Hackers are using WordPress sites to install malicious plugins that propagate malware that steals information by displaying fake updates and errors. Infostealing malware has become a global nuisance for security defenders in recent years, as compromised credentials are used…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
How Ignoring These Wi-Fi Settings Can Leave You Vulnerable to Hackers
In today’s plugged-in world, most of us rely on the Internet for nearly everything from shopping and banking to communicating with family members. Whereas increasing reliance on the internet has exposed opportunities for doing just about anything remotely, it…
Critical Flaw in Open Policy Agent Exposed NTLM Credentials, Patch Released
A now-resolved security vulnerability in Styra’s Open Policy Agent (OPA) could have exposed New Technology LAN Manager (NTLM) hashes, potentially leading to credential leakage. If exploited, the flaw allowed attackers to capture the NTLM credentials of the OPA server’s…
WeChat’s Updated Encryption System Prone to Threats for its Users
More than a billion people send messages over WeChat and as per a new study recently, it discovered some security flaws in terms of the encryption system. While some applications use end-to-end encryption to prevent secret conversations from being…
The Impact of Google’s Manifest V3 on Chrome Extensions
Google’s Manifest V3 rules have generated a lot of discussion, primarily because users fear it will make ad blockers, such as Ublock Origin, obsolete. This concern stems from the fact that Ublock Origin is heavily used and has been…
Old Redbox Kiosks Hacked to Expose Customers’ Private Details
DVD Rental Service Redbox may be a thing of the past, but the data privacy issues it created for users may persist for some time. Redbox allows users to rent DVDs from its 24,000 autonomous kiosks throughout the United…
Western Digital Fined Over $310 Million for Patent Infringement
In a landmark case, data storage major Western Digital has been asked to pay the highest fine of $315.7 million for violating patents associated with data encryption technology. SPEX Technologies owns these patents, having acquired them from Spyrus that…
AI Data Breach Reveals Trust Issues with Personal Information
Insight AI technology is being explored by businesses as a tool for balancing the benefits it brings with the risks that are associated. Amidst this backdrop, NetSkope Threat Labs has recently released the latest edition of its Cloud and…
Nidec Corporation Ransomware Attack: Data Leak on Dark Web
In a recent disclosure, Nidec Corporation, a global leader in precision motors and automotive components, confirmed a significant data breach from a ransomware attack that occurred earlier this year. Hackers, after failing to extort the company, leaked stolen data…
Security Experts Downplay the Significance of the Chinese Quantum “Hack”
Security experts have recommended caution following a series of doom-laden reports in recent days claiming that Chinese researchers have cracked military-grade encryption via quantum computing technology. The reports, which first appeared in the South China Morning Post last week,…
HM Surf Bug in macOS Raises Data Privacy Concerns
Several vulnerabilities in the Safari web browser for macOS may have left users open to being spied on, having their data stolen, and acquiring other types of malware thanks to this security weakness. Specifically, the vulnerability arises from the…
Vietnamese Hackers Target Digital Marketers in Malware Attack
Cyble Research and Intelligence Lab recently unearthed an elaborate, multi-stage malware attack targeting not only job seekers but also digital marketing professionals. The hackers are a Vietnamese threat actor who was utilising different sophisticated attacks on systems by making…
North Korean Hackers Develop Linux Variant of FASTCash Malware Targeting Financial Systems
A new Linux variant of FASTCash malware has surfaced, targeting the payment switch systems of financial institutions. North Korean hackers, linked to the Hidden Cobra group, have expanded their cyber arsenal to now include Ubuntu 22.04 LTS distributions. Previously,…
Microsoft Builds Fictitious Azure Tenants to Lure Phishers to Honeypots
Microsoft employs deceptive tactics against phishing actors, creating realistic-looking honeypot tenants with Azure access and luring attackers in to gather intelligence on them. Tech giant can use the acquired data to map malicious infrastructure, gain a better understanding of…
Cyber Threats by Nation-States Surge Beyond Control
In recent years, state-sponsored hacker groups have increased their attacks on critical infrastructure, causing great concern across the globe. It has become increasingly evident that these coordinated and sophisticated cyber threats and attacks are posing serious risks to the…
Brazil’s Federal Police Arrests ‘USDoD,’ Hacker in FBI Infragard Breach
Brazil’s Polícia Federal arrested USDoD, an infamous hacker linked to the National Public Data and InfraGard breaches, as part of “Operation Data Breach”. USDoD, dubbed EquationCorp, has a long history of high-profile data breaches in which he stole data…
How to Enhance Your Windows Security with Memory Integrity
Windows Security, the antivirus program built into Microsoft’s operating system, is generally sufficient for most users. It provides a decent level of protection against various threats, but a few important features, like Memory Integrity, remain turned off by default.…
The Cybersecurity Burnout Crisis: Why CISOs Are Considering Quitting
Cybersecurity leaders are facing unprecedented stress as they battle evolving threats, AI-driven cyberattacks, and ransomware. A recent BlackFog study reveals that 93% of CISOs considering leaving their roles cite overwhelming job demands and mental health challenges. Burnout is driven…
Microsoft Introduces AI Solution for Erasing Ex from Memories
It reveals the story of a woman who is emotionally disturbed and seeks the help of artificial intelligence as she tries to erase her past in director Vikramaditya Motwane’s new Hindi film, CTRL. There is no doubt that the…
The Extent of Data Surveillance in Modern Smart TVs
Several years ago, smart TVs started to become popular choices in households. They are widely available now and provide a wide range of features and applications that make them an excellent choice. To stay competitive, users will be inclined…