Payment fraud continues to be a significant and evolving threat to businesses, undermining their profitability and long-term sustainability. The FBI reports that between 2013 and 2022, companies lost around $50 billion to business email compromise, showing how prevalent this…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
ChatGPT Vulnerability Exploited: Hacker Demonstrates Data Theft via ‘SpAIware
A recent cyber vulnerability in ChatGPT’s long-term memory feature was exposed, showing how hackers could use this AI tool to steal user data. Security researcher Johann Rehberger demonstrated this issue through a concept he named “SpAIware,” which exploited a…
Meta Unveils its First Open AI Model That Can Process Images
Meta has released new versions of its renowned open source AI model Llama, including small and medium-sized models capable of running workloads on edge and mobile devices. Llama 3.2 models were showcased at the company’s annual Meta Connect event.…
Shocking Ways Hackers Can Exploit Your IP Address – You’re Not as Safe as You Think
Your IP address may look like a long number row, but to a hacker, it can be an instrument of evil activity. While your exposure to an IP doesn’t pose an immediate danger per se, it is thus important to…
Growing Focus on Data Privacy Among GenAI Professionals in 2024
Recent reports published by Deloitte and Deloitte Consulting, highlighting the significance of data privacy as it pertains to Generative Artificial Intelligence (GenAI), have been widely cited. As the survey found, there has been a significant increase in professionals’ concerns…
Social Media Content Fueling AI: How Platforms Are Using Your Data for Training
OpenAI has admitted that developing ChatGPT would not have been feasible without the use of copyrighted content to train its algorithms. It is widely known that artificial intelligence (AI) systems heavily rely on social media content for their development.…
What is a Zero-Day Attack And How You Can Safeguard Against It?
The cyberthreats that are still unknown to us are the most severe. The majority of cyberdefenses rely on having prior knowledge of the attack’s nature. We just don’t know what zero days are, which is why they are so…
Homeland Security Alerts on Increasing Risks for Schools
Educators and other school professionals are playing an increasingly crucial role in providing a safe environment in which students can learn in an era where children are being targeted by increasing physical and online attacks, according to US Homeland…
Delaware Libraries Hit by Ransomware Attack, Internet Services Disrupted
Last week, Delaware’s public libraries faced a cyberattack, causing widespread disruption to computer and internet access. Signs posted at libraries informed visitors that Wi-Fi and PCs were out of service, with officials confirming a ransomware attack took down all…
Kansas Water Plant Switches to Manual Operations Following Cyberassault
The top cybersecurity agency in the United States has released a new advisory, stating that nation-states and cybercriminals remain a threat to government-run water systems. The Cybersecurity and Infrastructure Security Agency (CISA) issued the notification two days after Arkansas City,…
Protecting Your Business from Cybercriminals on Social Media
Social media has transformed into a breeding ground for cybercriminal activities, posing a significant threat to businesses of all sizes. According to recent reports, more than half of all companies suffer over 30% revenue loss annually due to fraudulent…
Mozilla Privacy: Tracking Users Without Consent
The organization behind the privacy-centric Firefox browser, has come under fire for allegedly tracking users without their consent. This controversy centers around a feature called Privacy Preserving Attribution (PPA), which has sparked a heated debate about privacy, consent, and the…
Reading Encrypted WhatsApp Messages Through Digital Forensics
In recent years, WhatsApp has become one of the most popular messaging apps in the world. End-to-end encryption is the process by which the service uses robust security for the protection of its users’ communications. The fact that messages…
Ethics and Tech: Data Privacy Concerns Around Generative AI
The tech industry is embracing Generative AI, but the conversation around data privacy has become increasingly important. The recent “State of Ethics and Trust in Technology” report by Deloitte highlights the pressing ethical considerations that accompany the rapid adoption of…
Microsoft Tightens Cloud Security After Major Breaches
In its efforts to better its cloud security, Microsoft has done much to remove any potential vulnerabilities and tightened the process of authenticating individuals. This comes after the tech giant saw several security breaches within the past year. Under…
Car Dealership Auto Canada Confirms Cyberattack, Alleged Data Leak
Car dealership company Auto Canada warned that employee data might have been leaked in a ransomware attack claimed by the Hunters International ransomware group. In August 2024, the company suffered a company was hit by a cyber-attack. While Auto Canada…
AI-Generated Malware Discovered in the Wild
Researchers found malicious code that they suspect was developed with the aid of generative artificial intelligence services to deploy the AsyncRAT malware in an email campaign that was directed towards French users. While threat actors have employed generative AI…
Fortinet Cybersecurity Breach Exposes Sensitive Customer Data
Fortinet experienced a significant cybersecurity breach involving a third-party cloud drive, where 440 GB of data was leaked by a hacker named “Fortibitch” after the company refused to pay the ransom. The breach affected about 0.3% of Fortinet’s customers,…
MoneyGram Faces Service Disruption Amid Cybersecurity Threat
A cyberattack that began on September 20 impacted MoneyGram International Inc.’s services significantly, likely due to a ransomware attack, causing significant disruptions to its services. There were reports of outages affecting company networks, and by September 23, the company…
New Mallox Ransomware Linux Variant Built on Leaked Kryptina Source Code
An affiliate of the Mallox ransomware group, also known as TargetCompany, has been observed using a modified version of Kryptina ransomware to target Linux systems, according to SentinelLabs. This development is distinct from other Linux-targeting Mallox variants, such as…