Tag: CySecurity News – Latest Information Security and Hacking Incidents

Lazarus Group Exploits Chrome Zero-Day Flaw Via Fake NFT Game

  The notorious North Korean hacking outfit dubbed Lazarus has launched a sophisticated attack campaign targeting cryptocurrency investors. This campaign, discovered by Kaspersky researchers, consists of a multi-layered assault chain that includes social engineering, a fake game website, and a…

WhatsApp Moves Toward Usernames, Phasing Out Phone Numbers

  WhatsApp has announced enhancements to its contact management features, allowing users to add and manage contacts from any device. Previously, contact management was limited to mobile devices, requiring users to input phone numbers or scan QR codes. The update…

AI-Driven Deepfake Scams Cost Americans Billions in Losses

  As artificial intelligence (AI) technology advances, cybercriminals are now capable of creating sophisticated “deepfake” scams, which result in significant financial losses for the companies that are targeted. On a video call with her chief financial officer, in which other…

Nidec Corporation Ransomware Attack: Data Leak on Dark Web

  In a recent disclosure, Nidec Corporation, a global leader in precision motors and automotive components, confirmed a significant data breach from a ransomware attack that occurred earlier this year. Hackers, after failing to extort the company, leaked stolen data…

HM Surf Bug in macOS Raises Data Privacy Concerns

  Several vulnerabilities in the Safari web browser for macOS may have left users open to being spied on, having their data stolen, and acquiring other types of malware thanks to this security weakness. Specifically, the vulnerability arises from the…

Vietnamese Hackers Target Digital Marketers in Malware Attack

  Cyble Research and Intelligence Lab recently unearthed an elaborate, multi-stage malware attack targeting not only job seekers but also digital marketing professionals. The hackers are a Vietnamese threat actor who was utilising different sophisticated attacks on systems by making…

Cyber Threats by Nation-States Surge Beyond Control

  In recent years, state-sponsored hacker groups have increased their attacks on critical infrastructure, causing great concern across the globe. It has become increasingly evident that these coordinated and sophisticated cyber threats and attacks are posing serious risks to the…

How to Enhance Your Windows Security with Memory Integrity

  Windows Security, the antivirus program built into Microsoft’s operating system, is generally sufficient for most users. It provides a decent level of protection against various threats, but a few important features, like Memory Integrity, remain turned off by default.…

The Extent of Data Surveillance in Modern Smart TVs

  Several years ago, smart TVs started to become popular choices in households. They are widely available now and provide a wide range of features and applications that make them an excellent choice. To stay competitive, users will be inclined…

Iranian Attackers Exploit Windows Bug to Elevate Privileges

  The Iranian state-sponsored hacking outfit APT34, dubbed OilRig, has recently escalated its activity by launching new campaigns against government and vital infrastructure entities in the United Arab Emirates and the Gulf area.  OilRig employed a new backdoor to target…

AI-Powered Hack Poses Threat to Billions of Gmail Accounts

  Currently, there is a cyberattack powered by artificial intelligence that targets Gmail’s huge network of 2.5 billion users, which is currently making waves. As a way of tricking people into sharing sensitive information, hackers use advanced techniques, including realistic…

New Coalition to Take Down Online Scams, Led by Google

  As cybercrime continues to cost the world economy billions annually, a robust new coalition launched by Google, the DNS Research Federation, and the Global Anti-Scam Alliance (GASA) is working to disrupt online scammers at a global level. By all…

AI Deepfakes Pose New Threats to Cryptocurrency KYC Compliance

  ProKYC is a recently revealed artificial intelligence (AI)-powered deep fake tool that nefarious actors can use to circumvent high-level Know Your Customer (KYC) protocols on cryptocurrency exchanges, presenting as a very sophisticated method to circumvent high-level KYC protocols. A…

AsyncRAT Malware Exploits Bitbucket to Launch Multi-Stage Attack

  G DATA Security Lab has discovered a sophisticated malware operation that used Bitbucket, a popular code hosting platform, to propagate AsyncRAT, a well-known remote access trojan.  According to the study, the attackers employed a multi-stage assault strategy, exploiting Bitbucket…

American Water Works faces Cyberattack

American Water Works, the country’s largest provider of water services to 14 states, recently reported that it was cyber attacked on its information technology system. The current report has indicated that operational technology systems that control delivery of water within…

How Southeast Asian Cyber Syndicates Stole Billions

In 2023, cybercrime syndicates in Southeast Asia managed to steal up to $37 billion, according to a report by the United Nations Office on Drugs and Crime (UNODC). Inside the World of Cybercrime Syndicates in Southeast Asia This staggering figure…

Why Trust Drives the Future of Cybersecurity Marketing

  With the changing nature of threats in cyberspace becoming sharper by the day, business houses are seen as shy about entrusting their precious data to the cybersecurity firm of choice. Shallow, flashy, and blanket marketing tactics that worked a…

Understanding and Combating Insider Threats in the Digital Age

Insider threats have emerged as a particularly insidious and costly problem. Organizations are experiencing a significant surge in cyberattacks originating from insider threats, with remediation costs soaring up to $2 million per incident. Gurucul’s research, which involved a survey of…

Healthcare Cybersecurity: Taking a Proactive Route

  Cyberattacks in healthcare are growing more common and can disrupt an organization’s operations. Healthcare organisations handle a lot of sensitive data, including financial information, patient health records, and identifying data, making them prime targets for cybercriminals.  This vulnerability is…

Google’s Latest Theft Protection for Android Devices

  Google is introducing new high-level theft protection features for Android 10 and above devices across Google Play services. The new technologies were announced at the I/O 2024 event, with the main idea being to protect users’ data and make…

DoT Introduces New System to Block Spoofed Calls

  There has been an increase in fraudulent telephone calls disguised as local numbers in recent years which has alarmed Indian citizens. Messages sent by cybercriminals operating internationally originate from Calling Line Identity (CLI) systems that allow them to mask…

MC2 Data Breach Exposes Millions: Stay Protected

  Cybernews reported on September 23 that background check company MC2 Data suffered a major data breach, exposing 2.2 terabytes of sensitive information. This breach potentially affects about 100 million Americans, raising serious concerns among cybersecurity experts about the risks…

Cryptomining and Proxyjacking: The Rise of Perfctl Malware

A new and highly sophisticated malware strain has emerged, posing a significant threat to millions of Linux servers worldwide. Dubbed “perfctl,” this fileless malware employs advanced evasion techniques and exploits a staggering 20,000 misconfigurations in Linux servers.  Its primary targets…