Tag: CySecurity News – Latest Information Security and Hacking Incidents

ChatGPT and Data Privacy Concerns: What You Need to Know

As artificial intelligence (AI) continues to advance, concerns about data privacy and security have become increasingly relevant. One of the latest AI systems to raise privacy concerns is ChatGPT, a language model based on the GPT-3.5 architecture developed by OpenAI.…

Google’s Search Engine Received AI Updates

  Microsoft integrated GPT-4 into Bing earlier this year, complementing the previous development. Google’s CEO, Sundar Pichai, recently announced that the company would completely reimagine how all of its core products, including search, are implemented. To ensure the success of…

Twitter Launches End-to-End Encrypted Messaging Services

Twitter has become the newest social media platform to be providing encrypted messaging service. End-to-end Encryption  Direct messages delivered on the platform will be end-to-end encrypted, i.e. private and only readable by the sender and receiver. However, Chief executive Elon…

VMware ESXi Ransomware on the Rise Due to Leaked Babuk Code

  Security experts claim to have discovered ten distinct ransomware families that have recently diverged from Babuk, a ransomware outbreak whose source code was exposed online in 2021.  Hackers have been using leaked source code from well-known ransomware firms like…

Adopting ChatGPT Securely: Best Practices for Enterprises

As businesses continue to embrace the power of artificial intelligence (AI), chatbots are becoming increasingly popular. One of the most advanced chatbots available today is ChatGPT, a language model developed by OpenAI that uses deep learning to generate human-like responses…

Here’s All You Know About Public Key Cryptography

  Public key cryptography is one of the most efficient ways to ensure financial security, which is a crucial concern for organisations. This article will go into great detail about the advantages and disadvantages of this potent technology. We’ll look…

NextGen Data Breach, Personal Data of 1.5M Patients Hacked

NextGen Healthcare, the US-based electronic health record company, has recently revealed that their firm has suffered a breach in its systems, where hackers ended up stealing the personal data of more than one million patients, including roughly 4,000 individuals from…

Dish Network Hit by Cyberattack and Multiple Lawsuits

Satellite TV provider, Dish Network, recently suffered a ransomware attack that compromised the sensitive data of its customers and employees. The attack occurred in February 2023 and was only revealed by the company in April. Since then, the company has…

Here’s How the FTX Collapse Turned into an Identity Issue

  The cryptocurrency love affair has ended. After years of expansion and investment profits, everything came crashing down in November 2022 with the demise of the FTX Trading exchange. The devastation was evident.  Since then, investors have abandoned cryptocurrency, a…

Cactus: New Ransomware Encrypts Itself to Evade Detection

Cactus, a newly discovered ransomware operation has apparently been exploiting vulnerabilities in VPN appliance vulnerabilities to gain initial access to the networks of “large commercial entities.” Although the new threat actor uses the usual file encryption and data stealing techniques…

AI Poses Greater Job Threat Than Automation, Experts Warn

  Until a few months ago, the whole concern about machines taking over human employment revolved around automation and robots/humanoids. The introduction of ChatGPT and other generative artificial intelligence (AGI) models has triggered a real and more serious threat.  What…

How the Economy is Impacting Cybersecurity Teams

A recent study conducted by HackerOne, the world’s largest ethical hacker community, revealed that half of the surveyed organizations experienced a surge in cybersecurity vulnerabilities in the last year. This alarming trend has been attributed to security budget cuts and…

New Way to Exploit PaperCut Vulnerability Detected

Cybersecurity professionals have recently discovered a new way to exploit a new critical vulnerability in PaperCut servers in a way that gets past all current detections.  The flaw, tracked as CVE-2023-27350 (CVSS score 9.8), which affects PaperCut MF or NG…

Kimsuky Spear-Phishing Campaign Goes Global Using New Malware

On Thursday, security researchers from SentinelOne reported that the North Korean state-sponsored APT group, Kimsuky, has been observed utilizing a brand new malware component called ReconShark. The malware is disseminated through spear-phishing emails that are specifically targeted, containing OneDrive links…

The Rising Popularity of Remote Browser Isolation

The Importance of Browser Isolation in a Remote Work Environment The COVID-19 pandemic has caused a seismic shift in the way we work, with remote work becoming the norm for many organizations. While this has brought numerous benefits, it has…

Russian Hackers use WinRAR as Cyberweapon

Russian hackers are known for their notorious cyber-attacks. They have once again been accused of using a popular file compression software, WinRAR, to launch an attack on a state agency in Ukraine. The attack wiped out the agency’s data, resulting…

RFK Jr. Criticizes Crypto, Following Anti-CBDC Remark

On Tuesday, US Democratic presidential candidate Robert F. Kennedy has taken another dig at cryptocurrency, following earlier comments he made opposing a U.S. central bank digital currency, or CBDC. His tweets came out swinging on defense of the digital assets…

Constellation Software Cyberattack Claimed by ALPHV

  According to the ALPHV/BlackCat ransomware group’s claims, Constellation Software’s network was compromised as a result of a cyberattack, it was also mentioned in the recent posting on the ransomware gang’s leak site. Essen Medical Associates, as well as a…

OpenAI’s Regulatory Issues are Just Getting Started

  Last week, OpenAI resolved issues with Italian data authorities and lifted the effective ban on ChatGPT in Italy. However, the company’s troubles with European regulators are far from over. ChatGPT, a popular and controversial chatbot, faced allegations of violating…

Global Ransomware Attack Targets VMware ESXi Servers

Cybersecurity firms around the world have recently warned of an increase in cyberattacks, particularly those targeting corporate banking clients and computer servers. The Italian National Cybersecurity Agency (ACN) recently reported a global ransomware hacking campaign that targeted VMware ESXi servers,…

TikTok Tracked UK Journalist via her Cat’s Account

Cristina Criddle, a technology correspondent for the Financial Times, received a call from TikTok two days before Christmas, informing her that four employees (two in China and two in the US) had successfully accessed user data from her personal account…

A New FTC Rule Prohibits Data Mining by Minors for Meta-Profits

  As a result of an investigation by the Federal Trade Commission, Meta’s Facebook (NASDAQ: META) was accused of misleading parents about their kids’ protection, and the commission proposed tightening existing privacy agreements and preventing profit from minors’ personal information. …

Online Predators Target Children’s Webcams, Study Finds

  The Internet Watch Foundation has reported a significant rise in the production of sexual abuse images using webcams and similar recording equipment across the globe. The increase has been staggering, with the number of such images having multiplied ten…

The Ransomware Gang Targets University Alert Systems

  “RamAlert,” an emergency broadcast system used by Bluefield University to communicate with its students and staff, has been hijacked by the Avos ransomware gang. The gang sent SMS texts and emails informing them that their data had been stolen…

Religious Institutions Become the Latest Focus of Cybercrime Groups

Over the weekend, two long-standing malicious groups declared their responsibility for attacking religious organizations. This marks a new direction for these groups, as they typically target corporations and government agencies rather than religious institutions.  On Saturday, the LockBit ransomware group…

Online Predators are Targeting Children Webcams

The Internet Watch Foundation reports that since 2019, there has been an increase in sexual abuse imagery generated with webcams and other recording devices worldwide.  One of the most frequently used platforms to contact kids is social media chatrooms, through…

Cryptocurrency Exchanges Linked to Ransomware

  Nine cryptocurrency exchange websites have been taken down by the FBI and the Ukrainian police in a daring joint operation. Cybercriminals and ransomware gangs use these websites to launder money for cybercriminals. This is because these websites facilitate money…

Top Victim of AI Voice Scams with 83% Losing Money

A new report has revealed that India tops the list of countries most affected by AI-powered voice scams. The report, released by cybersecurity firm McAfee, shows that 83% of Indians who fell victim to voice scams lost money, making them…

Absolute’s 2023 Resilience Index: America’s Cybersecurity

Recently, the White House has come up with a new national cybersecurity strategy called ‘Absolute’s 2023 Resilience Index’, it will hold software companies responsible for products’ security. The document unveiled by the government includes regulations for vulnerable critical infrastructure firms…

ChatGPT Privacy Concerns are Addressed by PrivateGPT

  Specificity and clarity are the two key ingredients in creating a successful ChatGPT prompt. Your prompt needs to be specific and clear to ensure the most effective response from the other party. For creating effective and memorable prompts, here…

Hackers Sell Coinbase Accounts for as low as $610 on Dark Web

The emerging popularity of cryptocurrency and the convenience of online banking has resulted in an upsurge in cybercrime activities and identity fraud. A recent research by PrivacyAffairs.com notes that hackers target social media logins, credit card numbers, and online banking…

Data Leak: Critical Data Being Exposed From Salesforce Servers

According to a post by KrebsOnSecurity published on Friday, servers running Salesforce software are leaking private data controlled by governmental bodies, financial institutions, and other businesses. According to Brian Krebs, Vermont had at least five websites that gave anyone access…

Top 5 Reasons Why Cybersecurity is Essential For Organisations

  A company’s information is its focal point, around which everything else revolves. Therefore, the significance of information security cannot be understated. By maintaining a strict cybersecurity policy, your organisation can prevent data breaches, unauthorised access, and other serious dangers…

SLP Vulnerability Exposes Devices to Powerful DDoS Attacks

Security researchers have recently discovered a new vulnerability that has the potential to launch devastating Distributed Denial of Service (DDoS) attacks. The Server Message Block (SMB) protocol, which is widely used in various devices and systems, including Windows machines and…

Healthcare Institutions at Risk Due to Reliance on Technology

As the healthcare system has become more technology-driven, there has been a significant increase in the use of cloud-based and internet applications for delivering facilities. Unfortunately, this has also resulted in an increase in cybersecurity-related risks including breaches, scams, and…

Forum Database Sold Online After Kodi Data Breach

  Hackers have breached the Kodi Foundation’s MyBB forum database, stealing user information such as email addresses and private messages which were tried to be sold online.  In other words, it is an open-source, cross-platform media player, organizer, and streaming…

The Threat of Deepfakes: Hacking Humans

Deepfake technology has been around for a few years, but its potential to harm individuals and organizations is becoming increasingly clear. In particular, deepfakes are becoming an increasingly popular tool for hackers and fraudsters looking to manipulate people into giving…

The Persistent Threat of Ransomware: RSA Conference 2023 Highlights

The cybersecurity industry’s highest-profile annual gathering, the RSA Conference, has focused heavily on the ongoing and increasing threat of ransomware. Last year, 68% of all cyberattacks involved ransomware, according to cybersecurity firm Sophos.  The National Security Agency’s director of cybersecurity,…

Hackers are Breaking Into AT&T to Steal Cryptocurrency

In recent news, individuals with AT&T email addresses are being targeted by unknown hackers who are using their access to break into victims’ cryptocurrency exchange accounts and steal their digital assets. Cryptocurrency exchanges are online platforms that allow users to…

How AI is Helping Threat Actors to Launch Cyber Attacks

  Artificial intelligence offers great promise, and while many tech enthusiasts are enthusiastic about it, hackers are also looking to this technology to aid their illicit activities. The field of artificial intelligence is interesting, but it may also make us…

Ransomware Clop and LockBit Attacked PaperCut Servers

  A Microsoft spokesperson stated in a statement that recent attacks that exploited two vulnerabilities in the PaperCut print management software are likely associated with an affiliate program for the Clop ransomware.  PaperCut Application Server was updated last month with…

Chinese APT Group Hijacks Software Updates for Malware Delivery

An advanced persistent threat (APT) group from China, known as Evasive Panda, has been discovered to be hijacking legitimate software update channels of Chinese-developed applications to deliver custom malware to individuals in China and Nigeria for cyber-espionage purposes. Researchers from…

Google Takes Down Cryptbot Malware Infrastructure

Google has taken down the infrastructure and distribution network linked to the Cryptbot info stealer, a malware that was being used to infect Google Chrome users and steal their data. The move comes after the tech giant filed a lawsuit…

Your Details are Hidden on this Secret ID on Your Phone

  The amount of people who want to exploit your private information is staggering, from social media platforms to email providers. It is imperative to remember not only online stores but personal services as well.  Many online businesses rely heavily…

Attackers Can Hide Malicious Apps Using the Ghost Token Flaw

  The Google Cloud Platform (GCP) has recently been patched against a zero-day vulnerability called GhostToken, which allowed attackers to infect the platform to create an invisible and irrecoverable backdoor. A malicious attacker could exploit this flaw and gain access…

Automated Bots Pose Growing Threat To Businesses

The capability to detect, manage, and mitigate bot-based requests has become of utmost importance as cyber attackers become more automated. Edgio, a company created by the merging of Limelight Networks, Yahoo Edgecast, and Layer0, has unveiled its own bot management…

Industrial Espionage: Here’s All You Need to Know

  Cyberattacks are actively guarded against by all responsible firms. However, one security concern that many firms ignore is industrial espionage. Industrial espionage and cyberattacks are frequently carried out for the same reason: to steal confidential information.  Industrial espionage, on…