< p style=”text-align: justify;”> Fortinet, a global leader in cybersecurity with a market valuation of approximately $75 billion, has acquired Israeli company Perception Point to bolster its email and collaboration security capabilities. While the financial terms of the deal…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Blue Yonder Cyberattack: A Wake-Up Call for Supply Chain Security
< p style=”text-align: justify;”>Blue Yonder, a prominent supply chain software provider used by major U.S. grocery chains like Safeway and Fred Meyer, is investigating a significant cyberattack. The ransomware group Termite has claimed responsibility, threatening to publish 680 gigabytes…
Misconfigured AWS Cloud Instances Lead to Sensitive Data Breaches
Misconfigured cloud instances have once again enabled cybercriminals to steal sensitive data, including credentials, API keys, and proprietary source code. This time, numerous Amazon Web Services (AWS) users fell victim, highlighting a lack of understanding regarding the shared responsibility…
The Intersection of Travel and Data Privacy: A Growing Concern
< p style=”text-align: justify;”>The evolving relationship between travel and data privacy is sparking significant debate among travellers and experts. A recent Spanish regulation requiring hotels and Airbnb hosts to collect personal guest data has particularly drawn criticism, with some…
Google’s Quantum Computing Leap: Introducing the “Willow” Chip
Google has made a significant stride in quantum computing with the announcement of its latest chip, named “Willow.” According to Google, this advanced chip can solve problems in just five minutes that would take the most powerful supercomputers on…
Lynx Ransomware Breach Targets Romania’s Electrica Group
The Romanian National Cybersecurity Directorate (DNSC) has confirmed that the Lynx ransomware gang successfully breached Electrica Group, a leading electricity supplier in Romania. About Electrica Group Electrica Group, initially part of the National Electricity Company (CONEL) in 1998, became…
Mandiant Uncovers QR Code Exploit to Bypass Browser Isolation
Mandiant researchers have discovered an innovative method to circumvent browser isolation technology by leveraging QR codes to establish command-and-control (C2) operations. This finding highlights potential vulnerabilities in existing web browser security measures. Understanding Browser Isolation Browser isolation is a…
Beware of Malicious USB-C Cables: Hidden Cyber Threats
In today’s tech-driven world, charging cables are indispensable. However, recent findings about compromised USB-C cables have highlighted significant risks associated with third-party accessories. Security experts warn that hackers can embed tiny computers within ordinary-looking cables, transforming them into tools…
Artivion Discloses Ransomware Attack, Disrupting Operations
< p style=”text-align: justify;”>Leading cardiac surgery medical device company Artivion has reported a ransomware attack that occurred on November 21, resulting in the encryption of certain systems and unauthorized data access. The incident forced the Atlanta-based company to take…
Deep Packet Inspection (DPI): Balancing Security and Privacy in the Digital Age
Deep Packet Inspection (DPI) is an advanced technology for analyzing internet traffic that goes beyond traditional techniques. Unlike standard firewalls that examine only the headers of data packets, DPI scrutinizes both headers and payloads, providing a comprehensive view of…
Cyber Threat Alert for South Korea from North Korean Hackers
In a recent cyber-espionage campaign targeted at the United States, North Korean state-linked hacker ScarCruft recently exploited a zero-day vulnerability in Internet Explorer to distribute RokRAT malware to targets nationwide. APT37, or RedEyes as it is sometimes called, is…
Forensic Analysis in the eXp Realty Case: Privacy and Evidence Integrity
< p style=”text-align: justify;”>In a recent video hearing for the case Acevedo v. eXp, related to a sexual assault claim, a judge deliberated on whether to grant a protective order that would prevent a forensic examination of eXp founder…
Critical Apple Security Vulnerability CVE-2024-44131 Patched: What You Need to Know
Jamf Threat Labs has identified a critical flaw in Appleās Transparency, Consent, and Control (TCC) framework, labeled CVE-2024-44131. This vulnerability allows malicious applications to bypass user consent protocols and access sensitive data without user awareness. The issue impacts both…
Can Data Embassies Make AI Safer Across Borders?
The rapid growth of AI has introduced a significant challenge for data-management organizations: the inconsistent nature of data privacy laws across borders. Businesses face complexities when deploying AI internationally, prompting them to explore innovative solutions. Among these, the concept…
VPN Server Switching: Benefits and Best Practices for Privacy and Speed
A VPN enhances online privacy by encrypting internet traffic and masking IP addresses. However, how often should you switch servers? The answer depends on your goals and usage patterns, as server hopping offers benefits but is not always necessary.…
Whatās Happening with 23andMe? Data Privacy and Uncertain Future
< p style=”text-align: justify;”>23andMe, a DNA analysis company, has been in turmoil lately. This September, the entire board of directors left due to differences with the CEO, and data was compromised in a 2023 hack. Anne Wojcicki, the CEO,…
Cybercrime Network Busted: Turning Airbnbs Into Fraud Centers
An international cybercrime network responsible for stealing millions of euros has been dismantled in a joint operation conducted in Belgium and the Netherlands. The Europol-coordinated effort led to eight arrests and 17 coordinated raids across the two countries on…
Why Medical Records Are Prime Targets for Cyberattacks and How to Stay Safe
Healthcare organizations have experienced a significant transformation, transitioning from paper-based records to digital systems. This change enables medical records to be accessed and updated anytime, improving coordination among hospitals, clinics, and specialists. Despite the advantages, digital storage poses significant challenges,…
Here’s Why You Need A New App After Google RCS Issue
Google Messages has suddenly gone haywire. After years of campaigning, the “seamless messaging” dream was finally realised, but it vanished as quickly as it arrived. Currently, the question is whether it has any prospect of ever returning. Like a…
Operation Digital Eye Reveals Cybersecurity Breach
It has been recently reported that a Chinese group of Advanced Persistent Threats (APTs) has carried out a sophisticated cyberespionage operation dubbed “Operation Digital Eye” against the United States. Between the end of June and the middle of July…