Category: CySecurity News – Latest Information Security and Hacking Incidents

Prototype Pollution-like Bug Variant Found in Python

Prototype Pollution Prototype pollution is a severe vulnerability class associated with prototype-based languages, the most popular among them being JavaScript.  However, a researcher has discovered Python-specific variants of prototype pollution, and other class-based programming languages may also be exposed to…

The PoweRAT Malware Attacks PyPI Users

  The software supply chain security company Phylum has discovered a malicious assault using the PoweRAT backdoor and an information thief that targets users of the Python Package Index (PyPI). The campaign was initially discovered on December 22, 2022, when…

JsonWebToken Library Security Flaw: Used in 20,000+ Projects

In the widely-used open-source project, JavaScript library JsonWebToken researchers from Palo Alto Networks unit 42 found a new high-severity vulnerability –  CVE-2022-23529.  Palo Alto Networks released a security advisory on Monday highlighting how the weakness could be used by an attacker to execute…

Is Data Safeguarded by an Encrypted Email Service?

Email is the primary form of communication in both our personal and professional lives. Users might be surprised to hear that email was never intended to be secure due to our dependency on it. Email communication carries some risks, but…

LastPass Data Leak: Data of 30 Million Users at Risk

What is LastPass Breach? On 22nd December 2022, online password management service LastPass revealed that threat actors can steal sensitive information from user accounts like billing, end-user names, email IDs, IP address info, and telephone numbers.  The leak also includes…

To Avoid Detection, Vidar Stealth Operators Use SM Platforms

  Several days ago, the commercially available off-the-shelf malware BitRat was observed with a newly discovered distribution method for how it was spread. Now, a new information theft malware called Vidar Stealer has been discovered. This malware uses advanced techniques…

Hackers Target Chick-fil-A Customers Credentials

Chick-fil-A- is investigating concerns of suspicious transactions on its mobile app after multiple users claimed that hackers gained their personal data, including bank account details. Customers at Chick-fil-A, a well-known chicken restaurant business, may be the latest targets of hackers.…

Top Cybersecurity News Stories of the Week

  Data breaches have been a worry ever since Elon Musk invested $44 billion in Twitter and fired a sizable portion of the workforce. Now it appears that a security incident from before Musk’s takeover is giving people trouble. This…

Crypto Withdrawals of $8bn Hit Silvergate, a US bank

  Silvergate, the US bank that offers cryptocurrency services, has reported that its clients have withdrawn over $8 billion (£6.7 billion) of their cryptocurrency-linked deposits over the past several weeks.  In the final three months of 2022, roughly one-third of…

Hackers with ChatGPT, Build Malware and Plot Fake Girl Bots

On Friday, a report from Israeli security company Check Point warned companies against the threat actors who have started using OpenAI’s artificially intelligent chatbot ChatGPT to quickly build hacking tools.  Hackers are also working to build other chatbots which will…

How Hackers Can Exploit ChatGPT, a Viral AI Chatbot

Cybernews researchers have discovered ChatGPT, a platform that provides hackers step-by-step instructions on hacking a website. An AI-based chatbot, ChatGPT was launched recently and has caught the attention of the online community.  The team at Cybernews has warned that AI…

Warning: Ransomware Attacks Spreading via Fortinet Kit

  The eSentire’s Threat Research Unit (TRU) confirmed in its recent research that the threat actors are exploiting Fortinet Virtual Private Network (VPN) devices that remain vulnerable to critical authentication bypass vulnerability.  The VPNs were being controlled by third-party providers;…

Search Results Contain Imposter Ads, FBI Warns

  Bogus advertising: a tightrope walk  Since the early days of the Internet, rogue ads have been a particular plague on the Internet. As a user, you never quite know what’s waiting in the browser, such as an irritating pop-up…

WhatsApp Allows Communication Amid Internet Outages

On January 5, WhatsApp revealed a new feature that enables users to connect via proxy servers so they may continue using the service even when the internet is restricted or disrupted by shutdowns. Concept of Whatsapp proxy  When selecting a…

Report States Many Phones To Soon Get Satellite Connectivity

  A new partnership between satellite phone company Iridium and chip giant Qualcomm will bring satellite connectivity to premium Android smartphones later this year. It implies that handsets can communicate with passing satellites to send and receive messages even in…

Police Hacked Thousands of Phones. Was it Legal?

In October 2020, Christian Lödden’s potential clients sought to discuss just one thing, which carried on for a week. Every individual whom the German criminal defense lawyer has contacted had apparently been utilizing the encrypted phone network EncroChat. This information…

Rackspace: Ransomware Bypasses ProxyNotShell Mitigations

  According to Rackspace Technology, a cloud hosting company that provides managed cloud services, the massive December 2 attacks have caused the company to take action. As part of the attack, thousands of small and midsized businesses suffered disruption in…

Ransomware Attacks on U.S. Hospitals Causing Deaths

Every day we are witnessing ransomware attacks, and companies worldwide are investing millions to protect their network and systems from digital attacks, however, it is getting increasingly challenging to fight against cyber threats because cyber attackers do not only use…

Hybrid Cybersecurity: A Need of the Hour

  Training artificial intelligence (AI) and machine learning (ML) models to provide enterprises with hybrid cybersecurity at scale requires human intelligence and intuition. When human intelligence and intuition are combined with AI and ML models, subtleties in attack patterns that…

Train Platform RailYatri Again Suffered a Breach

On Wednesday, Train ticketing platform RailYatri released its statement in which it confirmed that the platform suffered a data breach in December 2022. The confirmation is coming after the Railway Ministry denied such an attack and also remarked that no…

Everything You Need to Know About Crowdsource Security

Crowdsourced Security  Organizations of all sizes conventionally use penetration testing to secure their systems. Pen testing simulates a cyberattack with the goal of exposing security flaws, much like any real attack would. These vulnerabilities are patched up once they are…

WordPress Sites Hit by New Linux Malware

According to an analysis by cybersecurity company Dr. Web, WordPress-based websites are being targeted by an unidentified Linux malware variant. Recognized as LinuxBackDoor.WordPressExploit.1, while it can also operate on 64-bit Linux versions, the Trojan favors 32-bit versions. 30 vulnerabilities in…

How to Shield Businesses from State-Sponsored AI Attacks

  In cybersecurity, artificial intelligence is becoming more and more significant, both for good and bad. The most recent AI-based tools can help organizations better identify threats and safeguard their systems and data resources. However, hackers can also employ the…

Pig Butchering Scam: Here’s Everything you Need to Know

  Criminals make billions of dollars via digital tricks including romance scams and business email hacks. And they always begin with a small amount of “social engineering” to deceive a victim into taking an unfavourable action, like transferring money into…

Overreliance on Detection Solutions in Security Stacks

  The typical approach to detection used by organizations is to employ a variety of methods, such as antivirus software, sandbox engines, extensive data analysis, and anomaly detection, among others. This depends on the organization. Through monitoring and spotting, these…

Mysterious Threats of ‘Dark Data’ in Organizations

  Data security is becoming costlier for organizations worldwide and the threats of cyber attacks added pressure on organizations from customers to protect their sensitive information. As a result, several organizations have already invested in new processes to safeguard their…

California’s Consumer Privacy Act has Been Updated

  California’s unique consumer privacy law was strengthened on January 1 as a result of a ballot initiative that 2020 voters endorsed. A new privacy law that puts new requirements on companies to make sure that employees have more authority…

Can you escape Cybersecurity? Maybe No

Suppose you are part of an organization that has any form of an online presence. In that case, you will ultimately have to take initiative to look after the security of the systems, devices, and data. And if driven criminals,…

UAE’s Sincere Efforts to Combat Cybercrime

  The Abu Dhabi Judicial Department (ADJD) held an awareness-raising lecture on “Cybercrime and its Dangers to Society” in conjunction with “Majalis” Abu Dhabi at the Citizens and Community Affairs Office of the Presidential Court as part of its initiatives…

RedZei Group Targets Chinese Students in U.K.

  Chinese students studying in the UK have been one of the most common targets of scammers. RedZei (aka RedThief) Group, a Chinese-speaking scammer group that operates online and is becoming more common these days, bypasses all the precautions that…

Cybercriminals Stole Data by Spoofing Victim’s Webpage

The BlackCat ransomware group is experimenting with a new method of threatening victims into paying extortion building a fake website on the open internet that displays the personal information that was stolen from the victim.  ALPHV, commonly known as BlackCat ransomware, is…

Snatch Ransomware Targets Volvo Cars

  Volvo revealed in a press release that some of its research and development assets were the target of a cyberattack. The ransomware organization Snatch reportedly released pictures of stolen Volvo papers into the darknet on November 30, according to…

The 5 Most Common Types of Trojans You Should Know About

  Cybercriminals create more complicated and diverse methods of obtaining sensitive data as we become more dependent on technology and entrust it with more of our personal information. There are many different types of harmful malware, including Trojan Horses. But…

This New Encryption Can Make Gmail Safer

  There’s a new way to keep your Gmail safe from prying eyes, and experts say it’s well worth using. Google announced the addition of end-to-end encryption (E2EE) to Gmail on the web, which will allow enrolled Google Workspace users…

POS Malware: Your Business Might Be at Risk

POS malware- Your business might be at risk If you are a business owner that uses a POS system for receiving payments, you should be cautious about the dangers of point-of-sale malware and various threats associated with it.  Malware is…

Crypto Platform 3Commas Attacked

  Cryptocurrency trading platform 3Commas reported that they suffered a data breach in which API data were stolen. Following the incident, an FBI investigation has been called in.  However, the investigation comes after weeks of criticism from users of the…

How to Migrate to the Cloud Securely

  Increasingly, organizations and business units are migrating mission-critical data and systems to the cloud.  Migration to and between all kinds of cloud services is indeed associated with security challenges; however, migration between public cloud services is the most challenging…

50% of KEV Catalog Were Big Corporations

According to Grey Noise, almost 50% of the upgrades to the KEV catalog in 2022 were due to actively exploited vulnerabilities in Microsoft, Adobe, Cisco, and Apple products. The KEV catalog’s earlier vulnerabilities from before 2022 made up 77% of…

Twitter 400 Million User’s Details Up for Sale

Recently, the threat actor, “Ryushi”, allegedly reported having stolen data from Twitter, including details of some famous celebrities worldwide. He is demanding $200,000 (£166,000) to hand over the data back. According to the data, the hacker stole email addresses, and…

Multiple Malware Being Sold on Darkweb Forums

Researchers have recently discovered a new threat group, PureCoder, apparently selling numerous malware on the dark web. They listed malware such as miners, information stealers, and crypters, used by threat actors for their campaigns.  Spread of PureLogs/PureCrypt  Two of the…

A Zero-Trust Future Encourage Next-Generation Firewalls

The future of Zero Trust security relies greatly on next-generation firewalls (NGFWs). NGFWs are classified by Gartner Research as “deep packet inspection firewalls that incorporate software inspection, intrusion prevention, and the injection of intelligence from outside the firewall  in addition…

Here is Another Powerful Case Against Using Pirated Software

Downloading unlicensed software can save you a few dollars, but you risk losing much more because researchers have found a cryptocurrency-targeting info stealer hiding within the cracks. “RisePro” is a brand-new piece of information-stealing malware that was discovered by two…

Cybercriminals Use Google Ads to Deploy Malware

  Hackers are utilizing the Google Ads service more consistently than ever before to transmit malware. As soon as the victims click the download link on the threat actors’ fake versions of the official websites, trojanized software is distributed.  Grammarly,…