Despite the roaring advancement in the field of technology, phishing remains one of the most common cybersecurity hazards. According to recent studies, phishing losses in the US alone were $52 million. The lack of proper awareness in regards to cybersecurity…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Diwali Shopper Beware: Cyber Experts Uncover Fake Flipkart, Amazon Sites Exploiting Festive Fervor
CloudSEK’s threat research team has discovered a rise in malicious activities targeted at festive shoppers during the Diwali celebrations, which is a reminder of how vulnerable shoppers are to malicious activity. Cyber experts have noticed that phishing scams and…
Ongoing Cyberattack Hampers Operations at Tri-City Medical Center in Oceanside
Tri-City Medical Center continues to grapple with the repercussions of a cyberattack that commenced on Thursday morning, extending its impact for over 24 hours. In an update issued on Friday afternoon, the hospital management revealed that all elective medical procedures…
Hackers are Using Fake PC News Website to Distribute Infostealers
Researchers made an effort to warn users last year not to click on Google Ads in search results, but it appears those warnings went unheeded, as hackers continue to use malicious ads to infect unsuspecting users with malware. Malvertising,…
“Ransomware Alert: Clop Gang Targets Microsoft with Exploits on SysAid Zero-Day Vulnerability”
A new vulnerability in SysAid’s widely used IT service automation software has been discovered that lets hackers from a notorious ransomware gang exploit their software, says the software maker. As reported by Sasha Shapirov, CEO of SysAid, in a…
Apple Co-founder Says AI Could Make Cyber Scams ‘Harder to Spot’
Apple co-founder Steve Wozniak recently cautioned that artificial intelligence (AI) could result in making cyber scams and misinformation more challenging to recognize. Speaking to BBC, he further notes that technology may as well be harnessed by “bad actors.” According to…
Effluence Backdoor: A Lingering Menace in Atlassian Confluence Servers
According to current cybersecurity developments, despite intensive efforts to patch vulnerabilities in Atlassian Confluence servers, the infamous Effluence backdoor remains a persistent danger. Because of this online shell’s invisibility and the possible threats it poses to companies, security experts and…
Here’s How to Implement Generative AI for Improved Efficiency and Innovation in Business Processes
Global business practices are being revolutionised by generative artificial intelligence (AI). With the use of this technology, businesses can find inefficiencies, analyse patterns and trends in huge databases, and create unique solutions to challenges. In the business world of…
From Concealed to Revealed: Dark Web Slip-Up Exposes Ransomware Mastermind
A group of researchers responded to an ad offering the opportunity to join up with a RaaS operation and found themselves attending a cybercriminal job interview held by an organization that is one of the most active threat actors in…
Report: Retailers Face Challenges in Coping with Ransomware Attacks
In a disconcerting revelation, a recently released report suggests that retailers are finding themselves increasingly outmatched in the ongoing battle against ransomware operators. Conducted by cybersecurity experts Sophos, the survey enlisted the perspectives of 3,000 IT and cybersecurity leaders…
SysAid Ransomware: Unveiling the Zero-Day Menace
A zero-day ransomware attack has recently been reported on, affecting SysAid, a well-known provider of IT service management and help desk services. The cybersecurity community has been shaken by the occurrence, which has prompted swift response and a careful examination…
OpenAI Reveals ChatGPT is Being Attacked by DDoS
AI organization behind ChatGPT, OpenAI, has acknowledged that distributed denial of service (DDoS) assaults are to blame for the sporadic disruptions that have plagued its main generative AI product. As per the developer’s status page, ChatGPT and its API have…
Hackers Leaks Scraped LinkedIn Data of 35 Million Users
Threat actors have recently leaked personal information of over 35 million online users, by illicitly accessing a LinkedIn database. Apparently, the hackers are operating under the name ‘USDOD.’ The database, on the other hand, has been released in a popular…
Marna Bay Sands: Data of 665,000 Customers Hacked by Unknown Third Party
Singapore is renowned for maintaining stringent cybersecurity and data protection standards in the region. Companies in the country are keenly aware of their responsibility to safeguard cybersecurity, particularly concerning data privacy. In the event of cybersecurity incidents, organizations promptly…
Japan Aviation Electronics Hit by Cyberattack: Servers Accessed in Security Breach
A cyberattack orchestrated by the notorious ALPHV ransomware group has been reported as a direct result of the catastrophic impact on the Japanese Aviation Electronics Industry (JAE). The BlackCat hackers have also been blamed for the attack. It was…
Genetic Data Security Strengthened with Two-Factor Authentication
Data security is a major worry in this era of digitization, particularly with regard to sensitive data like genetic information. Major genetic testing companies have recently strengthened the security of their users’ data by making two-factor authentication (2FA) the standard…
Google to Label Android VPNs Clearing a Security Audit
Google hopes that better badging alerting to independent audits will help Android users in finding more trustworthy VPN apps. The ad giant and cloud provider has given independently audited apps in its Play store a more visible display of…
US Government Surveillance Reform Act (GSRA), What It Will Change?
A cross-party group of U.S. legislators has put forth fresh legislation aimed at limiting the extensive surveillance authority wielded by the FBI. They argue that the bill addresses the gaps that currently enable officials to access Americans’ data without…
How can You Protect Yourself From the Increasing AI Scams?
Recent years have witnessed a revolution in terms of innovative technology, especially in the field of Artificial Intelligence. However, these technological advancement has also opened new portals for cybercrime activities. The latest tactic used by threat actors has been deepfakes,…
From Boom to Bust: WeWork’s Bankruptcy Filing Sends Shockwaves
According to authorities, WeWork filed for Chapter 11 bankruptcy protection in the federal court of New Jersey on Monday, reporting that it had entered into agreements with more than 80% of its secured noteholders and that it intends to…
Modern Cryptographic Methodologies Are Essential for Cybersecurity
Robust cybersecurity measures are more important than ever in a time when technological breakthroughs rule the day. A major risk to an organization’s security is outdated cryptographic protocols, which make it open to cyberattacks. According to recent reports, organizations must…
Smart Car Dread: Mozilla Reports Tested Cars Failed Privacy Regulations, User Data at Risk
Mozilla Reveals Tested Cars Failed Privacy Regulations Mozilla recently disclosed that all 25 car brands it tested failed its privacy standards. While all, according to Mozilla, went overboard in their data collection and use rules, some even had disclaimers about…
Novel GootLoader Malware Strain Bypasses Detection and Spreads Quickly
GootBot, a new variant of the GootLoader malware, has been detected to enable lateral movement on compromised systems and avoid detection. Golo Mühr and Ole Villadsen of IBM X-Force said that the GootLoader group introduced their own custom bot…
94% Deepfake Adult Content Targets Celebs
The rapid progress in computer technology has ushered in remarkable strides in the realm of simulating reality. A noteworthy development has been the emergence of artificial intelligence (AI)-generated media, specifically videos adept at convincingly emulating real individuals. This phenomenon…
Cryptocurrency Engineers Targeted by New macOS Malware ‘KandyKorn’
A newly identified macOS malware called ‘KandyKorn’ has been discovered in a cyber campaign linked to the North Korean hacking group Lazarus. The targets of this attack are blockchain engineers associated with a cryptocurrency exchange platform. The attackers are…
Dallas County Departments Hit by the Play Gang
On Monday, an official confirmed that Dallas County experienced a cybersecurity incident earlier this month, which impacted segments of its network. Dallas County Judge Clay Lewis Jenkins stated in a release to Recorded Future News that an active investigation…
Group-IB Uncovered Farnetwork’s Ransomware-as-a-Service Business Model
In recent findings, cybersecurity experts have uncovered a significant player in the world of cyber threats, known as “farnetwork”. This individual has been tied to five separate cyber attack programs within the last four years, showcasing a high level…
Unpacking the Latest Okta Breach, What All You Need to Know
Okta stated on Friday that the recent breach at the digital identity management services provider, which resulted in the targeting of some of its customers, likely occurred when an employee logged into a personal Google account using a company…
Critical Flaw in Atlassian’s Confluence Server Allows Hackers to Run Commands
According to experts, a severe flaw in Atlassian’s Confluence corporate server program that permits malicious commands and resets servers is actively exploited by threat actors in cyber attacks that install ransomware. Glenn Thorpe, senior director of security research and detection…
KandyKorn: Apple MacOS Malware Targets Blockchain Engineers of Crypto Exchange Platform
A new malware linked to the North Korean threat group Lazarus was discovered on Apple’s macOS, and it appears that it was intended for the blockchain engineers of a crypto exchange platform. KandyKorn Malware According to a study conducted by…
Increasing Data Security in the Digital Era
Protecting our online profile has become crucial in the current digital era. Keeping up with the most recent technologies and techniques is essential to safeguarding personal data and privacy in light of the constantly changing technological landscape. To assist you…
British Library Hit by Cyber Incident, Disrupting Services
The British Library in London, known for its serene study environment and vast collection of 170 million items, has been disrupted by a “cyber incident.” This event has led to the shutdown of its website, impeding access to the…
Unlocking the Shadows: New Research Reveals AI’s Hidden Role in Unofficial Financial Markets
A bot was seen making an illegal purchase of stocks using made-up insider information at the UK’s AI safety summit in a demonstration that showed just how useful AI can be. The company denied the fact that it had…
Socks5Systemz Proxy Service Impacts 10,000 Systems Globally
A proxy botnet identified as ‘Socks5Systemz’ has been infecting computers across the globe with the ‘PrivateLoader’ and ‘Amadey’ malware loaders, with 10,000 infected devices currently. The malware infects computers and transforms them into traffic-forwarding proxies for malicious, illegal, or…
Medusa Ransomware Group Takes Ownership for Cyber-attack on Canadian Psychological Association
The Canadian Psychological Association (CPA), the main official body for psychologists in Canada, is said to have been the target of a cyberattack by the infamous Medusa ransomware group. The recent incident points out the rising risk posed by threat…
Torrent Service Data Breach: What You Need to Know
A significant data breach has affected one of the top pirate providers, according to recent developments. Security and safety issues about online torrenting platforms have been brought up by the breach, which was found by experts in cybersecurity. According…
Notorious Ransomware Gang Claims Responsibility for Cyberattack on Southwestern Ontario Hospitals
A notorious cybercrime gang known as Daixin Team has publicly admitted to pilfering millions of records from five hospitals in southern Ontario, subsequently leaking the data online when their ransom demands were not met. The targeted hospitals include those…
5 Things to Consider Before Downloading an App
Apps have become an essential means in today’s world whether it comes to communication, shopping, gaming, research, or almost anything else. And since apps are being used so widely, it has also become popular for threat actors to use them…
Google Introduces Badges to Identify Which VPN App has Passed a Security Audit
Google has recently confirmed that they will be introducing an Independent Security Review badge to identify Android VPN apps that have undergone an independent security assessment, taking into account the concerns of users regarding Android cybersecurity. The App Defense Alliance…
American Airlines Pilot Union Targeted in a Major Ransomware Attack
In the wake of the most recent in a string of cyberattacks that have affected the aviation sector, the American Airlines pilot union is attempting to restore its systems. On October 30, the union, which is in charge of…
Phishing Scare at Bitfinex: Employee Breach Exposes Users to Cyber Threats
A phishing attack was carried out on one of Bitfinex’s customer service representatives earlier this week, which resulted in a minor security incident. It was determined that the attack was not a virus, but rather a phishing attack. The…
US Focus on Cybersecurity, But Contractors Lag Behind in Preparedness
The leaders of the Five Eyes, a coalition of English-speaking intelligence agencies, have emphasized the critical nature of safeguarding sensitive information in cyberspace, especially in light of the escalating tensions with The People’s Republic of China, which they have…
How is Brave’s ‘Leo’ a Better Generative AI Option?
Brave Browser Brave is a Chromium-based browser, running on Brave search engine, that restricted tracking for personal ads. Brave’s new product – Leo – is a generative AI assistant, on top of Anthropic’s Claude and Meta’s Llama 2. Apparently, Leo…
Here’s How RegTech is Transforming India’s Regulatory Landscape
Businesses in India finish their GST returns for the month on the 20th of each month, believing their compliance work for the month is finished. However, they soon receive automated notices pointing out inconsistencies in their reporting. This procedure…
How Blockchain Technology Can Reshape Systems Via Computer Vision?
Blockchain technology vows to bring transformative changes in several sectors. Via ‘computer vision’ integration, blockchain has the potential to enhance the abilities of computer vision in several ways. This blog provides a detailed look at the benefits of integrating blockchain…
Security Executives: Navigating Cyber Liability Risks
Businesses and organizations across all industries now prioritize cybersecurity as a top priority in an increasingly digital world. Following cyber threats and breaches, security executives are facing increasing liability issues, as reported in recent studies. In addition to highlighting the…
Worldwide Alliance: 50 Countries Join Forces Against Ransomware Attacks
The technology giant has launched a new initiative in response to six high-profile cyberattacks that exploited different aspects of Microsoft’s security and cloud infrastructure in the past few years, which aimed to revamp the company’s approach to software security…
Impersonation Attack: Cybercriminals Impersonates AUC Head Using AI
Online fraudsters, in another shocking case, have used AI technology to pose as Moussa Faki Mahamat, the chairman of the African Union Commission. This bold cybercrime revealed gaps in the African Union (AU) leadership’s communication channels as imposters successfully mimicked…
Shimano Suffers Cyberattack: 4.5 Terabytes Company Data Breached
Shimano, the market-leading cycling component manufacturer, has been the subject of a ransomware attack that has affected 4.5 terabytes of important company data. The Japanese manufacturing has apparently been targeted by ransomware organization LockBit, who are threatening to expose the…
Google Introduces .ing Web Domains at a Hefty Cost
Google has announced that the.ing web domain is now available for users who want to spice up their URL. There are numerous approaches to creating a good website. Quality design, engaging content, and responsive customer service are all important…
Wearable Tech Evolution: Google Integrates Heart Rate Monitoring into ANC Earbuds
It has been made clear by Google that they have made rapid progress in developing technology that will allow users to make a significant upgrade to their existing true wireless earbuds. Wireless earbuds might be able to integrate heart…
China Sets Sights on ‘Unlawful’ Weather Stations in Spy Hunting Campaign
China is intensifying efforts to counter foreign espionage activities through a crackdown on weather stations believed to be spying for other countries. The Ministry of State Security, China’s civilian spy agency, announced the discovery of hundreds of illegal meteorological…
Nym’s Decentralized VPN: A Game-Changer for Online Privacy
Nym, a privacy technology company, is getting ready to introduce a decentralized VPN (Virtual Private Network) that aims to completely change how we safeguard our online data and preserve our privacy in a quickly changing digital environment where online privacy…
Google Completes Mobile-First Indexing After 7 Years
Google has finally announced that it has completed its mobile-first indexing initiative, which means that it will use the mobile version of websites for indexing and ranking purposes. This is a major change that affects how Google crawls, indexes, and…
AI’s Swift Impact on the IT Industry
The integration of Artificial Intelligence (AI) in the Information Technology (IT) industry is poised to bring about rapid and profound changes. As businesses seek to stay ahead in an increasingly competitive landscape, the adoption of AI technologies promises to revolutionize…
Meta Extends Ad-Free Facebook and Instagram Premium Access Worldwide
With the introduction of its ad-free subscription service, Meta, the parent company of Facebook and Instagram, offers European users the chance to enjoy their favourite social platforms without being bombarded with advertisements. The recent ruling of the EU’s Court of…
DarkGate Using its New Variant MSI to Harm Your System
In the last month, the Netskope Threat Labs team noticed a big increase in malware being spread through SharePoint. This happened because some cyber attackers used Microsoft Teams and SharePoint to trick people into downloading the malware, called DarkGate.…
Atlassian Warns of Critical Confluence Vulnerability Resulting in Data Loss
Just weeks after state-backed hackers targeted its products, Australian software giant Atlassian has warned of a critical security flaw that could result in “significant data loss” for customers. The company issued an advisory this week urging clients to patch…
American Airlines Pilot Union Hit with Ransomware
On Monday, the Allied Pilots Association (APA), the preeminent labour union representing 15,000 dedicated pilots of American Airlines, revealed that its systems fell victim to a ransomware attack. Established in 1963, the APA stands as the foremost independent trade union…
Phone Scammers Evolve: AI-Powered Voice Mimicry Poses New Threat
In an ever-evolving battle against phone scammers and robocalls, a growing concern is the use of artificial intelligence (AI) to mimic victims’ voices, making these scams even more convincing. While efforts have been made to curb scam calls, it’s…
SEC Sets New Disclosure Rules: Read How It Will Revolutionize Organization Cybersecurity
SEC mandates cybersecurity reporting for companies The Securities and Exchange Commission’s (SEC) latest set of rules on cybersecurity reporting for publicly traded organisation can be understood in two ways. One, as another generic regulatory formality piling on the companies, or…
PUMA Network: Unmasking a Cybercrime Empire
A massive cybercrime URL shortening service known as “Prolific Puma” has been uncovered by security researchers at Infoblox. The service has been used to deliver phishing attacks, scams, and malware for at least four years, and has registered thousands of…
Hacker Threat: Israeli Police Advise Citizens not to Answer Unknown Calls
The Israeli Police and the National Cyber Directorate have advised citizens against answering unexpected WhatsApp calls from abroad. This is because it may be a sign of an attempt to hack a phone. Authorities claim that a high volume…
SEC’s Legal Action Against SolarWinds and CISO Creates Uncertainty in Cybersecurity
In the lawsuit, the plaintiffs allege that CISO Timothy Brown, who was in charge of managing the company’s software supply chain at the time of the massive cyberattack, has failed to disclose critical information regarding the attack. Several government…
The FTC’s new Amendment Requires Financial Institutions to Report Security Breaches Within 30 Days
The Federal Trade Commission has recently enacted an amendment that mandates non-banking entities to notify the Federal Trade Commission of specific data breaches along with other security incidents. This mandate requires the creation, execution, and upkeep of an extensive security…
GM Cruise Halts Driverless Operations
General Motors’ Cruise unit has suspended all driverless operations following a recent ban in California, halting their ambitious plans for a nationwide robotaxi service. The decision comes in response to a regulatory setback in California, a state known for its…
Uber’s Costly Mistake: AUS$412,500 Fine for Spam Emails in Australia
There are many services offered by Uber Technologies, Inc., commonly known as Uber, which is a multinational company that offers a wide array of services, like ride-hailing, food delivery, and freight transportation, to its customers. Founded in California, the…
Prez Biden Signs AI Executive Order for Monitoring AI Policies
On November 2, US President Joe Biden signed a new comprehensive executive order detailing intentions for business control and governmental monitoring of artificial intelligence. The legislation, released on October 30, aims at addressing several widespread issues in regard to privacy…
Citrix Bleed Bug Delivers Sharp Blow: Vulnerability is Now Under “Mass Exploitation”
Citrix Bleed Bug: A Critical Vulnerability in Widespread Use Despite the fact that a patch has been available for three weeks, ransomware hackers are exploiting a vulnerability that allows attackers to bypass multifactor authentication and access enterprise networks using Citrix…
Hackers for Hire: Navigating the Dark Web, Penetration Tests, and More
As the digital landscape undergoes transformation, it is imperative for organizations to remain vigilant in the face of a persistent threat from for-hire hackers. To safeguard their networks, customers, and financial stability, organizations must comprehend the risks associated with…
Caesars Takes Action After Cyberattack on Loyalty Program Data
Caesars Entertainment, a leading resort chain with ownership of more than 50 hotels and casinos worldwide, officially disclosed a cyberattack on their systems. The U.S. Securities and Exchange Commission received notification on Thursday, indicating that the company has experienced…
Five Markers that Your Phone is Being Spied on or Has Been Compromised
A notification stating that “State-sponsored attackers may be targeting your iPhone” was received by a number of leaders of India’s opposition parties, including the Indian National Congress, Trinamool Congress, and Shiv Sena, earlier this week. A commotion and discussion…
North Korean Links: Lazarus Group Strikes Again. This time via Unpatched Software Flaws
North Korean hackers spreading malware through legit software North Korean hackers are spreading malware by exploiting known flaws in genuine software. The Lazarus group targets a version of an undisclosed software product for which vulnerabilities have been documented and solutions…
AI ‘Hypnotizing’ for Rule bypass and LLM Security
In recent years, large language models (LLMs) have risen to prominence in the field, capturing widespread attention. However, this development prompts crucial inquiries regarding their security and susceptibility to response manipulation. This article aims to explore the security vulnerabilities linked…
Security Experts Warn Social Media Users of Account Takeover
Anyone with a social media account has been warned that criminals are increasingly targeting common people and taking over their profiles. According to Action Fraud, the national fraud and cybercrime reporting service, there were 18,011 reports of social media…
Study Finds: Online Games are Collecting Gamers’ Data Using Dark Designs
A recent study conducted by researchers, at Aalto University Department of Science, has revealed a dark design pattern in online games in the privacy policies and regulations which could be used in a dubious data collection tactic of online gamers.…
Unlocking Key Stretching: Safeguarding Your Passwords for Enhanced Security
To bolster the security of our digital accounts, it’s imperative to fortify our passwords or passphrases. Much like how keys and locks can be vulnerable, not all passwords provide ample protection. Security experts have devised various techniques to bolster…
Defending Digital Fortresses: How Greater Manchester Fends off 10,000 Daily Cyber Assaults
Cyber hackers are targeting the council’s systems at a rate of ‘10,000 a day’, leading to threats to its software and systems by higher-ups. It has been agreed by councillors in Oldham that they will spend £682,000 on acquiring…
Unlocking the Future: How Multimodal AI is Revolutionizing Technology
In order to create more accurate predictions, draw insightful conclusions and draw more precise conclusions about real-world problems, multimodal AI combines multiple types or modes of data to create more reliable determinations, conclusions or predictions based on real-world data. …
Contact Key Verification: Boosting iMessage Security
Apple has taken another significant step towards improving the security of its messaging platform, iMessage. The introduction of Contact Key Verification adds an extra layer of security to iMessage conversations, protecting user data and privacy. In this article, we will…
Ushering Into New Era With the Integration of AI and Machine Learning
The incorporation of artificial intelligence (AI) and machine learning (ML) into decentralised platforms has resulted in a remarkable convergence of cutting-edge technologies, offering a new paradigm that revolutionises the way we interact with and harness decentralised systems. While decentralised…
QR Code Phishing Attacks: A Rising Threat
Leading cybersecurity firms have reported a startling 587% increase in QR code-based phishing assaults in recent times. This concerning pattern demonstrates how fraudsters are changing their strategies to take advantage of people’s confidence in QR codes for a variety of…
StripedFly: Cryptomining Tool Infects 1 Million Targets Worldwide
Security firm Kaspersky Lab has revealed that a cryptominer, which never really generated a hefty crypto amount for its operators, is now a part of a bigger digital espionage campaign. Since 2017, the platform, known as StripedFly, has infected over…
Boeing Evaluates Cyber Group’s Data Dump Threat
Boeing Co announced on Friday that it is currently evaluating a claim made by the Lockbit cybercrime group, which asserts that it has obtained a significant volume of sensitive data from the aerospace giant. The group has threatened to…
Rishi Sunak Outlines Risks and Potential of AI Ahead of Tech Summit
UK Prime Minister Rishi Sunak has warned against the use of AI, as it could be used to design chemical and biological weapons. He says that, in the worst case scenario, people are likely to lose all control over AI,…
CISA Unveils Logging Tool to Aid Resource-Scarce Organizations
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has introduced a security tool named “Logging Made Easy” with the aim of assisting organizations, particularly those with limited resources, in safeguarding their Windows-based devices and sensitive information. This tool, provided…
India’s DPDP Act: Industry’s Compliance Challenges and Concerns
As India’s Data Protection and Privacy Act (DPDP) transitions from proposal to legal mandate, the business community is grappling with the intricacies of compliance and its far-reaching implications. While the government maintains that companies have had a reasonable timeframe to…
Kraken to Provide 42,000 Consumers’ Data with IRS Following Court Order
Kraken, a cryptocurrency exchange, has announced that it will comply with a June court order by providing the Internal Revenue Service (IRS) with data on tens of thousands of its users. In particular, the company will divulge data on…
CCleaner Data Privacy at Risk: MOVEit Mass-Hack Exposes User Information
It has come to light that the popular PC optimization app CCleaner has been compromised by hackers following a massive data breach associated with the MOVEit service. According to the company, there was no breach of sensitive data that…
Xtreme: Flipper Zero can Spam Android, Windows Devices with Bluetooth Alerts
Xtreame, a custom Flipper Zero Zeo firmware has recently introduced a new feature to conduct Bluetooth spam assaults on Windows and Android devices. The technique was first demonstrated by a security researcher against Apple iOS devices, which encouraged others to…
Rising Healthcare Cyberattacks: White House Contemplates Response
Amidst a continuous stream of cyberattacks targeting the healthcare sector, leading to disruptions in hospitals and patient care, the Biden administration is taking a measured approach in formulating regulations to bolster the industry’s cybersecurity defenses. Andrea Palm, Deputy Secretary…
Shadow AI: The Novel, Unseen Threat to Your Company’s Data
Earlier this year, ChatGPT emerged as the face of generative AI. ChatGPT was designed to help with almost everything, from creating business plans to breaking down complex topics into simple terms. Since then, businesses of all sizes have been…
Quishing Emerges as a Leading Cybersecurity Challenge
Researchers are predicting that cybercriminals will employ email-based quashing attacks as a means of stealing data from users. Several quishing campaigns are known to have been large, long-running, and dynamic, based on attack cadence and variations within the lures…
iLeakage Attack: Protecting Your Digital Security
The iLeakage exploit is a new issue that security researchers have discovered for Apple users. This clever hack may reveal private data, including passwords and emails, and it targets Macs and iPhones. It’s critical to comprehend how this attack operates…
Rorschach Ransomware Gang Targets Chilean Telecom Giant GTD
Chile’s Grupo GTD has issued a warning that a hack has disrupted its Infrastructure as a Service (IaaS) infrastructure. Grupo GTD is a telecommunications firm based in Chile, Spain, Columbia, and Peru which offers services throughout Latin America. The…
Passkeys vs Passwords: The Future of Online Authentication
In the realm of online security, a shift is underway as passkeys gain traction among tech giants like Apple, Google, Microsoft, and Amazon. These innovative authentication methods offer a more seamless login experience and bolster cybersecurity against threats like…
AI-Generated Phishing Emails: A Growing Threat
The effectiveness of phishing emails created by artificial intelligence (AI) is quickly catching up to that of emails created by humans, according to disturbing new research. With artificial intelligence advancing so quickly, there is concern that there may be a…
From China To WikiLeaks: Censored Texts Survive In Bitcoin And Ethereum
Bitcoin is described by individuals in varied way, some say it is digital money currency, a digital store of value and a platform for data that is immune to censorship. Fundamentally, anyone can access and upload data, thanks to technology;…
Enhancing Online Privacy: Google Trials IP Address Masking Option
Currently, Google is in the process of perfecting Gnatcatcher, which used to be called Gnatcatcher. Under the new name “IP Protection,” Gnatcatcher is called more appropriately. By doing this, Chrome is reintroducing a proposal to hide users’ IP addresses,…
Okta Data Breach Highlights Hackers’ Untapped Gold Mine
The recent data breach at tech firm Okta has drawn attention to the risks associated with not protecting data that is rarely given top priority in terms of security, records customer service. The help desk system, which is used by…