Last week, Hong Kong launched its first generative artificial intelligence (AI) model, HKGAI V1, ushering in a new era in the city’s AI development. The tool was designed by the Hong Kong Generative AI Research and Development Centre (HKGAI)…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Android TV Users Watch Out: Dangerous Vo1d Botnet Hits 1.6 Million Devices
Hackers are upping their game, getting better through attacks and strategies. The latest incident of this rise is the disturbing spread of the Vo1d malware botnet. Vo1d is a highly sophisticated malware and infected around 1,590,299 Android TV devices throughout…
Hacker Leaks Stolen Data After Cyberattack on Orange Group
A hacker has claimed responsibility for breaking into the systems of Orange Group, a well-known French telecommunications provider. The attacker alleges that they stole a large number of internal files, including confidential details about customers and employees. After failing…
Samsung Secure Folder Vulnerability Exposes Hidden Images
Samsung’s Secure Folder, a feature designed to provide industry-grade security for sensitive data on Galaxy smartphones, has been identified to have a major flaw. Recent discoveries indicate that apps and images saved in the Secure Folder can be accessible…
North Korea-Linked Hackers Target Crypto with RustDoor and Koi Stealer
A significant amount of malware has become a common threat to Mac OS systems in today’s rapidly developing threat landscape. The majority of these threats are associated with cybercriminal activities, including the theft of data and the mining of…
The Need for Unified Data Security, Compliance, and AI Governance
Businesses are increasingly dependent on data, yet many continue to rely on outdated security infrastructures and fragmented management approaches. These inefficiencies leave organizations vulnerable to cyber threats, compliance violations, and operational disruptions. Protecting data is no longer just about…
Cisco Talos Uncovers Lotus Blossom’s Multi-Campaign Cyber Espionage Operations
Cisco Talos has uncovered a series of cyber espionage campaigns attributed to the advanced persistent threat (APT) group Lotus Blossom, also known as Spring Dragon, Billbug, and Thrip. The group has been active since at least 2012, targeting government, manufacturing,…
Lee Enterprises Confirms Ransomware Attack Impacting 75+ Publications
Lee Enterprises, a major newspaper publisher and the parent company of The Press of Atlantic City, has confirmed a ransomware attack that disrupted operations across at least 75 publications. The cybersecurity breach caused widespread outages, impacting the distribution of…
Google Cloud Introduces Quantum-Safe Digital Signatures
As quantum computing advances, Google Cloud is taking a significant step toward securing its platform against future threats. The company has announced the introduction of quantum-safe digital signatures in its Cloud Key Management Service (KMS), currently available in preview. …
GitHub Scam: Fake Game Mods Steal User Credentials and Data
An advanced malware campaign exploiting GitHub repositories masked as game mods (and cracked software) has been found, revealing a risky blend of automated credential harvesting and social engineering tactics. While going through articles on social engineering, cybersecurity expert Tim found…
DBS Bank to Cut 4,000 Jobs Over Three Years as AI Adoption Grows
Singapore’s largest bank, DBS, has announced plans to reduce approximately 4,000 temporary and contract roles over the next three years as artificial intelligence (AI) takes on more tasks currently handled by human workers. The job reductions will occur through natural…
Scammers Exploit Google and PayPal’s Infrastructure to Steal Users Private Data
Cybersecurity experts discovered a sophisticated phishing campaign that used Google Ads and PayPal’s infrastructure to defraud users and obtain sensitive personal information. The attackers abused vulnerabilities in Google’s ad standards and PayPal’s “no-code checkout” feature to create fake payment…
AI-Driven Changes Lead to Workforce Reduction at Major Asian Bank
Over the next three years, DBS, Singapore’s largest bank, has announced plans to reduce the number of employees by approximately 4,000 by way of a significant shift toward automation. A key reason for this decision was the growing adoption…
Lending App Data Breach Leaves Sensitive Customer Information Unprotected
A major digital lending platform has reportedly exposed sensitive customer data due to a misconfigured Amazon AWS S3 bucket that was left unsecured without authentication. Security researchers discovered the breach on November 28, 2024, but the issue remained unresolved…
FBI Warns: ‘Ghost’ Ransomware Is Spreading— Here’s How to Stay Safe
The Federal Bureau of Investigation (FBI) has released an urgent alert about a growing cyber threat known as Ghost ransomware. This group has been attacking various organizations across more than 70 countries, locking victims out of their own systems…
Crypto Scammers Are Targeting AI Trade Bots
The blockchain security company CertiK disclosed how a new generation of scammers is changing their tactics to target automated trading bots in the wake of the LIBRA meme currency fiasco, in which insiders were given advanced information of the…
These Four Basic PC Essentials Will Protect You From Hacking Attacks
There was a time when the internet could be considered safe, if the users were careful. Gone are the days, safe internet seems like a distant dream. It is not a user’s fault when the data is leaked, passwords are…
Strengthening PC Security with Windows Whitelisting
Windows Defender, the built-in antivirus tool in Windows, provides real-time protection against malware by scanning for suspicious activity and blocking known threats using an extensive virus definition database. However, no antivirus software can completely prevent users from unknowingly installing…
Default Password Creates Major Security Risk for Apartment Complexes
Under research conducted by security researchers, it was discovered that a widely used door access control system includes an inherently insecure default password. Thousands of buildings across the country have insecure default passwords that can be accessed easily and…
Stalkerware: How Scammers Might Be Tracking Your Phone and What You Can Do
Spyware applications designed to secretly monitor people’s phones are becoming more common. These programs, known as stalkerware, can track private messages, calls, photos, locations, and other personal data without the user’s knowledge. Often installed without permission, they operate silently…