Amnesty International researchers discovered an Android zero-day bug that was exploited to silently disseminate custom surveillance spyware targeting Serbian journalists. The probe has traced the technology to Cellebrite, an Israeli forensics vendor. In a technical report published earlier this…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Hackers Infect Security Researchers with Malware to Steal WordPress Credentials
For the past year, a cyberattack campaign has been targeting security professionals, including red teamers, penetration testers, and researchers, infecting their systems with malware. The malicious software has been used to steal WordPress credentials and sensitive data while also…
Salt Typhoon Hack: A Grave Threat to U.S. Telecommunications
< p style=”text-align: justify;”> The Chinese state-sponsored hacking group Salt Typhoon has been implicated in one of the most severe breaches in U.S. telecommunications history. Sensitive information, including call logs, timestamps, phone numbers, and location data, was compromised across…
FBI Warns of Security Risks in RCS Messaging
< p style=”text-align: justify;”>The FBI has issued a warning to Apple and Android device users regarding potential vulnerabilities in Rich Communication Services (RCS). While RCS was designed to replace traditional SMS with enhanced features, a critical security flaw has…
Rising Tactics of Winnti Hackers Include Deploying Glutton PHP Backdoors
In the past few months, researchers at a Chinese cybersecurity firm have been responsible for the discovery of an advanced PHP backdoor that supports Winnti, a group linked to Chinese cybercrime that is launching increasingly sophisticated attacks. Research has…
CISA Issues Mobile Security Guidelines Amid Cyber Espionage Threats
The US Cybersecurity and Infrastructure Security Agency (CISA) released a comprehensive guide on Wednesday to help individuals in highly targeted positions protect their mobile communications from malicious actors. This move follows a series of sophisticated telecom hacks that impacted…
Colorado Faces Growing Financial Losses from AI-Powered Scams in 2024
Colorado is on track to suffer even greater financial losses from scams by the end of 2024 compared to the nearly $100 million stolen in 2023. According to the Colorado Attorney General’s Office, the rapid integration of artificial intelligence…
Bitcoin Security Concerns Amid Quantum Computing Advancements
Chamath Palihapitiya, CEO of Social Capital, has raised alarms over Bitcoin’s future security, cautioning that its SHA-256 encryption may become vulnerable within the next two to five years. Speaking on the All-In Podcast, he highlighted rapid advancements in quantum…
Ransomware Attacks Expose Gaps in Backup Practices: The Case for Modern Solutions
Ransomware attacks are becoming increasingly sophisticated and widespread, posing significant risks to organizations worldwide. A recent report by Object First highlights critical vulnerabilities in current backup practices and underscores the urgency of adopting modern solutions to safeguard essential data.…
Germany Warns of Pre-Installed Malware on 30,000 Devices
< p style=”text-align: justify;”>Earlier this week, Germany’s cybersecurity office issued a warning about at least 30,000 internet-connected devices across the nation being compromised by pre-installed malware known as BadBox. The Federal Office for Information Security (BSI) announced that it…
Blue Yonder Recovers from Ransomware Attack, Focuses on Resilience
Blue Yonder, a leading provider of supply chain solutions, is making steady progress in recovering from a ransomware attack that disrupted services for several of its clients. On November 21, the company was targeted by a ransomware attack that…
Dubai Police Impersonation Scam: A Sophisticated Cybercrime Targeting UAE Residents
< p style=”text-align: justify;”>Cybercriminals have recently targeted the Dubai Police in an elaborate impersonation scam aimed at defrauding unsuspecting individuals in the UAE. Thousands of phishing text messages, pretending to be from law enforcement, were sent to trick recipients…
AI Models at Risk from TPUXtract Exploit
A team of researchers has demonstrated that it is possible to steal an artificial intelligence (AI) model without actually gaining access to the device that is running the model. The uniqueness of the technique lies in the fact that…
Rhode Island Residents Warned of Cyberattack Targeting State Government
Rhode Island officials have issued an urgent advisory for residents to take immediate precautions following a significant cyberattack on the state government. Authorities are warning that private data, including Social Security and bank account details, may soon be exposed…
Ymir Ransomware: A Rising Threat in the Cybersecurity Landscape
< p style=”text-align: justify;”>The evolving threat landscape continues to present new challenges, with NCC Group’s latest Threat Pulse report uncovering the emergence of Ymir ransomware. This new ransomware strain showcases the growing collaboration among cybercriminals to execute highly sophisticated…
Malware Found Preinstalled on 30,000 Android Devices in Germany
A concerning cybersecurity issue has surfaced in Germany, where investigators uncovered that nearly 30,000 Android devices were sold with preinstalled malware. The malware, dubbed “BadBox,” resides in the device firmware and affects various internet-enabled devices, including digital picture frames…
Google Warns Users About Privacy Risks Posed by Certain Android Apps
It has recently been reported by a leading media outlet that more than 11 million Android devices have been infected with malicious software known as the Necro Trojan, which has crept into phones and tablets through unofficially modified applications,…
Bitcoin Hits $100,000 for the First Time Amid Market Volatility
< p style=”text-align: justify;”> The cryptocurrency market reached a historic milestone this week as Bitcoin closed above $100,000 for the first time in history. This marks a defining moment, reflecting both market optimism and growing investor confidence. Despite reaching…
U.S. Justice Department Shuts Down Rydox Cybercrime Marketplace
< p style=”text-align: justify;”>The U.S. Justice Department announced on Thursday the successful seizure and dismantling of Rydox, a notorious online marketplace for trafficking stolen personal information and cybercrime tools. In a coordinated operation with international law enforcement agencies, three…
OTP Scams Decline in Bengaluru as Sophisticated Cybercrimes Surge in 2024
Bengaluru has witnessed a significant drop in traditional cybercrimes like One-Time Password (OTP) scams and phishing, but more advanced and sophisticated scams, such as digital arrest fraud and stock investment schemes, have been on the rise. Data obtained by…
Massive Data Breach Puts Millions at Risk During Christmas Season
< p style=”text-align: justify;”>As the Christmas season approaches, millions of U.S. citizens could face a potential holiday nightmare after a major data breach exposed 5 million unique credit and debit card details online. The leak threatens to compromise countless…
Pumakit Rootkit Challenges Linux Security Systems
According to the researchers from the Elastic Security Lab, a new rootkit called PUMAKIT can perform various advanced evasion mechanisms. When Elastic Security researchers discovered PUMAKIT while routinely hunting for threats on VirusTotal, they described it as PUMAKIT. Many…
IOCONTROL Malware: A Threat to Critical Infrastructure in Israel and the United States
A newly identified malware, IOCONTROL, is causing widespread alarm as it targets critical infrastructure in Israel and the United States. Developed by Iranian hackers, IOCONTROL is specifically designed to attack Internet of Things (IoT) devices and operational technology (OT)…
Citrix Expands Platform Capabilities with DeviceTrust and Strong Network Acquisitions
< p style=”text-align: justify;”>Citrix, a business unit of Cloud Software Group, has acquired DeviceTrust and Strong Network to enhance the functionality of its platform. These acquisitions enable Citrix to offer more comprehensive access management and security solutions, expanding its…
Critical Security Flaw in “Hunk Companion” Plugin Exploited by Hackers
Hackers are actively exploiting a serious security vulnerability in the “Hunk Companion” plugin to install and activate other plugins that contain known vulnerabilities from the WordPress.org repository. This targeted attack allows the installation of plugins with a variety of…
Critical Vulnerability Found in Cleo’s File-Sharing Tools: Immediate Action Required
< p style=”text-align: justify;”>A critical security vulnerability has been discovered in Cleo’s popular file-sharing tools, including Cleo Integration Cloud, Cleo Harmony, and Cleo VLTrader. This flaw puts businesses and users at significant risk of cyberattacks, prompting cybersecurity experts to…
MITRE’s Latest ATT&CK Evaluations Reveal Critical Insights into Cybersecurity Solutions
< p style=”text-align: justify;”>MITRE Corporation has published its findings from the latest round of ATT&CK evaluations, offering important insights into the effectiveness of enterprise cybersecurity solutions. This sixth evaluation assessed 19 vendors against two major ransomware strains, Cl0p and…
File-Sharing Tools Under Attack: What Users Need to Know
A serious flaw has been found in three widely used file-sharing tools, putting several organizations at risk of security breaches. The three tools affected, LexiCom, VLTransfer, and Harmony, are all developed by Cleo, a company focused on managed file…
Group-IB Unveils Sophisticated Phishing Campaign Targeting Global Organizations
A recent report by Group-IB has exposed a highly advanced phishing campaign targeting employees from 30 companies across 15 jurisdictions. Using trusted domains and cutting-edge personalization techniques, attackers have bypassed Secure Email Gateways (SEGs) and exploited victims in critical…
Active Exploitation of Cleo Communications’ File Transfer Software Exposes Critical Vulnerabilities
< p style=”text-align: justify;”>Cleo Communications’ file transfer software is under active attack, with security researchers from Huntress revealing that a recently issued patch fails to address the critical flaws being exploited. This ongoing vulnerability poses a significant threat to…
Is Bitcoin Vulnerable to Google’s Quantum Breakthrough?
Earlier this month, Google CEO Sundar Pichai announced the creation of their new quantum computing chips called “Willow“, which caused a few ripples in the Bitcoin investment community, but also caused some skepticism among Bitcoin skeptics due to the…
Data Breach at Datavant Exposes Thousands of Minors to Cyber Threats
< p style=”text-align: justify;”>While cybercriminals often target adults for their valuable financial and personal information, children are not exempt from these risks. This was made evident by a recent data breach involving health IT company Datavant, which exposed sensitive…
Fortinet Acquires Perception Point to Enhance AI-Driven Cybersecurity
< p style=”text-align: justify;”> Fortinet, a global leader in cybersecurity with a market valuation of approximately $75 billion, has acquired Israeli company Perception Point to bolster its email and collaboration security capabilities. While the financial terms of the deal…
Blue Yonder Cyberattack: A Wake-Up Call for Supply Chain Security
< p style=”text-align: justify;”>Blue Yonder, a prominent supply chain software provider used by major U.S. grocery chains like Safeway and Fred Meyer, is investigating a significant cyberattack. The ransomware group Termite has claimed responsibility, threatening to publish 680 gigabytes…
Misconfigured AWS Cloud Instances Lead to Sensitive Data Breaches
Misconfigured cloud instances have once again enabled cybercriminals to steal sensitive data, including credentials, API keys, and proprietary source code. This time, numerous Amazon Web Services (AWS) users fell victim, highlighting a lack of understanding regarding the shared responsibility…
The Intersection of Travel and Data Privacy: A Growing Concern
< p style=”text-align: justify;”>The evolving relationship between travel and data privacy is sparking significant debate among travellers and experts. A recent Spanish regulation requiring hotels and Airbnb hosts to collect personal guest data has particularly drawn criticism, with some…
Google’s Quantum Computing Leap: Introducing the “Willow” Chip
Google has made a significant stride in quantum computing with the announcement of its latest chip, named “Willow.” According to Google, this advanced chip can solve problems in just five minutes that would take the most powerful supercomputers on…
Lynx Ransomware Breach Targets Romania’s Electrica Group
The Romanian National Cybersecurity Directorate (DNSC) has confirmed that the Lynx ransomware gang successfully breached Electrica Group, a leading electricity supplier in Romania. About Electrica Group Electrica Group, initially part of the National Electricity Company (CONEL) in 1998, became…
Mandiant Uncovers QR Code Exploit to Bypass Browser Isolation
Mandiant researchers have discovered an innovative method to circumvent browser isolation technology by leveraging QR codes to establish command-and-control (C2) operations. This finding highlights potential vulnerabilities in existing web browser security measures. Understanding Browser Isolation Browser isolation is a…
Beware of Malicious USB-C Cables: Hidden Cyber Threats
In today’s tech-driven world, charging cables are indispensable. However, recent findings about compromised USB-C cables have highlighted significant risks associated with third-party accessories. Security experts warn that hackers can embed tiny computers within ordinary-looking cables, transforming them into tools…
Artivion Discloses Ransomware Attack, Disrupting Operations
< p style=”text-align: justify;”>Leading cardiac surgery medical device company Artivion has reported a ransomware attack that occurred on November 21, resulting in the encryption of certain systems and unauthorized data access. The incident forced the Atlanta-based company to take…
Deep Packet Inspection (DPI): Balancing Security and Privacy in the Digital Age
Deep Packet Inspection (DPI) is an advanced technology for analyzing internet traffic that goes beyond traditional techniques. Unlike standard firewalls that examine only the headers of data packets, DPI scrutinizes both headers and payloads, providing a comprehensive view of…
Cyber Threat Alert for South Korea from North Korean Hackers
In a recent cyber-espionage campaign targeted at the United States, North Korean state-linked hacker ScarCruft recently exploited a zero-day vulnerability in Internet Explorer to distribute RokRAT malware to targets nationwide. APT37, or RedEyes as it is sometimes called, is…
Forensic Analysis in the eXp Realty Case: Privacy and Evidence Integrity
< p style=”text-align: justify;”>In a recent video hearing for the case Acevedo v. eXp, related to a sexual assault claim, a judge deliberated on whether to grant a protective order that would prevent a forensic examination of eXp founder…
Critical Apple Security Vulnerability CVE-2024-44131 Patched: What You Need to Know
Jamf Threat Labs has identified a critical flaw in Apple’s Transparency, Consent, and Control (TCC) framework, labeled CVE-2024-44131. This vulnerability allows malicious applications to bypass user consent protocols and access sensitive data without user awareness. The issue impacts both…
Can Data Embassies Make AI Safer Across Borders?
The rapid growth of AI has introduced a significant challenge for data-management organizations: the inconsistent nature of data privacy laws across borders. Businesses face complexities when deploying AI internationally, prompting them to explore innovative solutions. Among these, the concept…
VPN Server Switching: Benefits and Best Practices for Privacy and Speed
A VPN enhances online privacy by encrypting internet traffic and masking IP addresses. However, how often should you switch servers? The answer depends on your goals and usage patterns, as server hopping offers benefits but is not always necessary.…
What’s Happening with 23andMe? Data Privacy and Uncertain Future
< p style=”text-align: justify;”>23andMe, a DNA analysis company, has been in turmoil lately. This September, the entire board of directors left due to differences with the CEO, and data was compromised in a 2023 hack. Anne Wojcicki, the CEO,…
Cybercrime Network Busted: Turning Airbnbs Into Fraud Centers
An international cybercrime network responsible for stealing millions of euros has been dismantled in a joint operation conducted in Belgium and the Netherlands. The Europol-coordinated effort led to eight arrests and 17 coordinated raids across the two countries on…
Why Medical Records Are Prime Targets for Cyberattacks and How to Stay Safe
Healthcare organizations have experienced a significant transformation, transitioning from paper-based records to digital systems. This change enables medical records to be accessed and updated anytime, improving coordination among hospitals, clinics, and specialists. Despite the advantages, digital storage poses significant challenges,…
Here’s Why You Need A New App After Google RCS Issue
Google Messages has suddenly gone haywire. After years of campaigning, the “seamless messaging” dream was finally realised, but it vanished as quickly as it arrived. Currently, the question is whether it has any prospect of ever returning. Like a…
Operation Digital Eye Reveals Cybersecurity Breach
It has been recently reported that a Chinese group of Advanced Persistent Threats (APTs) has carried out a sophisticated cyberespionage operation dubbed “Operation Digital Eye” against the United States. Between the end of June and the middle of July…
Brain Cipher Ransomware Group Claims Deloitte UK Data Breach
Brain Cipher, a ransomware group that emerged in June 2024, has claimed responsibility for breaching Deloitte UK, alleging the exfiltration of over 1 terabyte of sensitive data from the global professional services firm. This claim has raised significant concerns…
BT Group Confirms Cyberattack by Black Basta Ransomware Group
British telecommunications giant BT Group has confirmed it was targeted by the notorious ransomware group Black Basta in a cyberattack on its Conferencing division. The breach forced BT to isolate and shut down parts of its infrastructure to limit the…
New Malware Campaign Attacks Manufacturing Industry
Lumma Stealer and Amaday Bot Resurface In a recent multi-stage cyberattack, Cyble Research and Intelligence (CRIL) found an attack campaign hitting the manufacturing industry. The campaign depends upon process injection techniques aimed at delivering malicious payloads like Amaday Bot and…
Microsoft Challenges Hackers with $10,000 AI Cybersecurity Contest
Microsoft has unveiled a groundbreaking cybersecurity challenge aimed at advancing the security of artificial intelligence (AI) systems. Named the “LLMail-Inject: Adaptive Prompt Injection Challenge,” the initiative invites hackers and security researchers to test their skills against a…
Romania Annuls Elections After TikTok Campaign and Cyberattacks Linked to Russia
Romania’s Constitutional Court (CCR) has annulled the first round of its recent presidential elections after intelligence reports revealed extensive foreign interference. Cyberattacks and influence campaigns have raised serious concerns, prompting authorities to reschedule elections while addressing security vulnerabilities. …
Black Basta Ransomware: New Tactics and Growing Threats
The Black Basta ransomware group, an offshoot of the now-defunct Conti group, has adapted its attack strategies by integrating sophisticated social engineering techniques. Recent trends include email bombing, malicious QR codes, and credential theft, showcasing the group’s commitment to…
Novel iVerify Tool Detects Widespread Use of Pegasus Spyware
iVerify’s mobile device security tool, launched in May, has identified seven cases of Pegasus spyware in its first 2,500 scans. This milestone brings spyware detection closer to everyday users, underscoring the escalating threat of commercial spyware. How the Tool…
China’s Surveillance System: Cracks in a Digital Panopticon
China’s expansive surveillance network monitors over 1.4 billion citizens, blending advanced technology with minimal legal checks on state control. However, cracks are emerging in this highly complex system. Overview of Surveillance China’s surveillance infrastructure leverages technologies such as:…
Electrica Group Under Cyber Attack, Systems Secure
Romanian energy provider Electrica Group has confirmed a cyber attack on its systems. Despite the breach, the company assured customers that its critical infrastructure remains secure. Incident Overview Electrica revealed that emergency response protocols were activated in line…
Employee Cybersecurity Habits Are Increasing Organizational Risk: Survey
A recent survey involving over 14,000 employees across various industries has unveiled troubling trends in employee behavior that pose significant risks to organizational data security. The findings highlight common yet dangerous practices related to sensitive data management. Key…
Hackers Exploit Cloudflare Tunnels and DNS Fast-Flux to Conceal GammaDrop Malware
A notorious threat actor known as Gamaredon has been observed employing Cloudflare Tunnels to hide its malware staging infrastructure, facilitating the deployment of GammaDrop malware. This technique is part of a spear-phishing campaign actively targeting Ukrainian organizations since early 2024. …
U.S. Officials Sound Alarm Over Salt Typhoon Hack as Cybersecurity Becomes Political Flashpoint
U.S. Officials Urge Encryption Adoption Amid “Salt Typhoon” Cyberattack In an unprecedented response to the “Salt Typhoon” cyber intrusion, top cybersecurity and law enforcement officials in the U.S. are urging citizens to adopt encrypted messaging platforms. The attack, attributed…
Vodka Maker Stoli Files for Bankruptcy in US Following Ransomware Assault
Stoli Group’s U.S. Subsidiaries File for Bankruptcy Amid Ransomware Attack and Russian Asset Seizure The U.S. subsidiaries of Stoli Group have declared bankruptcy following an August ransomware attack and the confiscation of the company’s last distilleries in Russia by…
Telecom Networks on Alert Amid Cyberespionage Concerns
US Federal Government Urges Telecom Firms to Bolster Security Amid Chinese Hacking Allegations The U.S. Federal Government has called on telecommunication companies to strengthen their network security in response to a significant hacking campaign allegedly orchestrated by Chinese state-sponsored…
Meeten Malware Targets Web3 Workers with Crypto-Stealing Tactics
Sophisticated Malware Campaign Targets Web3 Professionals Through Fake Meeting Software Cybercriminals have launched an advanced campaign targeting Web3 professionals by distributing fake video conferencing software. The malware, known as Meeten, infects both Windows and macOS systems, stealing sensitive data,…
FTC Stops Data Brokers from Unlawful User Location Tracking
Data Brokers Accused of Illegal User Tracking The US Federal Trade Commission (FTC) has filed actions against two US-based data brokers for allegedly engaging in illegal tracking of users’ location data. The data was reportedly used to trace individuals in…
Database Service Provider Leak Results in Exposing Over 600,000 Records on Web
SL Data Services, a U.S.-based data broker, experienced a massive data breach, exposing 644,869 personal PDF files on the web. The leaked records included sensitive information such as personal details, vehicle records, property ownership documents, background checks, and court records.…
Here’s How Hackers Are Using QR Codes to Break Browser Security
Browser isolation is a widely used cybersecurity tool designed to protect users from online threats. However, a recent report by Mandiant reveals that attackers have discovered a novel method to bypass this measure by utilizing QR codes for command-and-control…
CFPB US Agency Proposes Rule to Block Data Brokers from Selling Sensitive Personal Information
The Consumer Financial Protection Bureau (CFPB) has proposed a groundbreaking rule to restrict data brokers from selling Americans’ personal and financial information, marking a significant step toward strengthening privacy protections in the digital age. The rule, introduced under the Fair…
The Privacy Risks of ChatGPT and AI Chatbots
AI chatbots like ChatGPT have captured widespread attention for their remarkable conversational abilities, allowing users to engage on diverse topics with ease. However, while these tools offer convenience and creativity, they also pose significant privacy risks. The very technology…
Exploit PoC Validates MiCollab Zero-Day Flaw Risks
A zero-day arbitrary file read vulnerability found in Mitel MiCollab has raised significant concerns about data security. Attackers can exploit this flaw and chain it with a critical bug (CVE-2024-35286) to access sensitive data stored on vulnerable instances of…
Ransomware Attackers Launch New Cyberattacks Against NHS Hospitals
Ransomware hackers have disrupted emergency services, compromised several hospitals, and exposed private patient data in an ongoing cyberattack targeting National Health Service (NHS) trusts across the United Kingdom. The attacks, which have raised serious concerns about cybersecurity in critical…
Andromeda Malware Resurfaces: Targeting APAC Manufacturing and Logistics Industries
In a fresh revelation by the Cybereason Security Services Team, a new wave of attacks linked to the notorious Andromeda malware has been uncovered, focusing on manufacturing and logistics sectors in the Asia-Pacific (APAC) region. This decades-old malware, first detected…
Romania’s Election System Hit by Over 85,000 Cyberattacks, Russian Links Suspected
Romania’s intelligence service in its declassified report disclosed the country’s election systems were hit by over 85,000 cyberattacks. Attackers have also stolen login credentials for election-related sites and posted the information on a Russian hacker forum just before the first…
Are You Using AI in Marketing? Here’s How to Do It Responsibly
Artificial Intelligence (AI) has emerged as a transformative force, reshaping industries and delivering unprecedented value to businesses worldwide. From automating mundane tasks to offering predictive insights, AI has catalyzed innovation on a massive scale. However, its rapid adoption raises…
Iran Spies on Senior Israeli Officials, Launches Over 200 Cyberattacks
Shin Bet, an Israeli Cybersecurity Service said recently it discovered over 200 Iranian phishing attempts targeting top Israeli diplomats to get personal information. Shin Bet believes the attacks were launched by Iranian actors through Telegram, WhatsApp, and email. The threat…
Generative AI Fuels Financial Fraud
According to the FBI, criminals are increasingly using generative artificial intelligence (AI) to make their fraudulent schemes more convincing. This technology enables fraudsters to produce large amounts of realistic content with minimal time and effort, increasing the scale and…
ENISA’s Biennial Cybersecurity Report Highlights EU Threats and Policy Needs
The EU Agency for Cybersecurity (ENISA) has released its inaugural biennial report under the NIS 2 Directive, offering an analysis of cybersecurity maturity and capabilities across the EU. Developed in collaboration with all 27 EU Member States and the…
Turn Your Phone Off Daily for Five Minutes to Prevent Hacking
There are numerous ways in which critical data on your phone can be compromised. These range from subscription-based apps that covertly transmit private user data to social media platforms like Facebook, to fraudulent accounts that trick your friends into…
Italy Warns Media Giant GEDI Over AI Data Partnership with OpenAI
Italy’s data protection regulator, Garante per la Protezione dei Dati Personali, has cautioned GEDI, a leading Italian media group, to comply with EU data protection laws in its collaboration with OpenAI. Reuters reports that the regulator highlighted the risk…
PlayStation Boss : AI can Transform Gaming but Won’t Replace Human Creativity
According to the management at PlayStation, though artificial intelligence (AI) may potentially change the world of gaming, it can never supplant the human creativity behind game development. Hermen Hulst, co-CEO of PlayStation, stated that AI will complement but not…
‘Nearest Neighbour Attack’: Russian Hackers Breach US Firm Wi-Fi
Russian state-sponsored hacking group APT28 (Fancy Bear/Forest Blizzard/Sofacy) has employed a novel “nearest neighbor attack” to breach enterprise WiFi networks from thousands of miles away. The attack, first detected on February 4, 2022, targeted a U.S. company in Washington,…
UK Faces Growing Cyber Threats from Russia and China, Warns NCSC Head
The UK is facing an increasing number of cyberattacks from Russia and China, with serious cases tripling in the past year, according to a new report by the National Cyber Security Centre (NCSC). On Tuesday, Richard Horne, the new NCSC…
The Dark Web’s Role in Phishing and 2FA Security Breaches
Black Friday and Cyber Monday may have passed, but the dangers of online scams and cyberattacks persist year-round. Cybercriminals continue to exploit digital shoppers, leveraging sophisticated tools such as phishing kits, fake websites, and cookie grabbers that bypass two-factor…
Woman Charged in Electric Ireland Customer Information Breach
An Irish national utility service provider, Electric Ireland, is investigating a significant data breach involving customer information. This breach, first reported last year, has led to arrests and an ongoing investigation by the Garda National Cyber Crime Bureau (GNCCB) and…
Big Tech Troubles: Tough Market Conditions Cause 150,00 Job Cuts
The tech industry has been hit by a wave of layoffs, with over 150,000 workers losing their jobs at major companies like Microsoft, Tesla, Cisco, and Intel. As the market adapts to new economic realities, tech firms are restructuring to…
South Korea’s Rising Influence in Global Cybersecurity
South Korea’s Expanding Role in Global Cybersecurity South Korea is emerging as a pivotal player in the global cybersecurity landscape, particularly against the backdrop of escalating tensions between the United States and China in cyberspace. By participating in high-profile…
CISA Warns of Critical Exploits in ProjectSend, Zyxel, and Proself Systems
Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has discovered and added three critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities, impacting North Grid Proself, ProjectSend, and Zyxel firewalls, are being actively exploited, posing serious risks…
The Role of Confidential Computing in AI and Web3
The rise of artificial intelligence (AI) has amplified the demand for privacy-focused computing technologies, ushering in a transformative era for confidential computing. At the forefront of this movement is the integration of these technologies within the AI and…
French Telecom Companies Band Together to Combat Rising Fraud
The four leading mobile network carriers (MNOs) in France have teamed up to combat identity theft and online fraud. To help online companies fight fraud and digital identity theft, Bouygues Telecom, Free, Orange, and SFR announced on December 3…
Hidden Dangers in Third-Party Supply Chain
A supply chain attack refers to any cyberattack targeting a third-party vendor within an organization’s supply chain. Historically, these attacks have exploited trust relationships, aiming to breach larger organizations by compromising smaller, less secure suppliers. The Growing Threat of…
Printer Problems? Don’t Fall for These Dangerous Scams
Fixing printer problems is a pain, from paper jams to software bugs. When searching for quick answers, most users rely on search engines or AI solutions to assist them. Unfortunately, this opens the door to scammers targeting unsuspecting people…
User Tracking: Google to Store User Data for 180 Days
Google has made a major change in its user tracking, a big leap in privacy concerns for users. Google will stop the nosy cloud storage of data it gets from tracking user location in real time. The privacy change Called…
DeepMind Pushes AI Frontiers with Human-Like Tech
In recent years, artificial intelligence (AI) has made significant strides, with a groundbreaking development emerging from Google DeepMind. A team of researchers, sociologists, and computer scientists has introduced a system capable of generating real-time personality simulations, raising important questions…
Orbit Under Siege: The Cybersecurity Challenges of Space Missions
The integration of emerging technologies is reshaping industries worldwide, and the space sector is no exception. Artificial intelligence (AI), now a core component in many industries, has significantly transformed space missions. However, this progress also introduces new cybersecurity risks. In…
Understanding Mimic Ransomware: Features, Threats, and Noteworthy Exploits
Mimic is a ransomware family first discovered in 2022. Like other ransomware, it encrypts files on a victim’s system and demands a cryptocurrency payment for the decryption key. What makes Mimic particularly concerning is its dual approach: it not…
Meet Chameleon: An AI-Powered Privacy Solution for Face Recognition
An artificial intelligence (AI) system developed by a team of researchers can safeguard users from malicious actors’ unauthorized facial scanning. The AI model, dubbed Chameleon, employs a unique masking approach to create a mask that conceals faces in images…
Costa Rica Faces Another Cyberattack, RECOPE Operations Shift to Manual Mode
< div> Costa Rica’s state-owned oil company, RECOPE, suffered a ransomware attack on November 27, disrupting its digital operations and forcing a shift to manual procedures to maintain uninterrupted fuel distribution.