Tag: CySecurity News – Latest Information Security and Hacking Incidents

Common AI Promt Mistakes And How To Avoid Them

  If you are running a business in 2025, you’re probably already using generative AI in some capacity. GenAI tools and chatbots, such as ChatGPT and Google Gemini, have become indispensable in a variety of cases, ranging from content production…

PowerSchool Data Breach Exposes Millions

  An American education technology company, PowerSchool, is the latest giant to fall a victim of hacking and data breaches, which probably compromised millions of records of students and teachers in North America. As one of the leading providers of…

Cyber Breaches: Why Organizations Need to Work On the Clock

  Cyberattacks are fast becoming a reality check for businesses worldwide, inflicting massive financial and operational losses. Besides the immediate loss of funds, cyber attacks also have an impact on an organization’s reputation, hence losing out in competition. The most…

Encryption Key Breach Sparks Concerns Over Cybersecurity

  Cybersecurity experts have raised alarms over a surge in cyberattacks targeting freemail users, driven by artificial intelligence (AI). Hackers are leveraging AI to craft sophisticated phishing scams and fraudulent notifications that are harder to detect. These deceptive messages often…

Hackers Exploit Microsoft Teams for Phishing and Malware Attacks

  < p style=”text-align: justify;”>Cybercriminals are increasingly targeting Microsoft Teams, utilizing the platform for sophisticated phishing, vishing, and ransomware campaigns. Exploiting Teams’ widespread use, attackers employ social engineering tactics to deceive users and extract sensitive data. Methods range from fake…

Global Apps Exploited to Harvest Sensitive Location Data

  Rogue actors within the advertising industry are reportedly exploiting major global apps to collect sensitive user location data on a massive scale. This data is then funneled to a location data firm whose subsidiary has previously sold global tracking…

Malicious GitHub PoC Exploit Spreads Infostealer Malware

  A malicious GitHub repository disguises a proof-of-concept (PoC) exploit for CVE-2024-49113, also known as “LDAPNightmare,” delivering infostealer malware that sends sensitive data to an external FTP server. Disguised as a legitimate PoC, the exploit tricks users into executing malware.…

New Version of Banshee Malware Targets macOS Users

  According to the latest study published this week, a new variant of the info-stealing malware known as “Banshee” has been targeting macOS users’ passwords, cryptocurrency wallets, browser credentials, and other data for at least the past four months. Check…

Ensuring Governance and Control Over Shadow AI

  AI has become almost ubiquitous in software development, as a GitHub survey shows, 92 per cent of developers in the United States use artificial intelligence as part of their everyday coding. This has led many individuals to participate in…

GDPR Violation by EU: A Case of Self-Accountability

  There was a groundbreaking decision by the European Union General Court on Wednesday that the EU Commission will be held liable for damages incurred by a German citizen for not adhering to its own data protection legislation.  As a…

How Trust Can Drive Web3 Adoption and Growth

  Web3 technology promises to transform the internet, making it decentralized, secure, and transparent. However, many people hesitate to adopt it due to a lack of trust in the technology. Building this trust requires clear explanations, user-friendly experiences, and a…

ICAO Investigates Potential Data Breach Amid Cybersecurity Concerns

  The International Civil Aviation Organization (ICAO), a United Nations agency tasked with creating global aviation standards, has disclosed an investigation into a potential cybersecurity incident. Established in 1944, ICAO works with 193 member states to develop and implement aviation-related…

AI and Blockchain: Shaping the Future of Personalization and Security

  The integration of Artificial Intelligence (AI) and blockchain technology is revolutionizing digital experiences, especially for developers aiming to enhance user interaction and improve security. By combining these cutting-edge technologies, digital platforms are becoming more personalized while ensuring that user…

Sophisticated Credit Card Skimmer Malware Targets WordPress Checkout Pages

  Recent cybersecurity reports have highlighted a new, highly sophisticated credit card skimmer malware targeting WordPress checkout pages. This stealthy malware embeds malicious JavaScript into database records, leveraging database injection techniques to effectively steal sensitive payment information. Its advanced design…

Play Ransomware: A Rising Global Cybersecurity Threat

  Play ransomware, also known as Balloonfly or PlayCrypt, has become a significant cybersecurity threat since its emergence in June 2022. Responsible for over 300 global attacks, this ransomware employs a double extortion model — stealing sensitive data before encrypting…

1Password Acquires Trelica to Strengthen SaaS Management and Security

  1Password, the renowned password management platform, has announced its largest acquisition to date: Trelica, a UK-based SaaS (Software-as-a-Service) management company. While the financial details remain undisclosed, this strategic move aims to significantly enhance 1Password’s ability to help businesses better…

This New Malware Exploits VPN Apps to Hijack Devices

  A newly discovered malware, named PLAYFULGHOST, is causing concern among cybersecurity experts due to its versatile capabilities for data theft and system compromise. According to researchers, this malware employs techniques such as screen and audio capture, keylogging, remote shell…

Banking Fraud: Jumped Deposit Scam Targets UPI Users

Users of the unified payments interface (UPI) are the victims of a recent cyber fraud known as the “jumped deposit scam.” First, scammers persuade victims by making a modest, unsolicited deposit into their bank accounts.  How does it operate?  A…

How to Secure Your Home Wi-Fi Network

  In today’s hyperconnected world, securing your home Wi-Fi network is more critical than ever. Whether hosting a party or managing daily internet use, your network faces risks with every new device connection. Without proper safeguards, you could unintentionally expose…

Chinese Hackers Target U.S. Treasury Sanctions Office

  A major cybersecurity breach has been reported against the U.S. Treasury Department, specifically its Office of Foreign Assets Control (OFAC). OFAC, which oversees trade and economic sanctions, was accessed by Chinese state-backed hackers in what officials have described as…

Jordan Approves Blockchain Technology to Boost Innovation

As part of its initiatives to enhance public services and modernize government processes, Jordan has approved the 2025 Blockchain Technology Policy. The Jordanian Council of Ministers unveiled a new policy to improve service delivery to citizens, cut expenses, and streamline…

Solana Pioneers Quantum Resistance in Blockchain Technology

  There is no denying that Solana, one of the fastest-growing blockchain networks, has introduced a groundbreaking security feature called the Winternitz Vault. This feature will protect digital assets from quantum computing threats while maintaining the platform’s high performance. Solana…

Crypto Dealers Targeted in Alarming Kidnapping and Extortion Cases

  < p style=”text-align: justify;”>Recent incidents have revealed a troubling trend of cryptocurrency dealers being targeted for kidnappings and extortion. These cases underline the risks associated with the growing prominence of the cryptocurrency sector. French authorities recently rescued a 56-year-old…

Phishing Campaign Impersonating SSA Deploys Remote Access Tool

< p style=”text-align: justify;”>Hackers have launched a sophisticated phishing campaign impersonating the United States Social Security Administration (SSA) to deliver the ConnectWise Remote Access Tool (RAT), according to a report by Cofense Intelligence. This operation, active since September 2024 and…

Hackers Use PhishWP to Steal Payment Info on WordPress Sites

  Cybersecurity researchers have uncovered a malicious WordPress plugin called PhishWP that transforms legitimate websites into tools for phishing scams. This plugin allows attackers to set up fake payment pages mimicking trusted services like Stripe, tricking users into divulging sensitive…

T-Mobile Thwarts Cyberattack Amid Growing Telecom Threats

  Between September and November, T-Mobile successfully defended against a cyberattack attributed to the Chinese state-sponsored group Salt Typhoon. Unlike previous incidents, this time, no data was compromised. However, the attack highlights growing cybersecurity vulnerabilities in the U.S. telecom sector. …

Malware Targets Ukrainian Military via Fake App

  Cybersecurity experts said that a malware campaign targeting Ukraine’s military personnel has been released. The malware is spread with the help of a fake installer for an app called “Army+.” That installer looks perfectly legitimate but embeds malicious code.…

Rethinking Password Security: Why Length Matters More Than Complexity

  The growing number of online accounts has made managing passwords increasingly difficult. With users juggling dozens of accounts, creating secure yet memorable passwords has become a major challenge. Traditional password guidelines emphasize complexity, requiring combinations of uppercase and lowercase…

How to Declutter and Safeguard Your Digital Privacy

  As digital privacy concerns grow, taking steps to declutter your online footprint can help protect your sensitive information. Whether you’re worried about expanding government surveillance or simply want to clean up old data, there are practical ways to safeguard…

Cyberattack on Cyberhaven Chrome Extension Exposes Sensitive Data

  < p style=”text-align: justify;”>On Christmas Eve, Cyberhaven, a data loss prevention company, experienced a cyberattack targeting its Google Chrome extension. The breach exposed sensitive customer data, including passwords and session tokens. The company has since taken swift measures to…

Tech Ventures: Israel Advances in Crypto Ecosystem

Israel, often known as the “Startup Nation,” has emerged as a global leader in cybersecurity, defense, and internet technologies. Cryptocurrency has easily integrated into the high-tech ecosystem, transforming the digital asset class and blockchain technology into key drivers of the…

Milwaukee Residents Warned of Parking Ticket Scam

  A fraudulent text message claiming to notify residents about an overdue City of Milwaukee parking penalty has been flagged as a scam and should be deleted, city authorities announced earlier this week. According to Ald. Lamont Westmoreland, the scam…

Volkswagen Cybersecurity Breach Exposes Sensitive Vehicle Data

  < p style=”text-align: justify;”>A recent cybersecurity lapse within Volkswagen’s Cariad unit, which manages the company’s cloud systems, exposed sensitive data from hundreds of thousands of vehicles. The breach, attributed to a misconfiguration in a cloud environment hosted on Amazon…

Android Smartphones Revolutionize Ionosphere Mapping

  < p style=”text-align: justify;”>Mapping the ionosphere is essential for improving the precision of navigation systems, yet traditional methods face significant limitations. Ground-based GNSS stations, while providing detailed maps of ionospheric total electron content (TEC), suffer from poor spatial coverage,…

2024 CrowdStrike Outage Reveals Critical IT Vulnerabilities

  < p style=”text-align: justify;”>The CrowdStrike outage in July 2024 exposed significant weaknesses in global IT supply chains, raising concerns about their resilience and dependence on major providers. The disruption caused widespread impact across critical sectors, including healthcare, transportation, banking,…

Hackers Use Russian Domains for Phishing Attacks

The latest research has found a sharp rise in suspicious email activities and a change in attack tactics. If you are someone who communicates via email regularly, keep a lookout for malicious or unusual activities, it might be a scam.…

Understanding Ransomware: A Persistent Cyber Threat

  Ransomware is a type of malicious software designed to block access to files until a ransom is paid. Over the past 35 years, it has evolved from simple attacks into a global billion-dollar industry. In 2023 alone, ransomware victims…