As artificial intelligence (AI) continues to advance, concerns about data privacy and security have become increasingly relevant. One of the latest AI systems to raise privacy concerns is ChatGPT, a language model based on the GPT-3.5 architecture developed by OpenAI.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Google’s Search Engine Received AI Updates
Microsoft integrated GPT-4 into Bing earlier this year, complementing the previous development. Google’s CEO, Sundar Pichai, recently announced that the company would completely reimagine how all of its core products, including search, are implemented. To ensure the success of…
Twitter Launches End-to-End Encrypted Messaging Services
Twitter has become the newest social media platform to be providing encrypted messaging service. End-to-end Encryption Direct messages delivered on the platform will be end-to-end encrypted, i.e. private and only readable by the sender and receiver. However, Chief executive Elon…
VMware ESXi Ransomware on the Rise Due to Leaked Babuk Code
Security experts claim to have discovered ten distinct ransomware families that have recently diverged from Babuk, a ransomware outbreak whose source code was exposed online in 2021. Hackers have been using leaked source code from well-known ransomware firms like…
WhatsApp Users Alerted About Possible Scam Calls From International Numbers
As per experts, if you’re receiving missed calls, messages, or WhatsApp calls from international numbers starting with +254, +84, +63, or others, it’s advised to “report and block” them. The Indian Cybercrime Coordination Centre (I4C) of the Home Ministry…
SideWinder APT Group: Victims in Pakistan and Turkey Stricken with Multiphase Polymorphic Attack
Government authorities and individuals in Turkey are apparently been targeted by India’s well-known SideWinder APT group, which is using polymorphism techniques, enabling bypass standard signature-based antivirus (AV) detection and deliver a next-stage payload. In an article published on their blog…
Here’s How Global Firms are Capturing First- & Zero-Party Data of Consumers
Changes in consumer privacy in the digital marketing environment are forcing firms to fundamentally rethink their data-driven marketing tactics. Consumers are becoming more conscious of the importance of their personal information. Simultaneously, tech titans and authorities worldwide are cracking…
Private Keys for Intel Boot Guard Have Reportedly Been Leaked, Jeopardizing the Security of Many PCs
Every other day, hackers are out there committing a new attack, exploiting a vulnerability, or attempting to extort people with ransomware. MSI is the latest victim, with hackers disclosing material acquired from a last-month breach of MSI’s systems. This…
Chinese Government to Ban TikTok Apps From Collecting U.S. Data
A spokesperson for TikTok issued a statement today responding to charges that the U.S. Congress was working to advance legislation. This would create another avenue for the US president to ban the popular video-sharing application from the country. There…
Adopting ChatGPT Securely: Best Practices for Enterprises
As businesses continue to embrace the power of artificial intelligence (AI), chatbots are becoming increasingly popular. One of the most advanced chatbots available today is ChatGPT, a language model developed by OpenAI that uses deep learning to generate human-like responses…
Here’s All You Know About Public Key Cryptography
Public key cryptography is one of the most efficient ways to ensure financial security, which is a crucial concern for organisations. This article will go into great detail about the advantages and disadvantages of this potent technology. We’ll look…
NextGen Data Breach, Personal Data of 1.5M Patients Hacked
NextGen Healthcare, the US-based electronic health record company, has recently revealed that their firm has suffered a breach in its systems, where hackers ended up stealing the personal data of more than one million patients, including roughly 4,000 individuals from…
Passwords and 2FA Codes Stolen by the Android FluHorse Malware
The latest Android malware named ‘FluHorse’ has been discovered which targets Eastern Asian users with malicious apps that look like legitimate versions with over a million installs and are designed to steal personal data and spread malware. Check Point…
Dish Network Hit by Cyberattack and Multiple Lawsuits
Satellite TV provider, Dish Network, recently suffered a ransomware attack that compromised the sensitive data of its customers and employees. The attack occurred in February 2023 and was only revealed by the company in April. Since then, the company has…
Verified Facebook Accounts Being Hijacked to Distribute Malware; Here’s How You Can Protect Yourself
Hackers have been caught getting into popular verified Facebook pages and using them to distribute malware through adverts on the social media behemoth. Matt Navarra, a social strategist, was the first to notice the harmful effort, exposing the danger…
IPFS Phishing Attacks: How Cybercriminals Exploit Decentralized File Storage
IPFS Phishing Attacks are becoming increasingly common as more users adopt the InterPlanetary File System (IPFS) technology to store and share files. This decentralized file storage system is designed to provide users with more control over their data and protect…
Learn How to Use the New Bing AI Image Generator in the Edge Browser
On April 7, Microsoft made its Image Creator tool, powered by OpenAI’s DALL-E 2 AI image generator, available to all Edge browser users on desktops worldwide, enabling them to create their own AI-generated images with ease. The Image Creator tool…
Emails With HTML Attachments are Still Popular Among Phishing Scammers
Cybercriminals are increasingly using malicious HTML files to attack computers, according to a recent study conducted by security researchers. In addition to this, Barracuda Networks’ study also revealed that malicious files now account for over half of all HTML…
Here’s How the FTX Collapse Turned into an Identity Issue
The cryptocurrency love affair has ended. After years of expansion and investment profits, everything came crashing down in November 2022 with the demise of the FTX Trading exchange. The devastation was evident. Since then, investors have abandoned cryptocurrency, a…
Cactus: New Ransomware Encrypts Itself to Evade Detection
Cactus, a newly discovered ransomware operation has apparently been exploiting vulnerabilities in VPN appliance vulnerabilities to gain initial access to the networks of “large commercial entities.” Although the new threat actor uses the usual file encryption and data stealing techniques…
AI Poses Greater Job Threat Than Automation, Experts Warn
Until a few months ago, the whole concern about machines taking over human employment revolved around automation and robots/humanoids. The introduction of ChatGPT and other generative artificial intelligence (AGI) models has triggered a real and more serious threat. What…
Enterprise Targeted by Akira Ransomware’s Extortion Techniques
A new ransomware operation called Akira has been found targeting enterprise organizations. According to reports, Akira ransomware is a relatively new strain that is used in targeted attacks and is designed to infiltrate enterprise networks. The ransomware is primarily distributed…
Understanding the TikTok Ban: A CISO’s Perspective on the Implications for Enterprises
As the federal government considers a potential ban on the popular video-sharing app TikTok, many enterprises are beginning to ponder the implications such a move could have on their operations. As Chief Information Security Officers (CISOs) evaluate their companies’ risks,…
How the Economy is Impacting Cybersecurity Teams
A recent study conducted by HackerOne, the world’s largest ethical hacker community, revealed that half of the surveyed organizations experienced a surge in cybersecurity vulnerabilities in the last year. This alarming trend has been attributed to security budget cuts and…
Deloitte Launches Blockchain Integration for Digital Credentials
One of the “Big Four” accounting firms, Deloitte, is in the forefront of the adoption of blockchain technology to transform the issue of digital credentials. KILT’s blockchain technology will be used to create reusable digital credentials for Know Your…
Study: Artificial Intelligence is Fueling a Rise in Online Voice Scams
In accordance with McAfee, AI technology is supporting an increase in online speech scams, with only three seconds of audio required to duplicate a person’s voice. McAfee studied 7,054 people from seven countries and discovered that one-quarter of adults…
Protecting Your Privacy on ChatGPT: How to Change Your Settings
OpenAI’s ChatGPT is an advanced AI language model that has been trained on vast amounts of text data from the internet. However, recent concerns have arisen regarding data privacy and the use of personal data by AI models like ChatGPT.…
Pentagon Weapons Systems Have ‘Nearly All’ Vulnerabilities
It appears as though the United States has penetrated Russian military and intelligence services deeply in the past year, as evidenced by the revelations of secret Pentagon documents that have been leaked online through social media, revealing that Washington…
New Way to Exploit PaperCut Vulnerability Detected
Cybersecurity professionals have recently discovered a new way to exploit a new critical vulnerability in PaperCut servers in a way that gets past all current detections. The flaw, tracked as CVE-2023-27350 (CVSS score 9.8), which affects PaperCut MF or NG…
Kimsuky Spear-Phishing Campaign Goes Global Using New Malware
On Thursday, security researchers from SentinelOne reported that the North Korean state-sponsored APT group, Kimsuky, has been observed utilizing a brand new malware component called ReconShark. The malware is disseminated through spear-phishing emails that are specifically targeted, containing OneDrive links…
The Rising Popularity of Remote Browser Isolation
The Importance of Browser Isolation in a Remote Work Environment The COVID-19 pandemic has caused a seismic shift in the way we work, with remote work becoming the norm for many organizations. While this has brought numerous benefits, it has…
Russian Hackers use WinRAR as Cyberweapon
Russian hackers are known for their notorious cyber-attacks. They have once again been accused of using a popular file compression software, WinRAR, to launch an attack on a state agency in Ukraine. The attack wiped out the agency’s data, resulting…
RFK Jr. Criticizes Crypto, Following Anti-CBDC Remark
On Tuesday, US Democratic presidential candidate Robert F. Kennedy has taken another dig at cryptocurrency, following earlier comments he made opposing a U.S. central bank digital currency, or CBDC. His tweets came out swinging on defense of the digital assets…
Bangladeshi Hacker Group Targets Multiple Indian News Agencies
An update regarding the cyberattack on Alt News has brought up cybersecurity news in Indian media once more. After focusing on Indian news agency ANI News for a few hours, the threat actor group “Mysterious Team Bangladesh” has now…
Constellation Software Cyberattack Claimed by ALPHV
According to the ALPHV/BlackCat ransomware group’s claims, Constellation Software’s network was compromised as a result of a cyberattack, it was also mentioned in the recent posting on the ransomware gang’s leak site. Essen Medical Associates, as well as a…
OpenAI’s Regulatory Issues are Just Getting Started
Last week, OpenAI resolved issues with Italian data authorities and lifted the effective ban on ChatGPT in Italy. However, the company’s troubles with European regulators are far from over. ChatGPT, a popular and controversial chatbot, faced allegations of violating…
Global Ransomware Attack Targets VMware ESXi Servers
Cybersecurity firms around the world have recently warned of an increase in cyberattacks, particularly those targeting corporate banking clients and computer servers. The Italian National Cybersecurity Agency (ACN) recently reported a global ransomware hacking campaign that targeted VMware ESXi servers,…
TikTok Tracked UK Journalist via her Cat’s Account
Cristina Criddle, a technology correspondent for the Financial Times, received a call from TikTok two days before Christmas, informing her that four employees (two in China and two in the US) had successfully accessed user data from her personal account…
Dragon Breath’s Latest Double-Clean-App Technique Targeting Gambling Industry
The Double-Clean-App Technique Explained The Dragon Breath APT group is known for its sophisticated cyber-attacks on a wide range of industries, including the gambling industry. Recently, security researchers have uncovered the group’s latest technique: the use of the double-clean-app method…
This New Android FluHorse Malware Steals Passwords & 2FA Codes
A new Android malware known as ‘FluHorse’ has been uncovered, which targets users in Eastern Asia with fake applications that seem like legitimate versions. Check Point Research uncovered the malware, which has been targeting various regions of Eastern Asia…
US Government Takes Down Try2Check Services Used by Dark Web Markets
The US Government, on Wednesday, announced that it had taken down the credit card checking tool ‘Try2Check’ that apparently gave cybercrime actors access to bulk purchases and sale of stolen credit card credentials to check which cards were legitimate and…
UK Banks Issue a Warning Regarding an Upsurge in Internet Scams
Banks have issued a warning about a sharp rise in fraud in 2022, much of it coming from online sources. 77% of frauds now take place on dating apps, online markets, and social media., Barclays reported. According to TSB, the…
A New FTC Rule Prohibits Data Mining by Minors for Meta-Profits
As a result of an investigation by the Federal Trade Commission, Meta’s Facebook (NASDAQ: META) was accused of misleading parents about their kids’ protection, and the commission proposed tightening existing privacy agreements and preventing profit from minors’ personal information. …
Online Predators Target Children’s Webcams, Study Finds
The Internet Watch Foundation has reported a significant rise in the production of sexual abuse images using webcams and similar recording equipment across the globe. The increase has been staggering, with the number of such images having multiplied ten…
Google is Phasing Out Passwords and Adopting Passkeys: Here’s What You Should Know
Users will soon be able to log in to their Google accounts without ever having to remember a single password again, according to the firm. Instead, Google is betting big on passkeys, which are cryptographic keys kept on your…
The Ransomware Gang Targets University Alert Systems
“RamAlert,” an emergency broadcast system used by Bluefield University to communicate with its students and staff, has been hijacked by the Avos ransomware gang. The gang sent SMS texts and emails informing them that their data had been stolen…
Mobile Menace: McAfee’s 2023 Report on the Top Mobile Threats
Mobile Data Security: Insights from McAfee’s 2023 Consumer Mobile Threat Report Mobile devices are an essential part of our lives today. From staying connected with our loved ones to handling our finances and work-related tasks, smartphones have become indispensable. However,…
CERT-In Warns Of ‘Royal Ransomware’ Virus Attacking India’s Critical Sectors
Indian citizens and organisations have been alerted about the Royal Ransomware virus by the Indian Computer Emergency Response Team (CERT-In). This malicious malware targets key infrastructure industries, such as manufacturing, communications, healthcare, and education, as well as individuals, encrypting…
Imperva Red Team Patches a Privacy Vulnerability in TikTok
The Imperva Red Team has recently identified a vulnerability in TikTok, apparently allowing threat actors to look into users’ activities over both mobile and desktop devices. The vulnerability, which has now been patched, was the result of a window message…
FTC Proposes Ban on Meta Profiting Off Children’s Data
The Federal Trade Commission (FTC) has accused Facebook of violating its 2019 privacy agreement by allowing advertisers to target children with ads based on their activity on other apps and websites. The FTC has proposed a ban on Meta from…
Religious Institutions Become the Latest Focus of Cybercrime Groups
Over the weekend, two long-standing malicious groups declared their responsibility for attacking religious organizations. This marks a new direction for these groups, as they typically target corporations and government agencies rather than religious institutions. On Saturday, the LockBit ransomware group…
Online Predators are Targeting Children Webcams
The Internet Watch Foundation reports that since 2019, there has been an increase in sexual abuse imagery generated with webcams and other recording devices worldwide. One of the most frequently used platforms to contact kids is social media chatrooms, through…
Fight over Kids Online Safety Act Sparks Debate, as Bill Gains Support in Congress
The Kids Online Safety Act, or KOSA, is a newly reintroduced legislation aimed at improving the mental health and safety of children by imposing restrictions on tech companies. Although it is gaining support in Congress, civil liberties groups are…
Cryptocurrency Exchanges Linked to Ransomware
Nine cryptocurrency exchange websites have been taken down by the FBI and the Ukrainian police in a daring joint operation. Cybercriminals and ransomware gangs use these websites to launder money for cybercriminals. This is because these websites facilitate money…
Vulnerability in Oracle Property Management Software Puts Hotels at Risk
The hundreds of hotels and other hospitality-related organisations across the globe who use Oracle’s Opera property management system may wish to immediately patch a bug that Oracle revealed in its April 2023 security update. Only an authenticated attacker with…
Inside the Carrington Mortgage Services Ransomware Attack: Compromised Data and Cybersecurity Measures
The Carrington Mortgage Services Ransomware Attack Cybersecurity incidents have become increasingly common in the mortgage industry, with multiple lenders and servicers experiencing data breaches that compromised sensitive customer information. Carrington Mortgage Services is the latest player to be impacted, as…
Top Victim of AI Voice Scams with 83% Losing Money
A new report has revealed that India tops the list of countries most affected by AI-powered voice scams. The report, released by cybersecurity firm McAfee, shows that 83% of Indians who fell victim to voice scams lost money, making them…
Absolute’s 2023 Resilience Index: America’s Cybersecurity
Recently, the White House has come up with a new national cybersecurity strategy called ‘Absolute’s 2023 Resilience Index’, it will hold software companies responsible for products’ security. The document unveiled by the government includes regulations for vulnerable critical infrastructure firms…
Businesses Must Stay up With Cybercriminals, as They Become More Sophisticated
As much as we may want to tune out when we hear about cybersecurity, it is an issue that cannot be ignored. Cybercrime is a constant threat to businesses and individuals alike, and the risks are too great to…
Google Ads Exploited to Tempt Corporate Employees Into Installing LOBSHOT Backdoor
As part of a sophisticated scheme to trick corporate employees into installing malware, a newly uncovered backdoor and credential-stealer is disguising itself as a genuine software download. Elastic Software researchers spotted the malware, known as LOBSHOT, spreading through deceptive…
ChatGPT Privacy Concerns are Addressed by PrivateGPT
Specificity and clarity are the two key ingredients in creating a successful ChatGPT prompt. Your prompt needs to be specific and clear to ensure the most effective response from the other party. For creating effective and memorable prompts, here…
Marshals’ Computer System Still Down 10 Weeks After Hack
A computer system used by the U.S. Marshals Service to track and hunt fugitives remains down 10 weeks after a hack, raising concerns about the effectiveness of the agency’s surveillance efforts. The hack, which occurred in February, forced the Marshals…
Hackers Sell Coinbase Accounts for as low as $610 on Dark Web
The emerging popularity of cryptocurrency and the convenience of online banking has resulted in an upsurge in cybercrime activities and identity fraud. A recent research by PrivacyAffairs.com notes that hackers target social media logins, credit card numbers, and online banking…
Uncovering the Decoy Dog C2 Exploit: Infoblox’s Finds Dangerous Threat
Finding recent reports on Domain Name System (DNS) attacks may prove difficult as a report by IDC in 2021 highlighted that 87% of organizations encountered a DNS attack in 2020. Despite this, DNS is not typically considered a prominent target…
50 Chinese Hackers for Each FBI Cyber Agent, Bureau Boss Says
According to the FBI’s Christopher Wray, a senior official at the Federal Bureau of Investigation, Chinese hackers greatly outnumber American cyber intelligence agencies. A plea was made for more money to be given to the agency by him. It…
Hackers Leak Photos to Mock Western Digital’s Cyberattack Response
The ALPHV ransomware operation, also known as BlackCat, has shared screenshots of internal emails and video conferences seized from Western Digital, revealing that they likely continued to have access to the firm’s systems even while the company responded to…
Google Play Blocked 1.43 Million Malicious Apps in 2022
Google Play store is a very popular app downloader for Android devices because of the heavy presence of people on this store, for reasons alike it has often been targeted by cybercriminals who create malicious apps that are designed to…
Data Leak: Critical Data Being Exposed From Salesforce Servers
According to a post by KrebsOnSecurity published on Friday, servers running Salesforce software are leaking private data controlled by governmental bodies, financial institutions, and other businesses. According to Brian Krebs, Vermont had at least five websites that gave anyone access…
Top 5 Reasons Why Cybersecurity is Essential For Organisations
A company’s information is its focal point, around which everything else revolves. Therefore, the significance of information security cannot be understated. By maintaining a strict cybersecurity policy, your organisation can prevent data breaches, unauthorised access, and other serious dangers…
The Dangers of Bluebugging: Andhra Pradesh Police Caution Smartphone Users
The Andhra Pradesh police have issued a warning to smartphone users about a hacking technique called ‘blue bugging.’ “It is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection,” said Prakasam district SP Malika…
SLP Vulnerability Exposes Devices to Powerful DDoS Attacks
Security researchers have recently discovered a new vulnerability that has the potential to launch devastating Distributed Denial of Service (DDoS) attacks. The Server Message Block (SMB) protocol, which is widely used in various devices and systems, including Windows machines and…
Healthcare Institutions at Risk Due to Reliance on Technology
As the healthcare system has become more technology-driven, there has been a significant increase in the use of cloud-based and internet applications for delivering facilities. Unfortunately, this has also resulted in an increase in cybersecurity-related risks including breaches, scams, and…
Utilising Multiple Solutions Makes Your Zero Trust Strategy More Complex
According to BeyondTrust, business operational models are much more complicated now than they were a few years ago. Integration with zero trust More applications, information stored and moving through the cloud, remote personnel accessing critical systems and data, and…
Defending Against Adversarial Attacks in Machine Learning: Techniques and Strategies
As machine learning algorithms become increasingly prevalent in our daily lives, the need for secure and reliable models is more important than ever. However, even the most sophisticated models are not immune to attacks, and one of the most significant…
Forum Database Sold Online After Kodi Data Breach
Hackers have breached the Kodi Foundation’s MyBB forum database, stealing user information such as email addresses and private messages which were tried to be sold online. In other words, it is an open-source, cross-platform media player, organizer, and streaming…
The Threat of Deepfakes: Hacking Humans
Deepfake technology has been around for a few years, but its potential to harm individuals and organizations is becoming increasingly clear. In particular, deepfakes are becoming an increasingly popular tool for hackers and fraudsters looking to manipulate people into giving…
Illumina: FDA, CISA Warns Against Security Flaw Making Medical Devices Vulnerable to Remote Hacking
The US Government has issued a warning for healthcare providers and lab employees against a critical flaw, discovered in the genomics giant Illumina’s medical devices, used by threat actors to alter or steal sensitive patient medical data. On Thursday, US…
This New macOS Info-stealer in Town is Targeting Crypto Wallets
A new info-stealer malware has been identified, designed to steal a wide range of personal data, comprising local files, cookies, financial information, and passwords stored in macOS browsers. It’s called Atomic macOS Stealer (aka AMOS, or simply Atomic), and…
Targeted: Hackers Exploit Vulnerable Veeam Backup Servers with FIN7 Tactics
Cyberattacks on vulnerable Veeam backup servers exposed online Veeam Backup and Replication software is a popular choice for many organizations to protect their critical data. However, recent reports have revealed that hackers are targeting vulnerable Veeam backup servers that are…
The Persistent Threat of Ransomware: RSA Conference 2023 Highlights
The cybersecurity industry’s highest-profile annual gathering, the RSA Conference, has focused heavily on the ongoing and increasing threat of ransomware. Last year, 68% of all cyberattacks involved ransomware, according to cybersecurity firm Sophos. The National Security Agency’s director of cybersecurity,…
Hackers are Breaking Into AT&T to Steal Cryptocurrency
In recent news, individuals with AT&T email addresses are being targeted by unknown hackers who are using their access to break into victims’ cryptocurrency exchange accounts and steal their digital assets. Cryptocurrency exchanges are online platforms that allow users to…
Amnesty International Takes a While to Disclose the Data Breach From December
Amnesty International Australia notified supporters via email last Friday that their data might be at risk owing to “anomalous activity” discovered in its IT infrastructure. The email was sent extremely late in the day or week, but it was…
This New macOS Info-stealer in Town is Targeting Crypto Wallets
A new info-stealer malware has been identified, designed to steal a wide range of personal data, comprising local files, cookies, financial information, and passwords stored in macOS browsers. It’s called Atomic macOS Stealer (aka AMOS, or simply Atomic), and…
Survivors Call for Enhanced Online Protection, Wikipedia Rejects Age Checks
A Wikipedia organization has warned that the website could become inaccessible to UK readers if it fails to comply with online safety legislation. The Online Safety Bill includes some requirements regarding verification and age-gating. Wikipedia has stated that these…
Atomic macOS Malware: New Malware Steals Credit Card Credentials in Chrome
A brand-new malware has apparently been targeting macOS. The malware, according to BleepingComputer, is named “Atomic” and was being sold to cybercriminals in darknet markets for $1,000 a month. A victim management UI that is simple to use and gives…
Fake Reviews and Subscription Traps to be Banned Under New Bill in UK
As part of the modifications planned under new rules, buying, selling, or hosting bogus reviews would become unlawful. The UK government’s new Digital Markets, Competition, and Consumer Bill intends to benefit consumers while increasing competition among large technology corporations. …
How AI is Helping Threat Actors to Launch Cyber Attacks
Artificial intelligence offers great promise, and while many tech enthusiasts are enthusiastic about it, hackers are also looking to this technology to aid their illicit activities. The field of artificial intelligence is interesting, but it may also make us…
Ransomware Clop and LockBit Attacked PaperCut Servers
A Microsoft spokesperson stated in a statement that recent attacks that exploited two vulnerabilities in the PaperCut print management software are likely associated with an affiliate program for the Clop ransomware. PaperCut Application Server was updated last month with…
Chinese APT Group Hijacks Software Updates for Malware Delivery
An advanced persistent threat (APT) group from China, known as Evasive Panda, has been discovered to be hijacking legitimate software update channels of Chinese-developed applications to deliver custom malware to individuals in China and Nigeria for cyber-espionage purposes. Researchers from…
DOJ Prioritizes Disruptions Over Arrests in Cyberattack Cases
The Department of Justice is requesting its prosecutors and investigators to focus less on prosecutions and more on disruption and protection when it comes to cyberattacks, according to US Deputy Attorney General Lisa Monaco, who spoke to attendees at…
Google Takes Down Cryptbot Malware Infrastructure
Google has taken down the infrastructure and distribution network linked to the Cryptbot info stealer, a malware that was being used to infect Google Chrome users and steal their data. The move comes after the tech giant filed a lawsuit…
Your Details are Hidden on this Secret ID on Your Phone
The amount of people who want to exploit your private information is staggering, from social media platforms to email providers. It is imperative to remember not only online stores but personal services as well. Many online businesses rely heavily…
This AI Tool Can Crack Your Password in Sixty Seconds; Here’s How to Protect Yourself
Even though ChatGPT may be the AI that everyone is thinking about right now, chatbots aren’t the only AI tool that has emerged in recent times. DALL•E 2 and Runway Gen 2 are just two examples of AI picture…
The US Cyber Command is Deploying Experts Abroad to Assist Collaborators in Detecting Hackers
The US government’s Cyber National Command Force (CNCF) is deploying professionals abroad in “hunt forward” operations to assist partner countries in tackling cybercrime and has undertaken 47 operations in 20 countries in the last three years. Though this could…
DDoS is Emerging as the Most Important Business Concern for Edge Networks
Businesses are particularly concerned about distributed denial-of-service (DDoS) attacks because they believe they will have the most impact on their operations. This was one of the key conclusions of AT&T’s “2023 Cybersecurity Insights Report,” which was based on a…
Beware of This Dangerous Android malware As It Can Hold Your Phone Hostage
A brand-new Android malware has been discovered in the wild that is capable of evading antivirus apps, stealing a tonne of private and financial information, and even encrypting all of the contents on an infected smartphone by using ransomware. …
Attackers Can Hide Malicious Apps Using the Ghost Token Flaw
The Google Cloud Platform (GCP) has recently been patched against a zero-day vulnerability called GhostToken, which allowed attackers to infect the platform to create an invisible and irrecoverable backdoor. A malicious attacker could exploit this flaw and gain access…
Automated Bots Pose Growing Threat To Businesses
The capability to detect, manage, and mitigate bot-based requests has become of utmost importance as cyber attackers become more automated. Edgio, a company created by the merging of Limelight Networks, Yahoo Edgecast, and Layer0, has unveiled its own bot management…
Industrial Espionage: Here’s All You Need to Know
Cyberattacks are actively guarded against by all responsible firms. However, one security concern that many firms ignore is industrial espionage. Industrial espionage and cyberattacks are frequently carried out for the same reason: to steal confidential information. Industrial espionage, on…
Canada Attempts to Control Big Tech as Data Gets More Potent
Whether you’re booking a flight, opening a new bank account, or buying groceries, a select few well-known brands control the majority of the market. What this means for the nation’s goods—and prices—is examined in the Canadian Press series Competition…