The Biden administration is looking for malware that may jeopardise military and civilian power grids, communications systems, and water supplies, the New York Times reported. The malware, which is believed to have been installed by Chinese hackers linked to…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Clop Ransomware Adopts Torrents for Data Leaks in Effort to Evade Detection
The Clop ransomware group has once again adjusted its tactics for extortion, now employing torrents to disseminate stolen information obtained from MOVEit attacks. Beginning on May 27th, the Clop ransomware syndicate initiated a series of data theft assaults by…
Generative AI Has an Increasing Effect on the Workforce and Productivity
In a recent report published by KPMG, it was revealed that an overwhelming 97% of participants anticipate a significant or exceedingly substantial influence of generative AI on their respective organizations within the upcoming 12 to 18 months. Furthermore, the survey…
Cybersecurity Companies Offer Technology Stack Incorporating Zero Trust Edge
The rapid surge in cyberattacks delivering destructive payloads, including ransomware, is due to organisations’ complacency with legacy IAM, VPN, and perimeter-based network security systems. CISOs tell VentureBeat that hardware-based systems, which were never intended to guard beyond perimeters, are…
A Software Vulnerability in AMD’s Chip Compromises Tesla’s Paid Features
There is an AMD-based infotainment system vulnerability that can be exploited by researchers from the Technical University of Berlin to unlock restricted vehicle features, according to research. As a result, it has become particularly noticeable in vehicles that provide…
Worldcoin’s Verification Process Under Scrutiny After CertiK’s Discovery
Blockchain security company CertiK recently revealed a severe flaw that put the Worldcoin system at serious risk. The system’s security and integrity might have been compromised if the vulnerability allowed Orb operators unrestricted access. Users’ iris information was collected as…
Autonomous-Car Technology May Possess a Threat to Privacy
Self-driving, which was only possible in science fiction has now become something very common, a reality for people in San Francisco. Other places too, in the US, have been testing the technology. However, with new innovation comes its consequences. Here,…
How to Tell if a Company Is Selling Your Email Address
Have you ever signed up for a new website and then all of a sudden started getting emails from businesses and service providers you had never heard of? If so, there is a very good chance that your data…
Hospitals Paralyzed by Cyberattack, Emergency Services Diverted
Several hospitals in Pennsylvania and California were compelled to close their emergency departments and redirect incoming ambulances due to a recent uptick in cyberattacks, which created a frightening situation. The hack, which targeted the healthcare provider Prospect Medical Holdings, has…
Amazon Executive Lacks Data for Return-to-Office Mandate
Amazon employees are expressing discontent over the company’s recent decision to revoke remote work flexibility, and the situation has been exacerbated by comments made by a senior executive. During an internal staff meeting, Mike Hopkins, the SVP of Amazon…
Worldcoin’s Iris-Scanning Technology: A Game-Changer or a Privacy Concern
Worldcoin, a cryptocurrency and digital ID project co-founded by OpenAI CEO Sam Altman, has recently announced its plans to expand globally and offer its iris-scanning and identity-verification technology to other organizations. The company, which launched last week, requires users to…
Tricky Malware Uses Versioning to Outsmart Google Play Store Scanners
In recent developments, threat actors are using a technique known as “versioning” to evade Google Play Store’s malware detection mechanisms, posing a significant risk to Android users. This method allows them to specifically target users and compromise their sensitive information,…
Hackers Have Scored Unlimited Airline Miles, Targeting One Platform
TRAVEL REWARDS PROGRAMS, such as those provided by hotels and airlines, highlight the unique benefits of joining their club over others. However behind the scenes, several of these programs—including Delta SkyMiles, United MileagePlus, Hilton Honors, and Marriott Bonvoy—share the same…
US Senators Propose Privacy Reform to Tame Artificial Intelligence
The US Senate is now debating the necessity for privacy legislation in light of the development of generative artificial intelligence (AI). While AI businesses like OpenAI and Google continue to create and use cutting-edge technologies, lawmakers are wrestling with…
Contemplating Import Restrictions for PCs and Laptops to Secure Digital Infrastructure
Although it is common practice for the government to introduce new policies hurriedly, especially when it comes to the recent licensing requirement for all-in-one personal computers (PCs), laptops, tablets, and servers, it was pushed three months back to 1…
Hacktivists Embrace Cybercrime Tactics for Funding
Hacktivism, the fusion of hacking and activism, has become an increasingly prevalent form of online protest and advocacy. While hacktivists are driven by social or political motivations, it is crucial to understand that some of these individuals or groups fund…
With CISOs’ Evolved Roles, They Must Also Evolve Their Ways
Evolving Role of CISO Before the rapid development and popularity of digitization, the role of CISO (Chief Information Security Officer) was constrained to just being a part of IT teams, directing IT staff and planning cybersecurity defense. Regardless of conducting…
Artificial Intelligence Contributes to Escalating Ransomware Threats
Cybercriminals have always had the advantage in the perpetual battle between defenders and cyber criminals. They have been unchallenged for many years. In many ways, workers at these companies can automate many of their tasks. This is especially pertinent…
Microsoft’s Security Practices Under Fire: Is the Azure Platform Safe
Allegations against Microsoft’s security practices Microsoft has recently come under fire for its security practices, with critics claiming that the Azure platform is “worse than you think.” According to an article on TechSpot, Tenable CEO Amit Yoran has criticized Microsoft…
Unlocking the ChatGPT Plus and Code Interpreter Add-On’s Capabilities
For its popular ChatGPT service, OpenAI initially introduced third-party software application plug-ins back in March. These plug-ins let customers expand ChatGPT’s capability to perform tasks like reading complete PDFs. The business announced this week that all of its ChatGPT…
Safeguard Your Home Against Rising Cyber Threats, Here’s All You Need To Know
Malicious cyber actors have the ability to exploit vulnerable networks within households, potentially compromising personal and private information of family members, including children and elders. In today’s highly connected world, it is crucial to prioritize cybersecurity and take proactive…
Worldcoin Suspended in Kenya as Thousands Queue For Free Money
Kenya’s government recently issued an order to cryptocurrency initiative Worldcoin, directing them to halt the registration of fresh users due to concerns regarding data privacy. During this week, a significant number of Kenyan citizens have been lining up at…
Burger King’s Data Breach Exposes Sensitive Credentials
Burger King, a well-known fast food restaurant famous for its flame-grilled foods, recently experienced a serious data security breach that made private login information public. This occurrence has raised concerns regarding the organization’s cybersecurity procedures and the potential risks connected…
Europe’s AI Regulation Against AI Era
In a momentous UN summit held in Geneva on July 7, 2023, Doreen Bodgan-Martin, the Secretary-General of the International Telecommunications Union, proclaimed the arrival of the AI era. This declaration followed the European Union’s groundbreaking AI regulation, which has…
Security Alert: Google AMP Used in Evasive Phishing Attacks
In recent times, there has been an increase in phishing activity that abuses Google Accelerated Mobile Pages (AMP) to bypass email security measures and get to the inboxes of enterprise employees. This has been a cause of concern for security…
US House Panel Launches Probe Into China’s US Gov Email Hack
The recent email system hacks at the Commerce and State departments, which China may have been engaged in, are the subject of an inquiry, the U.S. House of Representatives Oversight Committee revealed on Wednesday. Representative James Comer, chair of…
New Malware can Allow Control of macOS Without Users Noticing
Cybersecurity company Guardz recently exposed a new malware, used by hackers to take control of unprotected Macs, remotely. Guardz describes how a threat agent has been selling the tool on a Russian cybercrime forum since April 2023 in a blog…
Hidden Camera Invasion Alert: Holiday Rentals Discovered with a Disturbing Surge
Recently, it was found that one out of 10 owners of holiday rental properties install hidden cameras or microphones within their properties. This is when they are rented out on sites such as Airbnb. It is believed that seven…
FBI Alerts: Hackers Exploit AI for Advanced Attacks
The Federal Bureau of Investigation (FBI) has recently warned against the increasing use of artificial intelligence (AI) in cyberattacks. The FBI asserts that hackers are increasingly using AI-powered tools to create sophisticated and more harmful malware, which makes cyber defense…
Schools: Prime Targets for Hackers Amid Poor Cybersecurity and Ransom Payments
New data indicates that school districts have become highly susceptible to online exploitation, emerging as the primary target for hackers. According to a recent global survey conducted by the British cybersecurity company Sophos, a staggering 80% of schools experienced…
Data Leak from Far-Right Forum Poast Reveals Daycare Owner with Nazi Avatar
In May of this year, Poast, a far-right social media forum, experienced a data breach that resulted in the leak of thousands of email addresses, usernames, and direct messages. Poast is a federated social network that functions similarly to Mastodon…
Security Concerns Escalate as Unsafe VPNs Pose Major Threat to Businesses
New research conducted by Zscaler has revealed that an overwhelming majority of organizations worldwide are facing a significant issue with unsafe Virtual Private Networks (VPN). According to the report, a staggering 88% of these organizations expressed deep concerns about the…
Report: Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’
According to a report by The New York Times on Saturday, the Biden administration has raised concerns about China’s alleged implantation of malware into crucial US power and communications networks. The officials fear this could act as a “ticking…
Germany Admits Investigating Worldcoin’s Eye-Scanning Orb
Privacy issues with the Worldcoin cryptocurrency project, a venture by OpenAI CEO Sam Altman has been in talks since the announcement of its official launch. Several countries have now started considering its potential threats and are looking into the issue…
AI Experts Unearth Infinite ways to Bypass Bard and ChatGPT’s Safety Measures
Researchers claim to have discovered potentially infinite ways to circumvent the safety measures on key AI-powered chatbots like OpenAI, Google, and Anthropic. Large language models, such as those used by ChatGPT, Bard, and Anthropic’s Claude, are heavily controlled by…
Unprecedented Data Breach: Millions Impacted by Personal Information Theft via Website Error
Tech support scams have become increasingly popular over the past few years. Scammers use scare tactics to get you to pay for unnecessary technical support services to fix supposedly unproblematic equipment or software. In most cases, scammers try to…
Fake Android App Enables Hackers to Steal Signal and WhatsApp User Data
Cybercriminals have recently developed a highly sophisticated approach to breach the security of both WhatsApp and Signal users, which is concerning. By using a phony Android conversation app, cybercriminals have been able to obtain user information from gullible individuals. There…
CISOs Leading Cyber Risk Engagement with C-Suite & Board
In a significant move to enhance cybersecurity measures, the Securities and Exchange Commission (SEC) has recently approved new regulations. These rules mandate that public companies must promptly disclose any cybersecurity breaches within a strict four-day timeframe. Additionally, the SEC…
White House Panel Recommends Restricting the FBI’s Access to spy Data
A team of national security experts created by the Biden administration has advised that the FBI be restricted from accessing surveillance data that captures communications by Americans. The Presidential Intelligence Advisory Board gave the basis for this proposal as frequent…
Designers Still Have an Opportunity to Get AI Right
As ChatGPT attracts an unprecedented 1.8 billion monthly visitors, the immense potential it offers to shape our future world is undeniable. However, amidst the rush to develop and release new AI technologies, an important question remains largely unaddressed: What…
Here’s How Microsoft Fought Against Ireland’s HSE Attackers
Hackers exploited the victim’s infected computer to access Ireland’s public health system and tunnel across the network for weeks after luring a worker with a phishing email and a spreadsheet that was laced with malware. Infecting thousands of more…
Blocking Access to AI Apps is a Short-term Solution to Mitigate Safety Risk
Another major revelation in regard to ChatGPT recently came to light through research conducted by Netskope. According to their analysis, business organizations are experiencing about 183 occurrences of sensitive data being posted to ChatGPT for every 10,000 corporate users each…
The BleedingPipe RCE Exploit Presents Minecraft With a New Security Challenge
‘BleedingPipe’ is actively exploited by hackers to execute malicious commands on servers and clients running Minecraft mods. This is to take advantage of the remote code execution vulnerability. By doing this, they can gain control over the devices and…
Analyzing Android and iOS Cybersecurity Vulnerabilities
In the ever-evolving landscape of mobile technology, the debate surrounding the security of Android and iOS operating systems continues to captivate the tech community. With cyberattacks becoming increasingly sophisticated, understanding which platform, Android or iOS, is more vulnerable to such…
Stay Safe When Charging Phone in Public: Scammers Steal Money Using USB Ports via “Juice Jacking”
Staying connected is more important than ever in today’s fast-paced society. Our smartphones and other devices keep us connected with friends, family, and work, but their battery life limits their utility. That’s why public charging stations, popular in airports, hotels,…
Following the JumpCloud Incident, Additional Malware was Discovered in the Npm Packages
There has been a supply chain attack against JumpCloud, an IT management company known for cryptocurrency products. This attack targets a small group of its clients. Two weeks after JumpCloud announced that it had been compromised, an investigation by…
Abyss Locker Ransomware Targets VMware ESXi Servers on Linux
The infamous Abyss Locker ransomware has surfaced as a significant threat to Linux users, primarily targeting VMware ESXi servers. This is worrying news for cybersecurity experts and server managers. Security experts are concerned about this ransomware’s potential damage to vital…
FBI Alerts: Cybercriminals Exploiting Open-Source AI Programs with Ease
Unsurprisingly, criminals have been exploiting open-source generative AI programs for various malicious activities, including creating malware and conducting phishing attacks, as stated by the FBI. In a recent call with journalists, the FBI highlighted how generative AI programs, highly…
Data Breach from Accreditation Org Exposes Sensitive Data of Educational Institutions
Jeremiah Fowler, a cybersecurity researcher, has disclosed an extensive data breach that has caused significant worries regarding the safety of sensitive data in the education sector. A staggering 682,438 records concerning educational institutions were found in an unencrypted database…
eCitizen Cyberattack: Kenyan Government Portal’s Services Disrupted
The Kenya government recently confirmed that its eCitizen portal was affected by a cyber-attack. The portal was used by the public to access over 5,000 government services. The attack came to notice after its customers complained of disruption in its…
TARK#MULE Cyber Attack Campaign Tricking Koreans with U.S. Military-Themed Documents
A relentless cyber attack campaign has been launched, specifically targeting Korean-speaking individuals. The attackers are employing deceptive tactics, using U.S. Military-themed document lures to deceive unsuspecting victims into executing malware on their compromised systems. Following the incident, Securonix – a…
Worldcoin Crypto Project Already Under Radar in Europe
This week, Worldcoin is set to start its official global rollout but is already facing a setback from the European data protection authorities. Worldcoin is OpenAI CEO Sam Altman’s attempt to corner the market for humanness verification by persuading enough…
Kenya’s eCitizen Service Faces Downtime: Analyzing the Cyber-Attack
Russian hacking groups have predominantly targeted Western or West-aligned countries and governments, seemingly avoiding any attacks within Russia itself. During the Wagner mutiny in June, a group expressed its support for the Kremlin, stating that they didn’t focus on…
Critical Cybercrime Hub’s Hacked Data Emerges for Sale on Underground Markets
The notorious ‘Breached’ cybercrime forum’s database has been offered for sale and shared with Have I Been Pwned. This is the website that collects information on cybercrime victims. While consumers worry about data breaches, hackers are now likely to…
Multiple Chinese Hacker Outfits are Targeting Organisations Worldwide
Western intelligence services and cybersecurity organisations have lately identified many Chinese hacker outfits. These groups are said to be behind global campaigns of digital espionage that are directed at corporations, media outlets, and institutions of international business and the…
Unleashing FreedomGPT on Windows
FreedomGPT is a game-changer in the field of AI-powered chatbots, offering users a free-form and customized conversational experience. You’re in luck if you use Windows and want to learn more about this intriguing AI technology. This tutorial will walk…
Google’s Earthquake Alert System Failed to Notify Residents of Turkish Earthquake
An investigation by BBC Newsnight on July 27, 2023, revealed that Google’s earthquake warning system failed to reach many residents in southern Turkey before the devastating double earthquake disaster that occurred in February, claiming tens of thousands of lives.…
Here’s How to Safeguard Your Credit Card Info
Sure, you recognise a phishing email (even if your parents don’t). Unfortunately, thieves are constantly coming up with new ways to get unauthorised access to credit card information, leaving you with financial losses and emotional distress. While hackers demonstrate…
Tech Meets Healthcare: GoodRx’s Rewarding ‘Medicine Cabinet’ Promotes Medication Adherence
To help people keep track of the medications they are taking, GoodRx is launching a digital medicine cabinet. As stated earlier, this app has been developed to increase medication adherence, or how well you comply with your doctor’s orders…
Police Van Equipped with AI Can Detect if Drivers are Using Mobile Phones
Law enforcement officers in Hampshire and the Isle of Wight, in collaboration with the Thames Valley Police recently conducted an operation in order to observe commercial vehicles. The said operation was conducted from July 17 to 21 on the A34…
Hackers Infect Call of Duty Players with Self-Spreading Malware
Hackers have recently been discovered abusing Call of Duty players with a self-propagating software attack, raising serious concerns among the gaming community. This malicious activity, which security researchers have uncovered, has aroused concerns since it may compromise user data and…
ChatGPT’s Plug-In Vulnerabilities
ChatGPT, the revolutionary language model developed by OpenAI, has been making waves in the tech world for its impressive capabilities in natural language understanding. However, recent developments have highlighted a significant concern – ChatGPT’s plug-in problem, which poses potential…
FraudGPT: ChatGPT’s Evil Face
Threat actors are promoting the FraudGPT artificial intelligence (AI) tool, which follows in the footsteps of WormGPT, on a number of Telegram channels and dark web marketplaces. This is an AI bot, solely designed for malicious purposes, such as…
Out of 50,000 Cybercrimes Reported in 6 Years, Only 23% Successfully Solved
Over the span of nearly six and a half years, a significant number of cybercrime cases, totaling 50,027, were reported in the city up until May 31 of this year. However, the resolution rate for these cases is rather…
The Unyielding AI Challenge: Safeguarding Organizations in the Digital Era
As ChatGPT and other generative artificial intelligence tools continue to rise, defining workplace productivity has become more difficult. For a productive workplace to be achieved, however, there must be a consideration of how artificial intelligence (AI), machine learning (ML),…
CERT-In Warns Against Mallox Ransomware Targeting Unsecured MS SQL Servers
Indian government’s nodal agency, CERT-In has issued warning about the Mallox ransomware that is exploiting MS-SQL servers through dictionary attacks. By using dictionary attack method, the ransomware acquire unauthorized access to victims’ networks, finally succeeding in server compromise and data…
‘Verified human’: Worldcoin Users Crowd for Iris Scans
The Worldcoin project, founded by Sam Altman, CEO of OpenAI (the developer of ChatGPT), is offering people around the world the opportunity to get a digital ID and free cryptocurrency in exchange for getting their eyeballs scanned. Despite concerns…
Challenge Arising From the ChatGPT Plugin
OpenAI’s ChatGPT has achieved important advancements in AI language models and provides users with a flexible and effective tool for producing human-like writing. But recent events have highlighted a crucial problem: the appearance of third-party plugins. While these plugins promise…
Zenbleed: Security Flaw Steals Data from AMD Zen 2 CPUs
After initially disclosing the flaw to AMD on May 15, Google security researcher Tavis Ormandy published an overview of it on his blog. Because of the Zenbleed vulnerability, AMD’s entire Zen 2 product line is said to be affected. The…
Corporate Data Heist: Infostealer Malware Swipes 400,000 Credentials in a Record Breach
Recent research has revealed that corporate credentials are being stolen alarmingly. The study revealed that over 400,000 corporate credentials were stolen by malware specialized in data theft. Approximately 20 million malware logs were examined in the study. The study…
Employees are Feeding Sensitive Data to ChatGPT, Prompting Security Concerns
Despite the apparent risk of leaks or breaches, according to the latest study from Netskope, employees are still sharing private company information with chatbots like ChatGPT and AI writers. The study, which examines 1.7 million users across 70 international…
Singapore Explores Generative AI Use Cases Through Sandbox Options
Two sandboxes have been introduced in Singapore to facilitate the development and testing of generative artificial intelligence (AI) applications for government agencies and businesses. These sandboxes will be powered by Google Cloud’s generative AI toolsets, including the Vertex AI…
Stolen Session Cookies Turns Into the Next Cyber Threat
According to the recent Identity Exposure Report by SpyCloud, 87,000 credentials linked to Fortune 1000 C-level executives were recovered from the criminal underworld, in year 2022. Security leaders across organizations continue to live in constant terror of becoming a victim…
Exposed Secrets: Backdoor Vulnerabilities in Worldwide Radio Systems
The world has been secretive for over 25 years about a technology used for critical data and voice radio communication around the globe. No one could closely examine its security properties to detect vulnerabilities. A small group of researchers…
Notorious Lazarus Hacking Outfit Linked to a $60 Million Alphapo Crypto Theft
The latest attack on payment processing site Alphapo, in which the attackers stole over $60 million in cryptocurrency, is attributed by blockchain researchers to the North Korean Lazarus hacker gang. The hack on Sunday, July 23rd, targeted Alphapo, a…
Lazarus Hackers Target Microsoft IIS Servers to Propagate Malware
The infamous Lazarus hacker collective has reappeared in a recent wave of cyberattacks, using a cunning plan to spread malware through infected Microsoft Internet Information Services (IIS) servers. Cybersecurity professionals are actively watching the situation to reduce any hazards as…
BlackCat Attackers Target Italian Asset Manager Azimut
Azimut Group, an Italian asset management firm that oversees over $87.2 billion in assets, declared in a public statement that it will “not comply by any means” with a ransomware demand from the notorious hacking organisation BlackCat. Israeli hacking…
Google Cloud’s Security Strategy: Emphasizing ‘Secure by Design’ and ‘Secure by Default’
As artificial intelligence takes center stage, organizations are grappling with new considerations regarding the appropriate security measures and their evolution. For Google LLC and Google Cloud, ensuring security across the organization involves a combination of central teams providing consistent…
Travel HACK: Why you Should not Share Photos of Your Boarding Pass Online
You are done packing the bags, you put on your airport look and now you are all set to board the flight to your dream vacation. You might as well want to post a picture of the trip, or share…
Security Breach: Clearweb Sites Attacked by MOVEit, Data Exposed
A cybercrime syndicate used by the Clop ransomware gang is substantially more prevalent than any other cybercrime syndicate in exploiting the MOVEit vulnerability than any other. As an additional complication, the ransomware gang’s data stolen through the MOVEit vulnerability…
Rise of Bossware: Balancing Workplace Surveillance and Employee Privacy
The emergence of ‘Bossware’ or staff surveillance software in recent years has been a troubling trend in offices all around the world. Bossware refers to a collection of devices and software that give employers the ability to track, keep…
Stay Vigilant: Google Docs Phishing Scams Spreading Rapidly
Phishing scam sophistication is increasing every day, making them more difficult to detect and avoid at the same time. A wide variety of file-sync and share platforms are now available for users, making scammers impute these services and try…
Human Error: A Helping Hand for Cyber Criminals
The use of passwords, a fundamentally faulty strategy that was developed many years ago, has been the primary method for securing an organisation’s internal systems and its customers’ accounts for far too long. Despite efforts to provide better, more…
Yoga Trainer Defrauded of Rs.94,998 in a Paytm Fraud
In a shocking incident of cyber fraud in Lucknow, India, a yoga trainer lost Rs. 94,998 from her bank account within five transactions that she made online. The victim claims to have been approached by the fraudsters impersonating a BSF…
Critical Vulnerabilities in AMI MegaRAC BMC Software
Eclypsium, a cybersecurity company, recently discovered two serious flaws in the AMI MegaRAC Baseboard Management Controller (BMC) software, raising questions about the security of millions of servers throughout the world. If these weaknesses are used against the affected systems, serious…
Canadian Cybersecurity Head Warns of Surging AI-Powered Hacking and Disinformation
Sami Khoury, the Head of the Canadian Centre for Cyber Security, has issued a warning about the alarming use of Artificial Intelligence (AI) by hackers and propagandists. According to Khoury, AI is now being utilized to create malicious software,…
Beyond Security: The Comprehensive Approach to Tackling Cyberattacks
In today’s digital landscape, organizations are increasingly facing the harrowing consequences of cyberattacks, particularly ransomware incidents. In these malicious schemes, hackers encrypt vital data, rendering it inaccessible, and then demand exorbitant payments for its restoration. Unfortunately, such attacks are…
Movie Scam: Fraudsters Take Advantage of the Popularity of Barbie and Oppenheimer
The films Barbie and Oppenheimer quickly rose to the top of the list of the year’s most anticipated films. Unfortunately, scammers seized the opportunity to use Barbie and Oppenheimer’s enormous popularity for their own nefarious purposes right away, as…
Storm-0558 Breach: Microsoft Breach Risks Millions of Azure AD Apps
Storm-0558 breach, that enabled the China-based advanced persistent threat (APT) group to access emails of at least 25 US agencies seems to be more notorious than anticipated, since the breach may put significant risk on Microsoft cloud services than one…
Warcraft Fans Trick AI with Glorbo Hoax
Ambitious Warcraft fans have persuaded an AI article bot into writing about the mythical character Glorbo in an amusing and ingenious turn of events. The incident, which happened on Reddit, demonstrates the creativity of the game industry as well as…
GitHub Issues Alert on Lazarus Group’s Social Engineering Attack on Developers
According to a security alert issued by GitHub, this social engineering campaign is designed to compromise developers’ accounts in the blockchain, cryptocurrency, online gambling, and cybersecurity industries. This is done through social engineering techniques. The campaign was reportedly linked…
Web Development Revolution: Chrome’s Cookie-Free Tools
It has become increasingly common for browsers to use third-party cookies as part of their browsing process, which makes it possible for advertisers and bad actors to spy on large chunks of your browsing history to provide more relevant…
North Korea-Backed Hackers Breach US Tech Company to Target Crypto Firms
A North Korean state-sponsored hacking group has recently breached a US IT management company, in a bid to further target several cryptocurrency companies, cybersecurity experts confirmed on Thursday. The software company – JumpCloud – based in Louisville, Colorado reported its…
Nigel Farage Controversy Results in Hundreds of NatWest Private Data Requests
Numerous requests for copies of personal data have been made to NatWest Bank under the provisions of data protection regulations. It unfolded after an argument between the group and Nigel Farage, a pro-Brexit advocate. According to the former UKIP…
Microsoft Offers Free Security Features Amid Recent Hacks
Microsoft has taken a big step to strengthen the security of its products in response to the growing cybersecurity threats and a number of recent high-profile attacks. The business has declared that it will offer all users essential security features…
As More MOVEit Hack Victims Emerge, Ofcom Declares Non-Payment of Ransom
As the mass-hacking incidents continue to affect users of the widely used file-transfer application MOVEit Transfer, an increasing number of victims are emerging, with nearly 400 organizations now known to be impacted. In a recent statement, Estée Lauder, a…
Ransomware Outbreak in Canada: Cybersecurity Meltdown
Canadians and Canadian organizations are increasingly falling victim to ransomware attacks. There was an emphasis placed on the urgency of addressing the cyber security issue by Sami Khoury, the president of the Canadian Centre for Cyber Security. The President…
Estée Lauder: Cosmetic Brand Amongst the new Victims of Ransomware Attack
On Tuesday, U.S.-based cosmetic brand Estée Lauder Cos. Inc. confirmed to have witnessed a ransomware attack, following which it compromised some of its data and took down some of its systems. Apparently, ransomware gangs ALPHV/BlackCat claim to have executed the…
AI Will Result in Greater Game Development and Job Growth
Artificial intelligence will increase employment in the video game business, one of the bodies representing games developers stated. The head of TIGA, Dr. Richard Wilson, claims that AI will “reduce the cost of making games and speed up the…
Inside the World of Ransomware Negotiations: From Colonial Pipeline to JBS
In January 2021, JBS, the world’s largest meat-processing company, revealed that it paid a ransom of $11 million in Bitcoin to cyber attackers. Similarly, in May of the same year, Colonial Pipeline, the largest refined-products pipeline in the U.S.,…