Tag: CySecurity News – Latest Information Security and Hacking Incidents

Effluence Backdoor: A Lingering Menace in Atlassian Confluence Servers

According to current cybersecurity developments, despite intensive efforts to patch vulnerabilities in Atlassian Confluence servers, the infamous Effluence backdoor remains a persistent danger. Because of this online shell’s invisibility and the possible threats it poses to companies, security experts and…

Report: Retailers Face Challenges in Coping with Ransomware Attacks

  In a disconcerting revelation, a recently released report suggests that retailers are finding themselves increasingly outmatched in the ongoing battle against ransomware operators. Conducted by cybersecurity experts Sophos, the survey enlisted the perspectives of 3,000 IT and cybersecurity leaders…

SysAid Ransomware: Unveiling the Zero-Day Menace

A zero-day ransomware attack has recently been reported on, affecting SysAid, a well-known provider of IT service management and help desk services. The cybersecurity community has been shaken by the occurrence, which has prompted swift response and a careful examination…

OpenAI Reveals ChatGPT is Being Attacked by DDoS

AI organization behind ChatGPT, OpenAI, has acknowledged that distributed denial of service (DDoS) assaults are to blame for the sporadic disruptions that have plagued its main generative AI product. As per the developer’s status page, ChatGPT and its API have…

Hackers Leaks Scraped LinkedIn Data of 35 Million Users

Threat actors have recently leaked personal information of over 35 million online users, by illicitly accessing a LinkedIn database. Apparently, the hackers are operating under the name ‘USDOD.’ The database, on the other hand, has been released in a popular…

How can You Protect Yourself From the Increasing AI Scams?

Recent years have witnessed a revolution in terms of innovative technology, especially in the field of Artificial Intelligence. However, these technological advancement has also opened new portals for cybercrime activities.  The latest tactic used by threat actors has been deepfakes,…

94% Deepfake Adult Content Targets Celebs

  The rapid progress in computer technology has ushered in remarkable strides in the realm of simulating reality. A noteworthy development has been the emergence of artificial intelligence (AI)-generated media, specifically videos adept at convincingly emulating real individuals. This phenomenon…

Dallas County Departments Hit by the Play Gang

  On Monday, an official confirmed that Dallas County experienced a cybersecurity incident earlier this month, which impacted segments of its network. Dallas County Judge Clay Lewis Jenkins stated in a release to Recorded Future News that an active investigation…

Increasing Data Security in the Digital Era

Protecting our online profile has become crucial in the current digital era. Keeping up with the most recent technologies and techniques is essential to safeguarding personal data and privacy in light of the constantly changing technological landscape. To assist you…

Socks5Systemz Proxy Service Impacts 10,000 Systems Globally

  A proxy botnet identified as ‘Socks5Systemz’ has been infecting computers across the globe with the ‘PrivateLoader’ and ‘Amadey’ malware loaders, with 10,000 infected devices currently.  The malware infects computers and transforms them into traffic-forwarding proxies for malicious, illegal, or…

Torrent Service Data Breach: What You Need to Know

  A significant data breach has affected one of the top pirate providers, according to recent developments. Security and safety issues about online torrenting platforms have been brought up by the breach, which was found by experts in cybersecurity. According…

5 Things to Consider Before Downloading an App

Apps have become an essential means in today’s world whether it comes to communication, shopping, gaming, research, or almost anything else. And since apps are being used so widely, it has also become popular for threat actors to use them…

How is Brave’s ‘Leo’ a Better Generative AI Option?

Brave Browser  Brave is a Chromium-based browser, running on Brave search engine, that restricted tracking for personal ads.  Brave’s new product – Leo – is a generative AI assistant, on top of Anthropic’s Claude and Meta’s Llama 2. Apparently, Leo…

Security Executives: Navigating Cyber Liability Risks

Businesses and organizations across all industries now prioritize cybersecurity as a top priority in an increasingly digital world. Following cyber threats and breaches, security executives are facing increasing liability issues, as reported in recent studies. In addition to highlighting the…

Shimano Suffers Cyberattack: 4.5 Terabytes Company Data Breached

Shimano, the market-leading cycling component manufacturer, has been the subject of a ransomware attack that has affected 4.5 terabytes of important company data.  The Japanese manufacturing has apparently been targeted by ransomware organization LockBit, who are threatening to expose the…

Google Introduces .ing Web Domains at a Hefty Cost

  Google has announced that the.ing web domain is now available for users who want to spice up their URL. There are numerous approaches to creating a good website. Quality design, engaging content, and responsive customer service are all important…

Google Completes Mobile-First Indexing After 7 Years

Google has finally announced that it has completed its mobile-first indexing initiative, which means that it will use the mobile version of websites for indexing and ranking purposes. This is a major change that affects how Google crawls, indexes, and…

AI’s Swift Impact on the IT Industry

The integration of Artificial Intelligence (AI) in the Information Technology (IT) industry is poised to bring about rapid and profound changes. As businesses seek to stay ahead in an increasingly competitive landscape, the adoption of AI technologies promises to revolutionize…

DarkGate Using its New Variant MSI to Harm Your System

  In the last month, the Netskope Threat Labs team noticed a big increase in malware being spread through SharePoint. This happened because some cyber attackers used Microsoft Teams and SharePoint to trick people into downloading the malware, called DarkGate.…

American Airlines Pilot Union Hit with Ransomware

On Monday, the Allied Pilots Association (APA), the preeminent labour union representing 15,000 dedicated pilots of American Airlines, revealed that its systems fell victim to a ransomware attack. Established in 1963, the APA stands as the foremost independent trade union…

PUMA Network: Unmasking a Cybercrime Empire

A massive cybercrime URL shortening service known as “Prolific Puma” has been uncovered by security researchers at Infoblox. The service has been used to deliver phishing attacks, scams, and malware for at least four years, and has registered thousands of…

GM Cruise Halts Driverless Operations

General Motors’ Cruise unit has suspended all driverless operations following a recent ban in California, halting their ambitious plans for a nationwide robotaxi service. The decision comes in response to a regulatory setback in California, a state known for its…

Prez Biden Signs AI Executive Order for Monitoring AI Policies

On November 2, US President Joe Biden signed a new comprehensive executive order detailing intentions for business control and governmental monitoring of artificial intelligence. The legislation, released on October 30, aims at addressing several widespread issues in regard to privacy…

Caesars Takes Action After Cyberattack on Loyalty Program Data

  Caesars Entertainment, a leading resort chain with ownership of more than 50 hotels and casinos worldwide, officially disclosed a cyberattack on their systems. The U.S. Securities and Exchange Commission received notification on Thursday, indicating that the company has experienced…

AI ‘Hypnotizing’ for Rule bypass and LLM Security

In recent years, large language models (LLMs) have risen to prominence in the field, capturing widespread attention. However, this development prompts crucial inquiries regarding their security and susceptibility to response manipulation. This article aims to explore the security vulnerabilities linked…

Contact Key Verification: Boosting iMessage Security

Apple has taken another significant step towards improving the security of its messaging platform, iMessage. The introduction of Contact Key Verification adds an extra layer of security to iMessage conversations, protecting user data and privacy. In this article, we will…

QR Code Phishing Attacks: A Rising Threat

Leading cybersecurity firms have reported a startling 587% increase in QR code-based phishing assaults in recent times. This concerning pattern demonstrates how fraudsters are changing their strategies to take advantage of people’s confidence in QR codes for a variety of…

Boeing Evaluates Cyber Group’s Data Dump Threat

  Boeing Co announced on Friday that it is currently evaluating a claim made by the Lockbit cybercrime group, which asserts that it has obtained a significant volume of sensitive data from the aerospace giant. The group has threatened to…

CISA Unveils Logging Tool to Aid Resource-Scarce Organizations

  The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has introduced a security tool named “Logging Made Easy” with the aim of assisting organizations, particularly those with limited resources, in safeguarding their Windows-based devices and sensitive information. This tool, provided…

Rising Healthcare Cyberattacks: White House Contemplates Response

  Amidst a continuous stream of cyberattacks targeting the healthcare sector, leading to disruptions in hospitals and patient care, the Biden administration is taking a measured approach in formulating regulations to bolster the industry’s cybersecurity defenses. Andrea Palm, Deputy Secretary…

Quishing Emerges as a Leading Cybersecurity Challenge

  Researchers are predicting that cybercriminals will employ email-based quashing attacks as a means of stealing data from users. Several quishing campaigns are known to have been large, long-running, and dynamic, based on attack cadence and variations within the lures…

iLeakage Attack: Protecting Your Digital Security

The iLeakage exploit is a new issue that security researchers have discovered for Apple users. This clever hack may reveal private data, including passwords and emails, and it targets Macs and iPhones. It’s critical to comprehend how this attack operates…

Passkeys vs Passwords: The Future of Online Authentication

  In the realm of online security, a shift is underway as passkeys gain traction among tech giants like Apple, Google, Microsoft, and Amazon.  These innovative authentication methods offer a more seamless login experience and bolster cybersecurity against threats like…

AI-Generated Phishing Emails: A Growing Threat

The effectiveness of phishing emails created by artificial intelligence (AI) is quickly catching up to that of emails created by humans, according to disturbing new research. With artificial intelligence advancing so quickly, there is concern that there may be a…