Category: CySecurity News – Latest Information Security and Hacking Incidents

1Password Acquires Trelica to Strengthen SaaS Management and Security

  1Password, the renowned password management platform, has announced its largest acquisition to date: Trelica, a UK-based SaaS (Software-as-a-Service) management company. While the financial details remain undisclosed, this strategic move aims to significantly enhance 1Password’s ability to help businesses better…

This New Malware Exploits VPN Apps to Hijack Devices

  A newly discovered malware, named PLAYFULGHOST, is causing concern among cybersecurity experts due to its versatile capabilities for data theft and system compromise. According to researchers, this malware employs techniques such as screen and audio capture, keylogging, remote shell…

Banking Fraud: Jumped Deposit Scam Targets UPI Users

Users of the unified payments interface (UPI) are the victims of a recent cyber fraud known as the “jumped deposit scam.” First, scammers persuade victims by making a modest, unsolicited deposit into their bank accounts.  How does it operate?  A…

How to Secure Your Home Wi-Fi Network

  In today’s hyperconnected world, securing your home Wi-Fi network is more critical than ever. Whether hosting a party or managing daily internet use, your network faces risks with every new device connection. Without proper safeguards, you could unintentionally expose…

Chinese Hackers Target U.S. Treasury Sanctions Office

  A major cybersecurity breach has been reported against the U.S. Treasury Department, specifically its Office of Foreign Assets Control (OFAC). OFAC, which oversees trade and economic sanctions, was accessed by Chinese state-backed hackers in what officials have described as…

Jordan Approves Blockchain Technology to Boost Innovation

As part of its initiatives to enhance public services and modernize government processes, Jordan has approved the 2025 Blockchain Technology Policy. The Jordanian Council of Ministers unveiled a new policy to improve service delivery to citizens, cut expenses, and streamline…

Solana Pioneers Quantum Resistance in Blockchain Technology

  There is no denying that Solana, one of the fastest-growing blockchain networks, has introduced a groundbreaking security feature called the Winternitz Vault. This feature will protect digital assets from quantum computing threats while maintaining the platform’s high performance. Solana…

Crypto Dealers Targeted in Alarming Kidnapping and Extortion Cases

  < p style=”text-align: justify;”>Recent incidents have revealed a troubling trend of cryptocurrency dealers being targeted for kidnappings and extortion. These cases underline the risks associated with the growing prominence of the cryptocurrency sector. French authorities recently rescued a 56-year-old…

Phishing Campaign Impersonating SSA Deploys Remote Access Tool

< p style=”text-align: justify;”>Hackers have launched a sophisticated phishing campaign impersonating the United States Social Security Administration (SSA) to deliver the ConnectWise Remote Access Tool (RAT), according to a report by Cofense Intelligence. This operation, active since September 2024 and…

Hackers Use PhishWP to Steal Payment Info on WordPress Sites

  Cybersecurity researchers have uncovered a malicious WordPress plugin called PhishWP that transforms legitimate websites into tools for phishing scams. This plugin allows attackers to set up fake payment pages mimicking trusted services like Stripe, tricking users into divulging sensitive…

T-Mobile Thwarts Cyberattack Amid Growing Telecom Threats

  Between September and November, T-Mobile successfully defended against a cyberattack attributed to the Chinese state-sponsored group Salt Typhoon. Unlike previous incidents, this time, no data was compromised. However, the attack highlights growing cybersecurity vulnerabilities in the U.S. telecom sector. …

Malware Targets Ukrainian Military via Fake App

  Cybersecurity experts said that a malware campaign targeting Ukraine’s military personnel has been released. The malware is spread with the help of a fake installer for an app called “Army+.” That installer looks perfectly legitimate but embeds malicious code.…

Rethinking Password Security: Why Length Matters More Than Complexity

  The growing number of online accounts has made managing passwords increasingly difficult. With users juggling dozens of accounts, creating secure yet memorable passwords has become a major challenge. Traditional password guidelines emphasize complexity, requiring combinations of uppercase and lowercase…

How to Declutter and Safeguard Your Digital Privacy

  As digital privacy concerns grow, taking steps to declutter your online footprint can help protect your sensitive information. Whether you’re worried about expanding government surveillance or simply want to clean up old data, there are practical ways to safeguard…

Cyberattack on Cyberhaven Chrome Extension Exposes Sensitive Data

  < p style=”text-align: justify;”>On Christmas Eve, Cyberhaven, a data loss prevention company, experienced a cyberattack targeting its Google Chrome extension. The breach exposed sensitive customer data, including passwords and session tokens. The company has since taken swift measures to…

Tech Ventures: Israel Advances in Crypto Ecosystem

Israel, often known as the “Startup Nation,” has emerged as a global leader in cybersecurity, defense, and internet technologies. Cryptocurrency has easily integrated into the high-tech ecosystem, transforming the digital asset class and blockchain technology into key drivers of the…

Milwaukee Residents Warned of Parking Ticket Scam

  A fraudulent text message claiming to notify residents about an overdue City of Milwaukee parking penalty has been flagged as a scam and should be deleted, city authorities announced earlier this week. According to Ald. Lamont Westmoreland, the scam…

Volkswagen Cybersecurity Breach Exposes Sensitive Vehicle Data

  < p style=”text-align: justify;”>A recent cybersecurity lapse within Volkswagen’s Cariad unit, which manages the company’s cloud systems, exposed sensitive data from hundreds of thousands of vehicles. The breach, attributed to a misconfiguration in a cloud environment hosted on Amazon…

Android Smartphones Revolutionize Ionosphere Mapping

  < p style=”text-align: justify;”>Mapping the ionosphere is essential for improving the precision of navigation systems, yet traditional methods face significant limitations. Ground-based GNSS stations, while providing detailed maps of ionospheric total electron content (TEC), suffer from poor spatial coverage,…

2024 CrowdStrike Outage Reveals Critical IT Vulnerabilities

  < p style=”text-align: justify;”>The CrowdStrike outage in July 2024 exposed significant weaknesses in global IT supply chains, raising concerns about their resilience and dependence on major providers. The disruption caused widespread impact across critical sectors, including healthcare, transportation, banking,…

Hackers Use Russian Domains for Phishing Attacks

The latest research has found a sharp rise in suspicious email activities and a change in attack tactics. If you are someone who communicates via email regularly, keep a lookout for malicious or unusual activities, it might be a scam.…

Understanding Ransomware: A Persistent Cyber Threat

  Ransomware is a type of malicious software designed to block access to files until a ransom is paid. Over the past 35 years, it has evolved from simple attacks into a global billion-dollar industry. In 2023 alone, ransomware victims…

General Dynamics Confirms Data Breach Via Phishing Campaign

  < p style=”text-align: justify;”>In October 2024, General Dynamics (GD), a prominent name in aerospace and defense, confirmed a data breach impacting employee benefits accounts. The breach, detected on October 10, affected 37 individuals, including two residents of Maine. Attackers…

EU Officially Announce USB-C as Global Charging Standard

  < p style=”text-align: justify;”>For tech enthusiasts and environmentalists in the European Union (EU), December 28, 2024, marked a major turning point as USB-C officially became the required standard for electronic gadgets. The new policy mandates that phones, tablets, cameras,…

Critical Security Issue Hits Four-Faith Routers

  < p style=”text-align: justify;”>According to VulnCheck, a critical vulnerability identified as CVE-2024-12856 has been discovered in Four-Faith industrial routers, specifically affecting the F3x24 and F3x36 models, as well as users’ machines. Evidence suggests active exploitation of this vulnerability in…

Cybercriminals Exploit Identity Verification Systems

  Cybercriminals on the dark web have developed new ways to exploit identity verification systems. Rather than hacking or stealing personal information, they are purchasing it directly from individuals, as revealed by security researchers at iProov. This approach allows them…

Critical Infrastructure Faces Rising Ransomware Risks

  In October 2024, Interlock claimed to have attacked several organizations, including Wayne County, Michigan, which is known for its cyberattacks. Ransomware is characterized by the fact that the encrypted data is encrypted by an encryptor specifically designed for the…

Tech’s Move Toward Simplified Data Handling

  The ethos of the tech industry for a long time has always been that there is no shortage of data, and that is a good thing. Recent patents from IBM and Intel demonstrate that the concept of data minimization…

New Finds from The June Ascension Hack

Healthcare industry giant Ascension has broken the silence and revealed more sensitive information concerning the recent hack in June. Through a worker opening a suspicious file without even knowing the malware was actually very harmful to download, it gave room…

AI Impersonations: Revealing the New Frontier of Scamming

  In the age of rapidly evolving artificial intelligence (AI), a new breed of frauds has emerged, posing enormous risks to companies and their clients. AI-powered impersonations, capable of generating highly realistic voice and visual content, have become a major…

Integrating Human Expertise and Technology for Robust Cybersecurity

  < p style=”text-align: justify;”> In today’s complex digital landscape, the role of human expertise in cybersecurity remains indispensable. Two pivotal approaches — human-led security testing and human-centric cybersecurity (HCC) — have gained prominence, each contributing distinct strengths. However, these…

Protect Yourself from AI Scams and Deepfake Fraud

  In today’s tech-driven world, scams have become increasingly sophisticated, fueled by advancements in artificial intelligence (AI) and deepfake technology. Falling victim to these scams can result in severe financial, social, and emotional consequences. Over the past year alone, cybercrime…

Fortinet Researchers Discover Two Malicious Python Packages

  A new research published earlier this week by Fortinet Inc.’s FortiGuard Labs warns of two newly found malicious Python packages that indicate a major threat of credential theft, data exfiltration, and unauthorised system access. The first flaw, Zebo-0.1.0, was…

Big Tech’s Interest in LLM Could Be Overkill

  AI models are like babies: continuous growth spurts make them more fussy and needy. As the AI race heats up, frontrunners such as OpenAI, Google, and Microsoft are throwing billions at massive foundational AI models comprising hundreds of billions…

Global Crypto Hacks Escalate to $2.2 Billion in 2024

  Chainalysis, a blockchain analytics company that provides data analysis on the blockchain ecosystem, has reported that the volume of compromised crypto funds and the number of hacking incidents are set to rise in 2024. The report states that the…

Hackers are Employing Amazon Appstore to Propagate Malware

  ‘BMI CalculationVsn’ is a malicious Android spyware app that was identified on the Amazon Appstore. It poses as a simple health tool while covertly harvesting data from compromised devices.  Cybersecurity researchers from McAfee Labs discovered the app and notified…