In the latest cyber threat, hackers have devised a new approach to deceive unsuspecting victims, even using reputable names as a cover. A ransom-as-a-service (RaaS) attack called “SophosEncrypt” has emerged, masquerading as the cybersecurity vendor Sophos. The operation of…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Ransomware Trends: RaaS and Cryptocurrency Impacts
Ransomware attacks have become a pressing concern for individuals, businesses, and governments worldwide. Cybercriminals are constantly evolving their tactics, and two significant trends that demand close monitoring are the rise of Ransomware-as-a-Service (RaaS) and the growing reliance on cryptocurrencies for…
Top Cyber Official Says AI Needs Better Security
Artificial intelligence (AI) is used by hackers and propagandists to develop malicious software, draft convincing phishing emails to infect computers, and spread false information via the web, according to Canada’s top cybersecurity official, who spoke to Reuters on Thursday.…
Security Professionals Propose Guidelines for AI Development in an Open Letter
A new voluntary framework for designing artificial intelligence products ethically has been revealed by a global consortium of AI experts and data scientists. There are 25,000 members of the World Ethical Data Foundation, including employees of several digital behemoths…
Growing Surveillance Threat for Abortions and Gender-Affirming Care
Experts have expressed alarm about a worrying trend in the surveillance of people seeking abortions and gender-affirming medical care in a recent paper that has received a lot of attention. The research, released by eminent healthcare groups and publicized by…
Cyber Trust Mark: U.S. Administration Introduces Program to Boost Home Security
This Tuesday, Joe Biden’s government announced a ‘U.S. Cyber Trust Mark’ program that will focus on cybersecurity certification and product labels of smart home tech, as a step to help consumers choose products that provide better protection against cyber activities.…
With More Jobs Turning Automated, Protecting Jobs Turn Challenging
With the rapid trend of artificial intelligence being incorporated in almost all the jobs, protecting jobs in Britain now seems like a challenge, as analyzed by the new head of the state-authorized AI taskforce. According to Ian Hogarth, a tech…
Enhancing Security and Observability with Splunk AI
During Splunk’s .conf23 event, the company announced Splunk AI, a set of AI-driven technologies targeted at strengthening its unified security and observability platform. This new advancement blends automation with human-in-the-loop experiences to enable organisations to improve their detection, investigation,…
ChatGPT’s Reputability is Under Investigation by the FTC
The Federal Trade Commission (FTC) has recently launched an investigation into ChatGPT, the popular language model developed by OpenAI. This move comes as a stark reminder of the growing concerns surrounding the potential pitfalls of artificial intelligence (AI) and the…
Evil Unleashed: Meet WormGPT Chat’s Wicked Twin
Over 100 million users have signed up for ChatGPT since it launched last year, making it one of the top ten most popular apps in the world. Artificial intelligence has taken the world by storm in recent years with…
Sophisticated Cloud Credential Theft Campaign Targets AWS, Expands to Azure and Google Cloud
A cybercriminal group behind a sophisticated cloud-credential stealing and cryptomining campaign has recently expanded its targets beyond Amazon Web Services (AWS) to include Microsoft Azure and Google Cloud Platform (GCP). Researchers from SentinelOne and Permiso have been tracking the…
macOS Sonoma’s Latest Update Brings Significant Enhancements to Apple’s Password Manager
Password manager applications like 1Password and Proton Pass play a crucial role when setting up a new device. These apps securely store login credentials, credit card information, and notes, with an emphasis on login data security. Not all password managers…
Growing Demand for Healthcare Cybersecurity Specialists
The healthcare sector is increasingly depending on technology to better patient care and increase operational efficiency in today’s quickly evolving digital environment. Cybersecurity dangers are a major worry that comes with this digital transition. The demand for qualified cybersecurity specialists…
Typo Delivers Millions of US Military Emails to Russia’s Ally Mali
Due to a small typing error, millions of emails from the US military were unintentionally forwarded to Mali, a Russian ally. For years, emails meant for the US military’s “.mil” domain have been transmitted to the west African nation…
The Met Police passed victims’ data to Facebook
Using its website to report crimes, such as sexual offences, domestic violence, and other crimes, the most powerful police force in the country gathered sensitive details about the people using the site. Observer reports that Facebook shared users’ data…
AI-Based Deepfake Fraud: Police Retrieves Money Worth ₹40,000 Defrauded From Kozhikode Victim
Kozhikode, India: In a ‘deepfake’ incident, a man from Kozhikode, Kerala lost ₹40,000 after he fell prey to an AI-based scam. According to police officials, the victim, identified as Radhakrishnan received a video call on WhatsApp from an unknown number.…
5 AI Tools That may Save Your Team’s Working Hours
In today’s world of ‘everything digital,’ integrating Artificial Intelligence tools in a business is not just a mere trend, but a necessity. AI is altering how we work and interact with technology in the rapidly transforming digital world. AI-powered solutions…
Cybersecurity: Are Viruses Still a Threat?
Viruses were considered the biggest cybersecurity concern in the world, but is that still the case? How prevalent were viruses in the past, and are they still as deadly today? Understanding the modern computer viruses Viruses are no longer…
A Few Cybercriminals Account for All Email Extortion Attacks, New Research Reveals
New research conducted by Barracuda Networks, in collaboration with Columbia University, has revealed that a surprisingly small group of cybercriminals is responsible for the majority of email extortion attempts worldwide. The study examined over 300,000 flagged emails, identified as…
Urgent Action Required: Delete Apps with Privacy Breach Potential
Whenever your phone is running low on storage, it’s always an excellent idea to remove apps that could be taking up a lot of space – especially if you think they could spy on you. For some apps, however,…
Gay Furry Hackers: Digital Activism Against Anti-Trans Laws
A group of expert hackers known as ‘SiegedSec’ has surfaced in recent months, and they are targeting American state governments that have passed anti-trans legislation. These hackers are members of the furry community, a subculture of people who enjoy anthropomorphic…
Understanding the Drawbacks of Blockchain Smart Contracts
Blockchain technology has grabbed the attention of companies across the globe. Due to its benefits, such as immutability and transparency, traditional companies outside of banking, like BMW and Bosch, have begun to experiment with smart contracts to produce more…
Forget ChatGPT, Google Bard may Possess Some Serious Security Flaws
A latest research claims that Google’s AI chatbot, Google Bard may let its users to use it for creating phishing emails and other malicious content, unlike ChatGPT. At one such instances, cybersecurity researchers Check Point were able to produce phishing…
Privacy Breach Shockwaves: Colorado State University Students and Staff Impacted by Data Breach
According to CBS News, a Colorado university is at risk of exposing 30,000 current and former students’ data to hackers. As reported by the University of Colorado Boulder, the incident is the result of a cyber-attack perpetrated against a…
Understanding Internet Identity: Exploring its Functionality and Operation
Passwords have long been a hassle for daily online logins, even with the help of password managers. However, the DFINITY Foundation’s Web3 experts are developing a promising alternative called Internet Identity (II), which has the potential to transform online…
SolarWinds Hackers Dangle BMWs to Eavesdrop on Diplomats
The Russia-backed group responsible for the SolarWinds attack, known as Cloaked Ursa or Nobelium/APT29, has shifted its tactics and is now targeting foreign diplomats working at embassies in Ukraine. Instead of using traditional political lures, the group is employing…
Fear Grip Users as Popular Diabetes App Faces Technical Breakdown
A widely used diabetes management software recently experienced a serious technical failure, stunning the users and leaving them feeling angry and scared. The software, which is essential for assisting people with diabetes to monitor and manage their blood sugar levels,…
Hollywood vs. AI: Strike Highlights the Emerging Use of Cutting-Edge Technology
The prospects of generative artificial intelligence in Hollywood — and the way it can be used as an alternative labour — has become a critical holding point for actors on strike. In a news conference earlier this week, Screen…
Custom Data: A Key to Mitigating AI Risks
Businesses are continuously looking for ways to maximize the advantages while limiting the potential hazards in the quickly developing field of artificial intelligence (AI). One strategy that is gaining traction is using unique data to train AI models, which enables…
Killnet Attempts to Build Clout Among Russian Hackers With Media Stunts
As a result of Killnet and Killmilk’s leadership over the past several months, ragtag hacker groups from Russia have been consolidated under their leadership. This has formed one group called Killnet. Even though Killnet has made a concerted effort…
Microsoft Confirms Zero Day Exploits, Prompts Users to Update
This week Microsoft confirmed around 132 security vulnerabilities in its product lines, including a total of six zero-day flaws that are currently being actively exploited. Because of this, security professionals advise Windows users to upgrade right away. One of these…
AI Malware vs. AI Defences: WormGPT Cybercrime Tool Predicts a New Era
Business email compromise (BEC) attacks are being launched by cybercriminals with the assistance of generative AI technology, and one such tool used is WormGPT, a black-hat alternative to GPT models that has been designed for malicious goals. SlashNext said…
Sharp Increase in Malware Attacks via USB Flash Drives
Instances of cybercriminals employing USB drives for malware attacks have seen a significant rise. According to security researchers from Mandiant, there has been a three-fold increase in malware attacks via USB drives aimed at stealing sensitive information during the…
Unveiling Entrepreneurs’ Hesitations with ChatGPT
ChatGPT has become a significant instrument in the field of cutting-edge technology, utilizing the ability of artificial intelligence to offer conversational experiences. Nevertheless, many business owners are still reluctant to completely adopt this creative solution despite its impressive possibilities. Let’s…
Ransomware Resurgence: A Renewed Wave of Cyber Threats
Harvard Business Review reports claim that cyberattacks have increased dramatically since the overnight shift from remote to office work in 2020. In 2020, all types of cyberattacks have increased over the previous year, but ransomware is by far the…
Former Amazon Security Engineer Charged of Defrauding a Crypto Exchange
A prominent cybersecurity pro for Amazon is apparently facing a problem. The U.S. Department of Justice has detained security engineer, Shakeeb Ahmed, with charges of defrauding and money laundering from an unnamed decentralized cryptocurrency exchange, both charged carrying a maximum…
Clop Attacks: More Organizations Confirm to have Fallen Prey to MOVEit Mass-hack
As the ongoing MOVEit hack is getting exposed, their seems to be some new names that have fallen prey to the attack. These organizations involve hotel chain Radisson, U.S. based 1st Source Bank, real estate giant Jones Lang LaSalle and…
BlackRock’s Bitcoin ETF Reveals the Future of Cryptocurrency Surveillance
Surveillance is about to reach a new level as Blackrock awaits the SEC’s confirmation regarding its Bitcoin ETF launch. An ETF tied to Bitcoin was filed on June 15 by the world’s largest asset manager, reportedly the world’s largest…
Zscaler, Palo Alto Under Pressure from Microsoft’s Rapidly Increasing Cybersecurity Offerings
Microsoft (MSFT) continues to put pressure on cybersecurity stocks with new products aimed at Zscaler (ZS), Palo Alto Networks (PANW), Cloudflare (NET), CrowdStrike Holdings (CRWD), and others. MSFT stock has kept on shining this year, with a 39% increase,…
Major Companies Restrict Employee Use of ChatGPT: Amazon, Apple, and More
Several major companies, including Amazon and Apple, have recently implemented restrictions on the use of ChatGPT, an advanced language model developed by OpenAI. These restrictions aim to address potential concerns surrounding data privacy, security, and the potential misuse of the…
Massive Data Breach at HCA Healthcare: 11 Million Patients’ Information Compromised by Hackers
Hospital and clinic operator HCA Healthcare has announced that it experienced a significant cyberattack, posing a risk to the data of at least 11 million patients. The breach affects patients in 20 states, including California, Florida, Georgia, and Texas.…
ScarletEel Hackers Breach AWS Cloud Infrastructure
Researchers have discovered that a financially motivated threat actor called ScarletEel has been infiltrating Amazon Web Services (AWS) for various malicious activities. These activities include stealing credentials and intellectual property, deploying crypto mining software, and carrying out distributed denial-of-service…
Genesis Market: Formerly a Popular Dark Web Marketplace Now up for Sale
If one wishes to own a defunct darknet business, they could try reaching out to the backers of Genesis Market, the formerly high-and-mighty seller of stolen data. Today, they appear to be desperate to sell their formerly valued asset for…
Private Data of 12,000 SBI Employees Exposed on Telegram Channels
Over 12,000 employees of the State Bank of India (SBI) had their personal information compromised in a significant data breach, which was later published on Telegram channels. Employees’ names, residences, contact information, PAN numbers, and personal data from their…
Meta Responds to User Complaints by Introducing Feeds for Threads
Meta, the parent company of social media giant Facebook, has recently revealed its plans to introduce feeds for Threads, a messaging app designed for close friends. This move comes in response to user complaints about the lack of a central…
Ransomware Gangs Exposing Private Files of Students Online
Ransomware groups have lately been dumping private documents acquired from schools online. The stolen content included happens to be raw, intimate and graphic. The confidential ‘data’ leaked online involve content as explicit as describing student sexual assaults, psychiatric hospitalizations, abusive…
Twitter Becomes the Epicentre of FTM Fraud
Online settings, such as Twitter, are becoming increasingly perilous, rife with fraudulent schemes aimed at naïve victims. Social media giant has recently been the epicentre of deception, with fraudsters deploying innovative ways to abuse its massive user base. One…
Critical Ransomware Threat: Disguised as Windows Update, Beware!
Ransomware is a form of malware that allows hackers to encrypt non-transferable files on a computer so that they cannot be released. Cyberattackers encrypt the files that they want to access and then demand a ransom payment for the…
Hackers Steal 25 Crore From Thane Company’s Escrow Account
Hackers took 25 crores from a Thane-based company’s escrow bank account during a significant cyberattack. The construction company had placed the funds in the escrow account as a condition of a contract with another business. The money was transferred to…
This Threat Actor Targeted NATO Summit Attendees
A Russia-linked threat actor known as RomCom has been targeting entities supporting Ukraine, including guests at the 2023 NATO Summit. The summit is taking place in Vilnius, Lithuania, and will discuss the war in Ukraine and new memberships in…
Over $30 Billion Stolen from Crypto Sector, Reveals SlowMist’s
A recent report by cybersecurity firm SlowMist has uncovered a shocking revelation regarding the vulnerability of the crypto sector. According to the report, blockchain hacks have resulted in the theft of over $30 billion from the cryptocurrency industry since 2012.…
India’s Finance Ministry Tell State-run Banks to Adopt Emerging Technologies to Increase Operational Efficiency
The Indian finance ministry has ordered state-run banks to collaborate and take use of emerging technology to improve operational effectiveness and customer experience. In a meeting, headed by Finance Minister Nirmala Sitharaman to assess the activities and performance of public…
SCARLETEEL Hackers Target AWS Fargate in Latest Cryptojacking Campaign
An continuing sophisticated attack effort known as SCARLETEEL continues to target cloud settings, with threat actors currently focusing on Amazon Web Services (AWS) Fargate. According to a new report from Sysdig security researcher Alessandro Brucato, “Cloud environments are still…
Users’ Data is Stolen Through 1.5 million Android Apps
As part of an effort to help users gain a better understanding of what data an app collects before downloading it, Google Play introduced “nutrition labels” with a privacy-focused focus last year. However, researchers have found a way to work…
Cybercrime to Cost Global Economy $10.5 trillion By 2025
A report from Cybersecurity Ventures estimates that by 2025, cybercrime will have cost the global economy up to $10.5 trillion. According to a recent Gartner survey, by then, more than half of all cybersecurity assaults will be attributable to…
Critical TootRoot Bug Hijack Mastodon Servers
Mastodon, the decentralized social networking platform that emphasizes freedom and open-source principles, has recently addressed several vulnerabilities, including a critical one with potentially severe consequences. This particular vulnerability enabled hackers to exploit specially designed media files, allowing them to…
Ransomware Attack on Pro Bono California Law Firm Affects More Than 42,000
Recently, a ransomware attack on the Law Foundation of Silicon Valley, a California law firm that provides free services to those in need, resulted in the exposure of information of more than 42,000 people. Hackers use ransomware to make money…
AI: How to guard against privacy invasion by bots
Since ChatGPT entered our life and launched a conflict in the artificial intelligence area, a new race known as the AI Arms Race 2.0 has started. The same ChatGPT that everyone initially found impressive also raised concerns about copyright…
DeFi Clients Lost $228 Million to Hackers in Past 3 Months
In the recent past, there has been a dramatic rise in the number of cyber incidents, where cyber threat actors have tried to exploit many cryptocurrency projects. It is interesting to note that hackers have significantly targeted DeFi, according to…
‘Meduza Stealer’ Malware is Preying on Windows Users For Data Theft
If you are reading this on a Windows device, be on alert for potentially harmful new malware that has been affecting web browsers, password managers, and even cryptocurrency wallets. A team of Uptycs cybersecurity professionals found this infostealer, naming…
Patch Now or Peril: MOVEit Transfer Customers Urged to Address Critical Vulnerability
MOVEit Transfer software has been identified as vulnerable to a critical vulnerability. This prompts customers to patch their systems urgently to prevent vulnerability spread. The flaw, identified as CVE-2023-36934, allows an attacker to gain elevated privileges without the user…
French Government Allows Remote Access to Suspects’ Devices: Privacy Concerns Arise
The French Government has recently introduced a new policy allowing the police to remotely access and control suspects’ devices, including their cameras, microphones, and GPS data. Although this news has sparked controversy, similar practices have been in place in…
ChatGPT Loses Its Spark: Google A.I. Researcher Identifies Children as the Key Challenge
The number of ChatGPT users is declining for the first time, and those users are not those you thought they would be. According to estimates from Similarweb, a web analytics firm, a 9.7% drop in traffic to ChatGPT’s website…
Ransomware Affiliates, Triple Extortion, and the Dark Web Ecosystem
While the dark web is often associated with drugs, crime, and leaked information, there has been a rise in a sophisticated cybercrime ecosystem that operates through platforms like Tor and illicit channels on Telegram. One aspect of this trend…
Shell Confirms MOVEit-based Hack After the Threat Group Leaks Data
The CIOp ransomware gang has targeted a zero-day vulnerability in the MOVEit managed file transfer (MFT) product, acquiring data of at least 130 companies that had been utilizing the solution. At least 15 million people are thought to have been…
Pakistan Election Commission Faces Cyber Attack
The Pakistan Election Commission recently encountered a significant cyber attack, jeopardizing the security and integrity of its electoral processes. This incident has raised concerns regarding the protection of sensitive data and the potential implications for the country’s democratic system.…
Escalating Global Threats Targeting Cloud Infrastructure
Cloud computing’s quick uptake has fundamentally changed how businesses manage and keep their data. However, as cloud environments become more and more popular, an alarming increase in cyber threats targeting them has also occurred. The sophistication of attacks on…
Can TV and Radio Broadcasts Be Hacked?
In today’s interconnected world, where technology permeates every field, the security of communication channels is paramount. People rely heavily on TV and radio broadcasts for information and entertainment. So, can TV and radio broadcasts be hacked? The answer is yes.…
Netwrix Auditor RCE Bug Abused in Truebot Malware Campaign
A severe remote code execution (RCE) vulnerability in the Netwrix Auditor software was used in attacks against organisations across the United States and Canada, according to a warning issued today by CISA and the FBI. These assaults targeted organisations…
Are Your Google Docs Safe From AI Training?
AI systems like Google’s Bard and OpenAI’s ChatGPT are designed to generate content by analyzing a huge amount of data, including human queries and responses. However, these systems have sparked legitimate worries regarding privacy. Google has emphasized that it…
Pentagon Concludes Review Following Discord Leak, Tightens Controls on Classified Info
The Pentagon has completed a comprehensive assessment lasting 45 days to evaluate the military’s protocols regarding classified information, following a case where a National Guardsman leaked unnecessary classified information on Discord despite having a top-secret clearance. The individual involved,…
Will Threads be a ‘Threat’ to Twitter?
About Threads Meta, Instagram’s parent company launched Threads, which will be a text-based conversation app, rivaling Twitter. Threads, released on Wednesday evening, a day before its scheduled release, allows users to join up directly from their Instagram accounts; it is…
E2E Encryption Under Scrutiny: Debating Big Tech’s Role in Reading Messages
A recurring conflict between Silicon Valley and several governments is primarily about “end-to-end encryption,” “backdoors,” and “client-side scanning,” which appear to be complex issues. However, in its simplest form, this issue boils down to the question: should technology companies…
Protecting Yourself from ATM Scams: Understanding and Preventing Shoulder Surfing
What is Shoulder Surfing? ATM card scams are a growing concern in many countries, including India. Criminals use a variety of techniques to gain unauthorized access to individuals’ ATM cards and withdraw money from their accounts. One such technique is…
Ransomware Attack Forces Major Japanese Port to Halt its Operation
A ransomware attack was launched against Japan’s biggest and busiest trading port by a cybercriminal outfit believed to be based in Russia. Following the incident, the Port of Nagoya paused all cargo operations, including the loading and unloading of…
Industrial Solar Panels Face Critical RCE Bugs
Several critical Remote Code Execution (RCE) vulnerabilities have recently emerged, posing a significant threat to industrial solar panels and potentially endangering grid systems. These vulnerabilities, if exploited, could have severe consequences for energy organizations and their critical infrastructure. Security experts…
OpenAI Faces Lawsuit for Exploiting User Data to Train ChatGPT, DALL-E
OpenAI, an acclaimed artificial intelligence research business, was recently faced with a class-action lawsuit in the United States for allegedly stealing large amounts of personal data to train its AI chatbot ChatGPT and image generator DALL-E. According to the lawsuit…
Amazon Brushing Scam: What It Is And How To Avoid It
Though it’s one of the most well-liked online shopping sites, did you realise that scammers frequently target Amazon. The brushing scam is one of many scams that prey on Amazon customers, but it is also one of the most…
Educational Institutions Under Attack: Ransomware Criminals Leak Students’ Sensitive Data Online
School documents containing confidential information have been stolen by ransomware gangs and dumped on the Internet for free. Students are described as being sexually assaulted by other students, hospitalized due to mental health problems, abused by their parents, and…
Data Leak Affects 425,000 Swiss Addresses
Cyber threat actors have apparently stolen what is the most comprehensive data set on Swiss citizen abroad. The data set first appeared on the darknet in mid-May. It consisted of the subscribers’ information to the Swiss ReviewExternal link. The data…
How the FBI Hacked Hive and Saved Victims
Earlier this year, the FBI achieved a significant milestone by dismantling Hive, a notorious cybercrime group, employing an unconventional approach. Instead of apprehending individuals, the agency focused on outsmarting and disrupting the hackers remotely. This marks a notable shift in…
Rising Costs of Cyberattacks: Ransomware Victims Paying More, Finds Report
Indigo Books & Music continues to calculate the extensive expenses resulting from a ransomware attack that temporarily crippled its e-commerce platform, disrupted payment processing in retail stores for three days, and caused its website to go offline for approximately…
Meduza Stealer Targets Password Managers
A critical cybersecurity issue known as Meduza Stealer, a perilous new info stealer, has surfaced. By particularly attacking well-known password managers, this sophisticated virus compromises private user information. Users are urged to exercise caution and take the necessary safety…
Rustbucket Malware Targeting MacOS Devices Silently
Rustbucket, a brand-new type of malware, has just lately surfaced and is now a serious threat to macOS devices. This sneaky spyware works stealthily to infect Mac systems without raising any red flags. Rustbucket has drawn the attention of…
‘Cyber Battlefield’ Map Shows Attacks Being Played in Real Time
A live map is all set to monitor cyberattacks around the globe as the conflict in Ukraine fuels a ‘significant surge’ in hostile activity. Apparently, the technology utilizes intelligence gathered from a high-end AI-powered system – ThreatCloud AI. The maps…
Ransomware Attacks on the Rise in Manufacturing Industry
The Growing Threat of Ransomware Attacks According to a recent report by Sophos, a global leader in cybersecurity, more than two-thirds (68%) of manufacturing companies hit by ransomware attacks globally had their data encrypted by hackers. This is the highest…
Federal Report Highlights Steps for Enhancing Software Code Pipeline Security Amid App Attacks
In a recent update, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) collaborated on an advisory memorandum with the aim of strengthening security measures within application development software supply chains. The memo, titled “Defending…
User Data Goldmine: Google’s Ambitious Mission to Scrape Everything for AI Advancement
It was announced over the weekend that Google had made a change to its privacy policies. This change explicitly states that the company reserves the right to scrape everything you post online to build its artificial intelligence tools. Considering…
Here’s Why Twitter is Limiting the Number of Tweets You May View
Twitter users who read an excessive number of tweets may eventually run out of something to read. You can thank Elon Musk for it. The Twitter owner said last Saturday that rate constraints, or limitations on the number of tweets…
Risks and Best Practices: Navigating Privacy Concerns When Interacting with AI Chatbots
The use of artificial intelligence chatbots has become increasingly popular. Although these chatbots possess impressive capabilities, it is important to recognize that they are not without flaws. There are inherent risks associated with engaging with AI chatbots, including concerns…
Everything You Need to Know About Cyber hygiene
Cyber hygiene involves the set of practices and actions performed by computer users to preserve the well-being of their systems and enhance online security. Similar to maintaining physical cleanliness, cyber hygiene is a regular routine aimed at safeguarding personal information…
ChatGPT is Only One Beginning point: 10 AI tools that are beating out to OpenAI’s Chatbot
Artificial intelligence (AI) is transforming everyday tasks in unprecedented manners. Since the release of OpenAI’s ChatGPT, the world has seen significant advancements in AI, with several tech titans competing to provide the most essential applications. Hundreds of thousands of AI…
The Safety of VPN Use: A Closer Look
The usage of Virtual Private Networks (VPNs) has experienced an unprecedented surge in recent years, as individuals and organizations seek enhanced online privacy and security. However, amidst this widespread adoption of VPNs, it is crucial to question whether users are…
AIIMS Ransomware Attack Leads to a New Cyber Response Framework
On November 23, 2022, the All India Institute of Medical Science, Delhi (AIIMS), suffered a cyber attack that was labeled by police as “cyber terrorism.” As a result of the cyberattack, offline patient services like appointment booking, billing, and diagnostic…
Realising the Potential of EMR Systems in Indian Healthcare
A hospital electronic medical record (EMR) serves as a tool for managing hospital orders, handling hospital workflows, and securing healthcare information from unauthorized access. It strives to improve the healthcare delivery process by reducing healthcare costs, optimizing profits, and…
Ransomware Makes Up 58% of Malware Families Sold as Services
Ransomware has emerged as the most pervasive Malware-as-a-Service (MaaS) during the past seven years, according to a new study from the Kaspersky Digital Footprint Intelligence team. Based on analysis of 97 malware families that were disseminated via the dark…
Innovative AI System Trained to Identify Recyclable Waste
According to the World Bank, approximately 2.24 billion tonnes of solid waste were generated in 2020, with projections indicating a 73% increase to 3.88 billion tonnes by 2050. Plastic waste is a significant concern, with research from the Universities…
Iranian APT Group Charming Kitten Updates Powerstar Backdoor
According to researchers from cybersecurity firm Volexity, the most recent variant of malware is probably backed by a custom server-side component. This component assists the Powerstar backdoor operator by automating basic tasks. The latest version of the malware utilizes a…
Companies Appeal for Relief From Biometric Privacy Act
Later this June, in a Public Radio talk show hosted by Brian Mackey, Senate President Don Harmon said that some of the most flourishing business association leaders have “punched us in the nose” after the Senate Democrats came up with…
Surge in ‘Call Center Gangs’ Linked to Organized Crime and Human Trafficking
Online, robocall, and other call scams are well-coordinated and often operated by criminal organizations based overseas. These scams primarily target older Americans. Biocatch, a biometric company, conducted a recent study revealing a significant surge of 200% in call scams…