US Government’s Cybersecurity and Infrastructure Security Agency released a warning regarding cyberattackers use of unencrypted cookies managed by the F5 BIG-IP Local Traffic Manager, by which they gather information about private networks. In this manner, these attackers identify the…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
OpenAI’s Disruption of Foreign Influence Campaigns Using AI
Over the past year, OpenAI has successfully disrupted over 20 operations by foreign actors attempting to misuse its AI technologies, such as ChatGPT, to influence global political sentiments and interfere with elections, including in the U.S. These actors utilized…
Biometric Data Theft and Cyberterrorism Are The Major Future Threats
Cyberterrorism, biometric data poisoning, and metaverse crimes are the most serious digital threats that humans are expected to face in the future, a senior Dubai official said. Major Tarek Belhoul, head of Dubai Police’s virtual assets crime branch, stated,…
Blockchain Innovation Drives Payroll and Employee Data Security in HR
In HR, blockchain technology is still in its infancy when it comes to gaining acceptance among the people. Despite this, it stands to be a great boon for the future of work as well. The APQC report indicates that…
AsyncRAT Malware Exploits Bitbucket to Launch Multi-Stage Attack
G DATA Security Lab has discovered a sophisticated malware operation that used Bitbucket, a popular code hosting platform, to propagate AsyncRAT, a well-known remote access trojan. According to the study, the attackers employed a multi-stage assault strategy, exploiting Bitbucket…
Awaken Likho Targets Russian Agencies with MeshCentral Remote Access Tool
Awaken Likho, also referred to as Core Werewolf or PseudoGamaredon, is a cyber threat group targeting Russian government agencies and industrial entities. Since June 2024, a new campaign has been observed, where attackers have shifted from using UltraVNC to…
Millions of Android Devices at Risk, New Chip Bug Exploited in Targeted Attacks
Overview of the Exploit Hackers recently leveraged a serious security weakness, said to be a “zero-day,” that exists within the Qualcomm chipsets used in many popular Android devices. Qualcomm confirmed that at the time they were first exploited by…
The Role of End-to-End Encryption in Modern Cybersecurity
It is a type of messaging that is protected from everyone, including the messaging service itself, because of end-to-end encryption (E2EE). Using E2EE, a message cannot be decrypted until the sender and the recipient can see it in the…
Casio Hit by Cyberattack Causing Service Disruption Amid Financial Challenges
Japanese tech giant Casio recently experienced a cyberattack on October 5, when an unauthorized individual accessed its internal networks, leading to disruptions in some of its services. The breach was confirmed by Casio Computer, the parent company behind the…
New Yunit Infostealer Bypasses Windows Defender and Steals Sensitive Data
A new information-stealing malware has been discovered that is capable of exfiltrating a large amount of sensitive information while also disabling antivirus products to create persistence on target endpoints. CYFIRMA cybersecurity researchers have published a detailed investigation of the…
How to Recover a Hacked Gmail Account Even After a Security Breach
Having your Gmail account hacked can feel like a nightmare, especially when recovery details like phone numbers and email addresses have been changed by a hacker. Fortunately, recovering a compromised account is still possible, even if most security and…
Comcast Data Breach Impacts Thousands, Sensitive Information Compromised
Comcast Cable Communications LLC reports that it is a victim of a data breach compromising personal information of more than 237,000 individuals, including 22 residents of Maine. According to an investigation, the breach is traced back to Financial Business…
Voice Cloning and Deepfake Threats Escalate AI Scams Across India
The rapid advancement of AI technology in the past few years has brought about several benefits for society, but these advances have also led to sophisticated cyber threats. India is experiencing explosive growth in digital adoption, making it one…
American Water Works faces Cyberattack
American Water Works, the country’s largest provider of water services to 14 states, recently reported that it was cyber attacked on its information technology system. The current report has indicated that operational technology systems that control delivery of water within…
Mitigating the Risks of Shadow IT: Safeguarding Information Security in the Age of Technology
In today’s world, technology is integral to the operations of every organization, making the adoption of innovative tools essential for growth and staying competitive. However, with this reliance on technology comes a significant threat—Shadow IT. Shadow IT refers to…
UN Report: Telegram joins the expanding cybercrime markets in Southeast Asia
According to a report issued by the United Nations Office for Drugs and Crime, dated October 7, criminal networks across Southeast Asia are increasingly turning to the messaging platform Telegram for conducting comprehensive illegal activities. It says Telegram, due…
How Southeast Asian Cyber Syndicates Stole Billions
In 2023, cybercrime syndicates in Southeast Asia managed to steal up to $37 billion, according to a report by the United Nations Office on Drugs and Crime (UNODC). Inside the World of Cybercrime Syndicates in Southeast Asia This staggering figure…
Protect Yourself from Phishing Scams Involving Personal Data and Bitcoin Demands
A new phishing scam is emerging, where hackers send threatening emails to people with personal details like images of their homes and addresses. This scam tricks recipients into believing their privacy is compromised, urging them to pay money or…
Chinese Hackers Breach US Telco Networks to Access US Court Wiretap Systems
A Wall Street Journal report claims that Chinese hackers gained access to systems used for court-authorized wiretaps by breaking into the networks of major US telecommunications companies. The breach, which targeted companies such as Verizon Communications, AT&T, and Lumen…
Federal Agencies Move Against North Korea’s Cybercrime Profits
The media have reported that the US government has filed yet another lawsuit to recover nearly $2.69 million worth of stolen digital assets from North Korea’s notorious Lazarus hacking group. It was filed on October 4, 2024, and concerns…