Tag: CySecurity News – Latest Information Security and Hacking Incidents

Can Data Embassies Make AI Safer Across Borders?

  The rapid growth of AI has introduced a significant challenge for data-management organizations: the inconsistent nature of data privacy laws across borders. Businesses face complexities when deploying AI internationally, prompting them to explore innovative solutions. Among these, the concept…

Why Medical Records Are Prime Targets for Cyberattacks and How to Stay Safe

Healthcare organizations have experienced a significant transformation, transitioning from paper-based records to digital systems. This change enables medical records to be accessed and updated anytime, improving coordination among hospitals, clinics, and specialists. Despite the advantages, digital storage poses significant challenges,…

Here’s Why You Need A New App After Google RCS Issue

  Google Messages has suddenly gone haywire. After years of campaigning, the “seamless messaging” dream was finally realised, but it vanished as quickly as it arrived. Currently, the question is whether it has any prospect of ever returning.  Like a…

Operation Digital Eye Reveals Cybersecurity Breach

  It has been recently reported that a Chinese group of Advanced Persistent Threats (APTs) has carried out a sophisticated cyberespionage operation dubbed “Operation Digital Eye” against the United States.  Between the end of June and the middle of July…

New Malware Campaign Attacks Manufacturing Industry

Lumma Stealer and Amaday Bot Resurface In a recent multi-stage cyberattack, Cyble Research and Intelligence (CRIL) found an attack campaign hitting the manufacturing industry. The campaign depends upon process injection techniques aimed at delivering malicious payloads like Amaday Bot and…

Microsoft Challenges Hackers with $10,000 AI Cybersecurity Contest

      Microsoft has unveiled a groundbreaking cybersecurity challenge aimed at advancing the security of artificial intelligence (AI) systems. Named the “LLMail-Inject: Adaptive Prompt Injection Challenge,” the initiative invites hackers and security researchers to test their skills against a…

Black Basta Ransomware: New Tactics and Growing Threats

  The Black Basta ransomware group, an offshoot of the now-defunct Conti group, has adapted its attack strategies by integrating sophisticated social engineering techniques. Recent trends include email bombing, malicious QR codes, and credential theft, showcasing the group’s commitment to…

Novel iVerify Tool Detects Widespread Use of Pegasus Spyware

  iVerify’s mobile device security tool, launched in May, has identified seven cases of Pegasus spyware in its first 2,500 scans. This milestone brings spyware detection closer to everyday users, underscoring the escalating threat of commercial spyware.  How the Tool…

China’s Surveillance System: Cracks in a Digital Panopticon

  China’s expansive surveillance network monitors over 1.4 billion citizens, blending advanced technology with minimal legal checks on state control. However, cracks are emerging in this highly complex system. Overview of Surveillance    China’s surveillance infrastructure leverages technologies such as:…

Electrica Group Under Cyber Attack, Systems Secure

  Romanian energy provider Electrica Group has confirmed a cyber attack on its systems. Despite the breach, the company assured customers that its critical infrastructure remains secure.  Incident Overview    Electrica revealed that emergency response protocols were activated in line…