There have been numerous scandals surrounding this artificial intelligence company which had astonished the world by seemingly rivaling the successful chatbot ChatGPT at a fraction of the cost. However, now, regulators and privacy advocates have raised questions about the…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Here’s The Ultimate Guide to Virtual Credit Card in Safeguarding Online Privacy
Virtual credit cards are digital versions of physical credit cards. They generate a unique credit card number that you can use instead of your physical card number, avoiding the merchant from storing your credit card data and making your…
Emerging Cybersecurity Threats in 2025: Shadow AI, Deepfakes, and Open-Source Risks
Cybersecurity continues to be a growing concern as organizations worldwide face an increasing number of sophisticated attacks. In early 2024, businesses encountered an alarming 1,308 cyberattacks per week—a sharp 28% rise from the previous year. This surge highlights the…
Cybercriminals Entice Insiders with Ransomware Recruitment Ads
Cybercriminals are adopting a new strategy in their ransomware demands—embedding advertisements to recruit insiders willing to leak company data. Threat intelligence researchers at GroupSense recently shared their findings with Dark Reading, highlighting this emerging tactic. According to their analysis,…
Experts Find Hidden Backdoors Inside Chinese Software Stealing Patient Data
Cybersecurity & Infrastructure Security Agency (CISA) in the US rolled out an investigation report concerning three firmware variants used in Contec CMS800, a patient monitoring system used in healthcare facilities and hospitals. CIS finds hidden backdoor in Chinese software Experts…
Ransomware Attack Disrupts New York Blood Center Operations Amid Critical Shortage
The New York Blood Center (NYBC), a major provider of blood products and transfusion services in the U.S., suffered a ransomware attack on Sunday, leading to operational disruptions and the cancellation of some donor appointments. The cyberattack comes at…
New ‘Browser Syncjacking’ Attack Exploits Chrome Extensions for Full Device Takeover
‘Browser Syncjacking,’ which allows threat actors to hijack Google profiles, compromise browsers, and eventually gain full control over a victim’s device—all through a seemingly harmless Chrome extension. This stealthy multi-stage attack requires minimal permissions and almost no user interaction…
Community Health Centre Data Breach Impacts Over 1 Million Patients
Over a million people have been notified of a recent data breach by Community Health Centre, a nonprofit healthcare organisation based in Middletown, Connecticut. On January 2, 2025, unauthorised activity was detected in its computer systems, and external cybersecurity…
Two-Month Cyber Breach at Mizuno USA Under Investigation
Unauthorized access to Mizuno USA’s network has resulted in a compromise of sensitive customer information, which has caused Mizuno USA to notify its customers about the breach. In a letter to affected individuals, the sports gear manufacturer shared information…
Bengaluru Woman Loses ₹2 Lakh to Sophisticated IVR-Based Cyber Scam
Cyber fraud continues to evolve, with scammers using increasingly sophisticated techniques to deceive victims. In a recent case from Bengaluru, a woman lost ₹2 lakh after receiving a fraudulent automated call that mimicked her bank’s Interactive Voice Response (IVR)…
Critical Zero-Day Vulnerability in Zyxel Devices Sparks Widespread Exploitation
< p style=”text-align: justify;”>Cybersecurity researchers at GreyNoise have uncovered widespread exploitation of a critical zero-day vulnerability in Zyxel CPE Series devices, months after it was initially reported to the manufacturer. The flaw, identified as CVE-2024-40891, allows attackers to execute arbitrary…
New Microsoft “Scareware Blocker” Prevents Users from Tech Support Scams
Scareware is a malware type that uses fear tactics to trap users and trick them into installing malware unknowingly or disclosing private information before they realize they are being scammed. Generally, the scareware attacks are disguised as full-screen alerts that…
Security Concerns Rise with MediaTek February 2025 WLAN Vulnerabilities
A new security bulletin has been released by MediaTek for February 2025, which reveals several critical vulnerabilities, which may affect its chipsets used in smartphones, tablets, as well as numerous other devices. There are security issues identified in the…
DeepSeek’s Rise: A Game-Changer in the AI Industry
< p style=”text-align: justify;”>January 27 marked a pivotal day for the artificial intelligence (AI) industry, with two major developments reshaping its future. First, Nvidia, the global leader in AI chips, suffered a historic loss of $589 billion in market value…
Federal Employees Sue OPM Over Alleged Unauthorized Email Database
< p style=”text-align: justify;”>Two federal employees have filed a lawsuit against the Office of Personnel Management (OPM), alleging that a newly implemented email system is being used to compile a database of federal workers without proper authorization. The lawsuit…
AI-Powered Personalized Learning: Revolutionizing Education
In an era where technology permeates every aspect of our lives, education is undergoing a transformative shift. Imagine a classroom where each student’s learning experience is tailored to their unique needs, interests, and pace. This is no longer a…
Rising Cyber Threats in the Financial Sector: A Call for Enhanced Resilience
< p style=”text-align: justify;”>The financial sector is facing a sharp increase in cyber threats, with investment firms, such as asset managers, hedge funds, and private equity firms, becoming prime targets for ransomware, AI-driven attacks, and data breaches. These firms rely…
How Google Enhances AI Security with Red Teaming
Google continues to strengthen its cybersecurity framework, particularly in safeguarding AI systems from threats such as prompt injection attacks on Gemini. By leveraging automated red team hacking bots, the company is proactively identifying and mitigating vulnerabilities. Google employs an…
Password Management Breached: Critical Vulnerabilities Expose Millions
Password management solutions are the unsung heroes in enterprise security. They protect our digital identities, ensuring sensitive info such as passwords, personal details, or financial data is kept safe from threat actors. However, in a recent breach, several critical vulnerabilities…
Smiths Group Reports Cybersecurity Incident: Systems Breached
< p style=”text-align: justify;”>Smiths Group, a London-listed engineering firm operating in energy, security, aerospace, and defence, has reported a cybersecurity incident involving unauthorised access to its systems. The company has taken immediate steps to mitigate potential disruptions and contain…