Tag: CySecurity News – Latest Information Security and Hacking Incidents

LockBit Digital Gang Named Top Ransomware Threat by World Nations

On Wednesday, a group of seven countries, including the United States, Canada, Britain, France, Germany, Australia, and New Zealand, collectively identified the primary ransomware threat worldwide as the criminal organization known as “LockBit.” This digital extortion gang operates under the…

5 Tips to Protect Yourself from Deepfake Crimes

The rise of deepfake technology has ushered in a new era of concern and vulnerability for individuals and organizations alike. Recently, the Federal Bureau of Investigation (FBI) issued a warning regarding the increasing threat of deepfake crimes, urging people to…

Using AI for Loans and Mortgages is Big Risk, Warns EU Boss

  The mortgage lending sector is experiencing a significant revolution driven by advanced technologies like artificial intelligence (AI) and machine learning. These cutting-edge technologies hold immense potential to revolutionize the lending process.  However, alongside the benefits, there are also valid…

Oracle and Cohere Collaborate for New Gen AI Service

  During Oracle’s recent earnings call, company founder Larry Ellison made an exciting announcement, confirming the launch of a new generation AI service in collaboration with Cohere. This partnership aims to deliver powerful generative AI services for businesses, opening up…

Vietnamese Public Companies Targeted by SPECTRALVIPER Backdoor

  Vietnamese public companies are facing an ongoing targeted campaign involving the SPECTRALVIPER backdoor. This backdoor, previously undisclosed and in the x64 variant, offers a range of capabilities such as manipulating files, impersonating tokens, and loading PE files. Elastic Security…

AEI Reports: Threat Actors are Targeting High-profile Companies

According to an American Enterprise Institute (AEI) study, threat actors have been targeting high profile companies, that are exceptionally profitable, hold high value and have generous spending on advertisings, since year 1999. FBI confirmed that the potential losses from cybercrime…

Extreme Networks Hit by Clop MOVEit Attack

  Extreme Networks has revealed that it has fallen victim to the rapidly evolving MOVEit cyber attack. As a consequence, customers who rely on the network hardware and services provided by Extreme Networks may face the potential threat of having…

IoT: Why is this Attacker’s Favorite Target?

  Internet of Things (IOT) devices are increasingly emerging as the preferred targets of attackers due to their lack of built-in security and persistent default password usage. It should come as no surprise that hackers choose to target IoT devices…

How to Prevent Phishing Attacks

  Phishing is the most common and dangerous type of online threat. It involves hackers pretending to be trustworthy companies to trick people into sharing their account information or downloading harmful files. That’s why it’s crucial to learn how to…

A Hacking Group Spotted Combining Cybercrime and Cyberespionage

  A suspected Belarusian hacking group has targeted Ukraine; ‘Unusual’ crime cross-over. According to security researchers, a hacker gang aligned with Belarusian government interests appears to be combining cybercrime with cyberespionage. The group, known as Asylum Ambuscade, since 2020 has…

Aberdeen AI Trial helps Doctors Spot Breast Cancers

  A trial is happening at Aberdeen Royal Infirmary to test if artificial intelligence (AI) can help radiologists review many mammograms each year. In the trial, AI helped detect early-stage breast cancer in June, who is a healthcare assistant and…

Increasing Threat of Generative AI Technology

Think of a drastic surge in advanced persistent threats (APTs), malware attacks, and organizational data breaches. An investigation on the case scenario revealed that these attacks are actually developed by threat actors who have access to generative AI. However, it…

Online Thieves Exploits Vulnerability in Microsoft Visual Studio

  Security professionals are alerting users regarding a vulnerability in the Microsoft Visual Studio installer that enables hackers to distribute harmful extensions to application developers while posing as a trusted software vendor. From there, they may sneak into development environments…

PoC Published for Windows Win32k Flaw Exploited in Assaults

  For a Windows local privilege escalation vulnerability that was patched as part of the May 2023 Patch Tuesday, researchers have published a proof-of-concept (PoC) exploit.  The Win32k subsystem (Win32k.sys kernel driver) controls the operating system’s window manager and handles…

Atomic Wallet Hit by North Korean Hackers

  According to a recent blog post by Elliptic, a blockchain intelligence firm, users of Atomic Wallet may have been targeted by Lazarus, the notorious hacking group from North Korea. The post highlights that Atomic Wallet users could have potentially…

Outlook Services Paralyzed: Anonymous Sudan’s DDoS Onslaught

  In the last few days, several distributed denial-of-service (DDoS) attacks have been launched against Microsoft Outlook, one of the world’s leading email providers. Anonymous Sudan, a hackers’ collective, has launched DDoS attacks against Microsoft Outlook. The attacks, which aim…

Exploring Zero-Knowledge Proofs: A Powerful Tool for Cybersecurity

In today’s digital age, preserving privacy and security while verifying information is an ongoing challenge. Fortunately, zero-knowledge proofs (ZKPs) have emerged as a promising solution.  ZKPs enable the verification of sensitive information without revealing any underlying data, ensuring a higher…

Over 60K Adware Apps Target Android Devices

Over 60,000 adware apps disguised as cracked versions of popular apps have been discovered, posing a significant threat to Android device users. These malicious apps have been circulating for the past six months, secretly installing adware and compromising user privacy.…

Privacy and Security Features Revealed by Apple

  During this year’s WWDC, Apple announced its latest privacy and security innovations. This reaffirms the company’s commitment to respecting individual privacy as one of mankind’s foundational rights. As part of these updates, Safari Private Browsing has been significantly improved.…

N.S. Software Breach: Microsoft Blames Ransomware Gang

A recent software breach in Nova Scotia has raised concerns as the extent of the attack remains unknown. Microsoft has identified the ransomware gang known as Clop as the primary culprit behind the breach, highlighting the ever-growing threat of cybercriminals…

Coinbase Sees Transformative Future of AI-Blockchain

  Coinbase, a prominent cryptocurrency exchange, acknowledges the profound potential of artificial intelligence (AI) in the realm of digital currencies. Being at the forefront of the industry, Coinbase recognizes the considerable influence AI can wield in transforming the utilization, comprehension,…

The Risks and Ethical Implications of AI Clones

The rapid advancement of artificial intelligence (AI) technology has opened up a world of exciting possibilities, but it also brings to light important concerns regarding privacy and security. One such emerging issue is the creation of AI clones based on…

US Air Force Denies AI Drone Attacked Operator in Test

The recent Future Combat Air & Space Capabilities Summit hosted by the Royal Aeronautical Society in London brought together experts, industry leaders, and military personnel worldwide to discuss the future of combat air and space capabilities.  The two-day conference covered…

Conti’s Legacy: Ransomware’s Evolution and Future Threats

Ransomware has been a persistent and highly lucrative threat in the cybersecurity landscape, and one group that has garnered significant attention is Conti. Known for their sophisticated tactics and high-profile attacks, Conti has left a lasting impact on the cybersecurity…

Harvard Pilgrim Health Care Hit by Ransomware Attack

  Harvard Pilgrim Health Care, one of the largest health insurance providers in the United States, has recently experienced a major ransomware attack that has affected approximately 2.5 million individuals. The incident has raised serious concerns about data security and…

Fraudsters Target Kolkatans With Message-Forwarding Software

  As online financial transactions became simpler and easier to conduct, the number of fraudulent transactions involving digital financial transactions also increased. Taking advantage of the increased sophistication of the fraudsters does not seem to be a problem. Cybercriminals, especially…

Cyberattack Diverted Ambulances of Idaho Hospital

  In yet another instance of a cyberattack affecting healthcare facilities in the United States, a hospital representative has confirmed to CNN that an Idaho-based hospital has been redirecting ambulances to alternative medical facilities for over 24 hours. This diversion…

Safeguarding Your Work: What Not to Share with ChatGPT

  ChatGPT, a popular AI language model developed by OpenAI, has gained widespread usage in various industries for its conversational capabilities. However, it is essential for users to be cautious about the information they share with AI models like ChatGPT,…

Watch Out For These ChatGPT and AI Scams

  Since ChatGPT’s inception in November of last year, it has consistently shown to be helpful, with people all around the world coming up with new ways to use the technology every day. The strength of AI tools, however, means…