atlas initiative has shifted into its operational phase in 2024, marking a significant milestone in global cybersecurity efforts. Originating from discussions at the RSA Conference two years prior, the initiative aims to dismantle cybercriminal networks by mapping…

Change Healthcare Detects Ransomware Attack Vector

  The cyberattack’s widespread destruction underscores how threat actors can do significant damage by targeting a relatively unknown vendor that serves a vital operational function behind the scenes. The AlphV ransomware group disrupted basic operations to the critical systems of…

Cyberattack is Wreaking Havoc on US HealthCare Providers.

  Following a cyberattack on the largest health insurer in the United States last month, health care providers are still scrambling as insurance payments and prescription orders continue to be disrupted, costing physicians an estimated $100 million each day.  According…

Latest SEC Cyber Rules Raise ‘Head Scratching’ Breach Disclosures

SEC disclosure mandate The Securities and Exchange Commission’s recently implemented cybersecurity regulations have prompted some breach disclosures from publicly traded firms, such as Microsoft and Hewlett Packard Enterprise. Among other things, the guidelines mandate that a “material” cybersecurity event be…

Security Flaws Discovered in ChatGPT Plugins

  Recent research has surfaced serious security vulnerabilities within ChatGPT plugins, raising concerns about potential data breaches and account takeovers. These flaws could allow attackers to gain control of organisational accounts on third-party platforms and access sensitive user data, including…

Crypto Phishing Scams: $47M Lost in February

  In February, cybercriminals orchestrated a series of sophisticated crypto phishing scams, resulting in a staggering $47 million in losses. These scams, often initiated through social media platforms like X (formerly Twitter), saw a dramatic 40% surge in victims compared…

Thinking of Stealing a Tesla? Just Use Flipper Zero

Researchers have found a new way of hijacking WiFi networks at Tesla charging stations for stealing vehicles- a design flaw that only needs an affordable, off-the-shelf tool. Experts find an easy way to steal a Tesla As Mysk Inc. cybersecurity…

Where is AI Leading Content Creation?

Artificial Intelligence (AI) is reshaping the world of social media content creation, offering creators new possibilities and challenges. The fusion of art and technology is empowering creators by automating routine tasks, allowing them to channel their energy into more imaginative…

Japan Blames Lazarus for PyPi Supply Chain Attack

  Japanese cybersecurity officials issued a warning that North Korea’s infamous Lazarus Group hacking group recently launched a supply chain attack on the PyPI software repository for Python apps.  Threat actors disseminated contaminated packages with names like “pycryptoenv” and “pycryptoconf”…

Rise in Phishing Attacks Targeting US Schools Raises Concerns

  Through a recent report by PIXM, a cybersecurity firm specialising in artificial intelligence solutions, public schools in the United States face a significant increase in sophisticated phishing campaigns. Threat actors are employing targeted spear phishing attacks, utilising stealthy patterns…

Scaleway Introduces First RISC-V Servers on the Cloud

  The world’s first line of RISC-V servers has been introduced by European cloud operator Scaleway, which claims this is a “firm commitment to technological independence” in a market where companies are increasingly vying for control over semiconductor production. The…

Technical Glitch Causes Global Disruption for Meta Users

  In a recent setback for Meta users, a widespread service outage occurred on March 5th, affecting hundreds of thousands worldwide. Meta’s spokesperson, Andy Stone, attributed the disruption to a “technical issue,” apologising for any inconvenience caused. Shortly after the…

CSI/NSA Joint Best Practices for Cloud Security

  The NSA and CISA have released a set of five cybersecurity bulletins to help make cloud environments safer. These bulletins share important tips for keeping cloud systems secure, which are used a lot by businesses.  Cloud services are popular…

TeamCity Software Vulnerability Exploited Globally

  Over the past few days a security breach has transpired, hackers are taking advantage of a significant flaw in TeamCity On-Premises software, allowing them to create unauthorised admin accounts. This flaw, known as CVE-2024-27198, has prompted urgent action from…

Former Google Employee Charged with Stealing AI Secrets

  A former Google software engineer has been charged with stealing the company’s artificial intelligence trade secrets while surreptitiously working for two Chinese companies, the Justice Department announced Wednesday.  Linwei Ding, a Chinese national, was arrested in Newark, California, for…

NSA Shares Key Strategies for Improved Network Security

  The National Security Agency (NSA) has rolled out a comprehensive roadmap to strengthen internal network security. Stepping away from the traditional trust-all model, the focus is on embracing a cutting-edge zero-trust framework. This transformative approach assumes the presence of…

United Health Allegedly Paid $22M Ransomware

Change Healthcare breach There is evidence that the ransomware group behind the Change Healthcare breach, which has caused chaos for hospitals and pharmacies attempting to handle prescriptions, may have received $22 million from UnitedHealth Group. Researchers studying security issues discovered…

Web3: A New Dawn for the Internet?

  In the fast-paced world of technology, a revolutionary concept is gaining traction: Web3. Coined by computer scientist Gavin Wood, Web3 represents a paradigm shift towards a decentralized internet infrastructure, powered by blockchain technology. The traditional internet, often referred to…