Once again, Microsoft has delayed the rollout of its controversial Recall feature for Copilot Plus PCs, which had been planned for December. It had been planned that the software giant would begin testing Recall with Windows Insiders in October,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Critical Security Vulnerability Found in LiteSpeed Cache Plugin: Urgent Update Advised for WordPress Users
A significant security flaw has been uncovered in the LiteSpeed Cache plugin, used by over 6 million WordPress sites, which could allow unauthorized visitors to gain administrator-level access. The vulnerability stems from a weakness in the plugin’s role simulation…
Chenlun’s New Phishing Schemes Target Big-Name Brands
A new phishing campaign unveiled by researchers from DomainTools is a phishing campaign on the go, deceiving users via fake text messages. The messages masquerade as trusted brands like Amazon to get the targets to give away sensitive data.…
Hacking Contest: How QNAP Overcame Critical Zero-Day Flaws
One recent event that highlights the relentless pace of this digital arms race is QNAP’s swift action to patch a second zero-day vulnerability. QNAP has addressed a second zero-day vulnerability that was exploited by security researchers during the recent Pwn2Own hacking…
Malvertising Campaign Hijacks Facebook Accounts to Propagate SYS01stealer
A new malvertising effort is using Meta’s advertising network to disseminate the SYS01 infostealer, a cybersecurity issue known to Meta and specifically Facebook users for collecting personal information. What distinguishes this attack is that it targets millions of people…
Business Email Compromise Soars in Q3 2024 as Cybercriminals Refine Tactics: VIPRE Report
Global cybersecurity provider VIPRE Security Group has published its Q3 2024 Email Threat Trends Report, revealing an alarming rise in business email compromise (BEC) and highlighting the evolving techniques cyber criminals are using to deceive employees and breach corporate…
ARPANET to Internet The First Connection That Changed the World
There have been sixty-four years since two men sent the first packet-switched data across a telephone line, and this was the birth of the Internet. To exchange information with each other, Charley Kline and Bill Duvall came up with the…
CrossBarking Exploit in Opera Browser Exposes Users to Extensive Risks
A new browser vulnerability called CrossBarking has been identified, affecting Opera users through “private” APIs that were meant only for select trusted sites. Browser APIs bridge websites with functionalities like storage, performance, and geolocation to enhance user experience. Most…
How Incogni Helps Protect Your Digital Privacy and Reduces Spam
Managing unwanted spam messages, calls, and emails has become a necessary part of online life today. Beyond annoyance, these can lead to identity theft, financial fraud, and other issues. Much of this activity is driven by advertisers and marketing…
India Cracks Down on Cybercrime with Warning Against Illegal Payment Gateways
In a sweeping move to combat organized cybercrime, India’s Ministry of Home Affairs (MHA), through the Indian Cybercrime Coordination Center (I4C), has issued a stark warning about illegal payment gateways reportedly run by transnational cyber criminals. These illicit gateways—PeacePay,…
Meta Infostealer Malware Network Taken Down by Authorities
In the course of Operation Magnus, the FBI has partnered with various international law enforcement agencies to seize the servers, software, and source code of the RedLine and Meta thieves as part of an investigation into these two cyber-crime…
New Tool Circumvents Google Chrome’s New Cookie Encryption System
A researcher has developed a tool that bypasses Google’s new App-Bound encryption cookie-theft defences and extracts saved passwords from the Chrome browser. Alexander Hagenah, a cybersecurity researcher, published the tool, ‘Chrome-App-Bound-Encryption-Decryption,’ after noticing that others had previously identified equivalent…
Why Ignoring Data Breaches Can Be Costly
Data breaches are now more rampant than ever, exposing passwords and payment details to hackers. You could be getting breach alerts that pop up every so often, warning you that your data has been exposed. It’s a wake-up call on…
Evasive Panda Unfurls Cloud Services Under Siege
Using stolen Web session cookies, Evasive Panda, a China-sponsored hacking team, has unveiled CloudScout, a sleek and professional toolset created to recover data from compromised cloud services. ESET researchers have discovered CloudScout through an investigation into a couple of…
India Faces Rising Ransomware Threat Amid Digital Growth
India, with rapid digital growth and reliance on technology, is in the hit list of cybercriminals. As one of the world’s biggest economies, the country poses a distinct digital threat that cyber-crooks might exploit due to security holes in…
Scammers Use Fake Centrelink Promises to Target Australians Online
Australians have been cautioned about a recent wave of scam websites falsely advertising significant Centrelink payments. These sites promise financial boosts, sometimes hundreds or thousands of dollars, to low-income residents and seniors, exploiting people facing financial challenges. Fraudsters create…
Unofficial Patches Published for New Windows Themes Zero-Day Exploit
Free unofficial fixes are now available for a new zero-day flaw in Windows Themes that allows hackers to remotely harvest a target’s NTLM credentials. NTLM has been extensively exploited in NTLM relay attacks, in which threat actors force susceptible…
Zero-Trust Log Intelligence: Safeguarding Data with Secure Access
Over the years, zero trust has become a popular model adopted by organisations due to a growing need to ensure confidential information is kept safe, an aspect that organisations view as paramount in cybersecurity. Zero-trust is a vital security…
Avoiding Social Media Scams When Recovering a Locked Gmail Account
Losing access to your Gmail account can be a frightening experience, especially given that Gmail is deeply integrated into the online lives of more than 2.5 billion users globally. Unfortunately, the popularity of Gmail has also attracted scammers who…
When and Why to Consider a Data Removal Service
With the risk of data misuse and breaches increasing daily, individuals will be driven to seek reliable methods for securing their online privacy in 2024 to manage these risks. A growing number of privacy solutions are available online now,…