A team of researchers has demonstrated that it is possible to steal an artificial intelligence (AI) model without actually gaining access to the device that is running the model. The uniqueness of the technique lies in the fact that…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Rhode Island Residents Warned of Cyberattack Targeting State Government
Rhode Island officials have issued an urgent advisory for residents to take immediate precautions following a significant cyberattack on the state government. Authorities are warning that private data, including Social Security and bank account details, may soon be exposed…
Ymir Ransomware: A Rising Threat in the Cybersecurity Landscape
< p style=”text-align: justify;”>The evolving threat landscape continues to present new challenges, with NCC Group’s latest Threat Pulse report uncovering the emergence of Ymir ransomware. This new ransomware strain showcases the growing collaboration among cybercriminals to execute highly sophisticated…
Malware Found Preinstalled on 30,000 Android Devices in Germany
A concerning cybersecurity issue has surfaced in Germany, where investigators uncovered that nearly 30,000 Android devices were sold with preinstalled malware. The malware, dubbed “BadBox,” resides in the device firmware and affects various internet-enabled devices, including digital picture frames…
Google Warns Users About Privacy Risks Posed by Certain Android Apps
It has recently been reported by a leading media outlet that more than 11 million Android devices have been infected with malicious software known as the Necro Trojan, which has crept into phones and tablets through unofficially modified applications,…
Bitcoin Hits $100,000 for the First Time Amid Market Volatility
< p style=”text-align: justify;”> The cryptocurrency market reached a historic milestone this week as Bitcoin closed above $100,000 for the first time in history. This marks a defining moment, reflecting both market optimism and growing investor confidence. Despite reaching…
U.S. Justice Department Shuts Down Rydox Cybercrime Marketplace
< p style=”text-align: justify;”>The U.S. Justice Department announced on Thursday the successful seizure and dismantling of Rydox, a notorious online marketplace for trafficking stolen personal information and cybercrime tools. In a coordinated operation with international law enforcement agencies, three…
OTP Scams Decline in Bengaluru as Sophisticated Cybercrimes Surge in 2024
Bengaluru has witnessed a significant drop in traditional cybercrimes like One-Time Password (OTP) scams and phishing, but more advanced and sophisticated scams, such as digital arrest fraud and stock investment schemes, have been on the rise. Data obtained by…
Massive Data Breach Puts Millions at Risk During Christmas Season
< p style=”text-align: justify;”>As the Christmas season approaches, millions of U.S. citizens could face a potential holiday nightmare after a major data breach exposed 5 million unique credit and debit card details online. The leak threatens to compromise countless…
Pumakit Rootkit Challenges Linux Security Systems
According to the researchers from the Elastic Security Lab, a new rootkit called PUMAKIT can perform various advanced evasion mechanisms. When Elastic Security researchers discovered PUMAKIT while routinely hunting for threats on VirusTotal, they described it as PUMAKIT. Many…
IOCONTROL Malware: A Threat to Critical Infrastructure in Israel and the United States
A newly identified malware, IOCONTROL, is causing widespread alarm as it targets critical infrastructure in Israel and the United States. Developed by Iranian hackers, IOCONTROL is specifically designed to attack Internet of Things (IoT) devices and operational technology (OT)…
Citrix Expands Platform Capabilities with DeviceTrust and Strong Network Acquisitions
< p style=”text-align: justify;”>Citrix, a business unit of Cloud Software Group, has acquired DeviceTrust and Strong Network to enhance the functionality of its platform. These acquisitions enable Citrix to offer more comprehensive access management and security solutions, expanding its…
Critical Security Flaw in “Hunk Companion” Plugin Exploited by Hackers
Hackers are actively exploiting a serious security vulnerability in the “Hunk Companion” plugin to install and activate other plugins that contain known vulnerabilities from the WordPress.org repository. This targeted attack allows the installation of plugins with a variety of…
Critical Vulnerability Found in Cleo’s File-Sharing Tools: Immediate Action Required
< p style=”text-align: justify;”>A critical security vulnerability has been discovered in Cleo’s popular file-sharing tools, including Cleo Integration Cloud, Cleo Harmony, and Cleo VLTrader. This flaw puts businesses and users at significant risk of cyberattacks, prompting cybersecurity experts to…
MITRE’s Latest ATT&CK Evaluations Reveal Critical Insights into Cybersecurity Solutions
< p style=”text-align: justify;”>MITRE Corporation has published its findings from the latest round of ATT&CK evaluations, offering important insights into the effectiveness of enterprise cybersecurity solutions. This sixth evaluation assessed 19 vendors against two major ransomware strains, Cl0p and…
File-Sharing Tools Under Attack: What Users Need to Know
A serious flaw has been found in three widely used file-sharing tools, putting several organizations at risk of security breaches. The three tools affected, LexiCom, VLTransfer, and Harmony, are all developed by Cleo, a company focused on managed file…
Group-IB Unveils Sophisticated Phishing Campaign Targeting Global Organizations
A recent report by Group-IB has exposed a highly advanced phishing campaign targeting employees from 30 companies across 15 jurisdictions. Using trusted domains and cutting-edge personalization techniques, attackers have bypassed Secure Email Gateways (SEGs) and exploited victims in critical…
Active Exploitation of Cleo Communications’ File Transfer Software Exposes Critical Vulnerabilities
< p style=”text-align: justify;”>Cleo Communications’ file transfer software is under active attack, with security researchers from Huntress revealing that a recently issued patch fails to address the critical flaws being exploited. This ongoing vulnerability poses a significant threat to…
Is Bitcoin Vulnerable to Google’s Quantum Breakthrough?
Earlier this month, Google CEO Sundar Pichai announced the creation of their new quantum computing chips called “Willow“, which caused a few ripples in the Bitcoin investment community, but also caused some skepticism among Bitcoin skeptics due to the…
Data Breach at Datavant Exposes Thousands of Minors to Cyber Threats
< p style=”text-align: justify;”>While cybercriminals often target adults for their valuable financial and personal information, children are not exempt from these risks. This was made evident by a recent data breach involving health IT company Datavant, which exposed sensitive…