Tag: CySecurity News – Latest Information Security and Hacking Incidents

Here’s How to Safeguard Your Credit Card Info

  Sure, you recognise a phishing email (even if your parents don’t). Unfortunately, thieves are constantly coming up with new ways to get unauthorised access to credit card information, leaving you with financial losses and emotional distress. While hackers demonstrate…

Hackers Infect Call of Duty Players with Self-Spreading Malware

Hackers have recently been discovered abusing Call of Duty players with a self-propagating software attack, raising serious concerns among the gaming community. This malicious activity, which security researchers have uncovered, has aroused concerns since it may compromise user data and…

ChatGPT’s Plug-In Vulnerabilities

  ChatGPT, the revolutionary language model developed by OpenAI, has been making waves in the tech world for its impressive capabilities in natural language understanding. However, recent developments have highlighted a significant concern – ChatGPT’s plug-in problem, which poses potential…

FraudGPT: ChatGPT’s Evil Face

  Threat actors are promoting the FraudGPT artificial intelligence (AI) tool, which follows in the footsteps of WormGPT, on a number of Telegram channels and dark web marketplaces. This is an AI bot, solely designed for malicious purposes, such as…

Challenge Arising From the ChatGPT Plugin

OpenAI’s ChatGPT has achieved important advancements in AI language models and provides users with a flexible and effective tool for producing human-like writing. But recent events have highlighted a crucial problem: the appearance of third-party plugins. While these plugins promise…

Stolen Session Cookies Turns Into the Next Cyber Threat

According to the recent Identity Exposure Report by SpyCloud, 87,000 credentials linked to Fortune 1000 C-level executives were recovered from the criminal underworld, in year 2022. Security leaders across organizations continue to live in constant terror of becoming a victim…

BlackCat Attackers Target Italian Asset Manager Azimut

  Azimut Group, an Italian asset management firm that oversees over $87.2 billion in assets, declared in a public statement that it will “not comply by any means” with a ransomware demand from the notorious hacking organisation BlackCat.  Israeli hacking…

Human Error: A Helping Hand for Cyber Criminals

  The use of passwords, a fundamentally faulty strategy that was developed many years ago, has been the primary method for securing an organisation’s internal systems and its customers’ accounts for far too long. Despite efforts to provide better, more…

Yoga Trainer Defrauded of Rs.94,998 in a Paytm Fraud

In a shocking incident of cyber fraud in Lucknow, India, a yoga trainer lost Rs. 94,998 from her bank account within five transactions that she made online. The victim claims to have been approached by the fraudsters impersonating a BSF…

Critical Vulnerabilities in AMI MegaRAC BMC Software

Eclypsium, a cybersecurity company, recently discovered two serious flaws in the AMI MegaRAC Baseboard Management Controller (BMC) software, raising questions about the security of millions of servers throughout the world. If these weaknesses are used against the affected systems, serious…

Beyond Security: The Comprehensive Approach to Tackling Cyberattacks

  In today’s digital landscape, organizations are increasingly facing the harrowing consequences of cyberattacks, particularly ransomware incidents. In these malicious schemes, hackers encrypt vital data, rendering it inaccessible, and then demand exorbitant payments for its restoration.  Unfortunately, such attacks are…

Warcraft Fans Trick AI with Glorbo Hoax

Ambitious Warcraft fans have persuaded an AI article bot into writing about the mythical character Glorbo in an amusing and ingenious turn of events. The incident, which happened on Reddit, demonstrates the creativity of the game industry as well as…

Ransomware Outbreak in Canada: Cybersecurity Meltdown

  Canadians and Canadian organizations are increasingly falling victim to ransomware attacks. There was an emphasis placed on the urgency of addressing the cyber security issue by Sami Khoury, the president of the Canadian Centre for Cyber Security. The President…

Ransomware Trends: RaaS and Cryptocurrency Impacts

Ransomware attacks have become a pressing concern for individuals, businesses, and governments worldwide. Cybercriminals are constantly evolving their tactics, and two significant trends that demand close monitoring are the rise of Ransomware-as-a-Service (RaaS) and the growing reliance on cryptocurrencies for…

Top Cyber Official Says AI Needs Better Security

  Artificial intelligence (AI) is used by hackers and propagandists to develop malicious software, draft convincing phishing emails to infect computers, and spread false information via the web, according to Canada’s top cybersecurity official, who spoke to Reuters on Thursday.…

Enhancing Security and Observability with Splunk AI

  During Splunk’s .conf23 event, the company announced Splunk AI, a set of AI-driven technologies targeted at strengthening its unified security and observability platform. This new advancement blends automation with human-in-the-loop experiences to enable organisations to improve their detection, investigation,…

ChatGPT’s Reputability is Under Investigation by the FTC

The Federal Trade Commission (FTC) has recently launched an investigation into ChatGPT, the popular language model developed by OpenAI. This move comes as a stark reminder of the growing concerns surrounding the potential pitfalls of artificial intelligence (AI) and the…

Growing Demand for Healthcare Cybersecurity Specialists

The healthcare sector is increasingly depending on technology to better patient care and increase operational efficiency in today’s quickly evolving digital environment. Cybersecurity dangers are a major worry that comes with this digital transition. The demand for qualified cybersecurity specialists…

The Met Police passed victims’ data to Facebook

  Using its website to report crimes, such as sexual offences, domestic violence, and other crimes, the most powerful police force in the country gathered sensitive details about the people using the site. Observer reports that Facebook shared users’ data…

5 AI Tools That may Save Your Team’s Working Hours

In today’s world of ‘everything digital,’ integrating Artificial Intelligence tools in a business is not just a mere trend, but a necessity. AI is altering how we work and interact with technology in the rapidly transforming digital world. AI-powered solutions…

Cybersecurity: Are Viruses Still a Threat?

  Viruses were considered the biggest cybersecurity concern in the world, but is that still the case? How prevalent were viruses in the past, and are they still as deadly today?  Understanding the modern computer viruses Viruses are no longer…

Gay Furry Hackers: Digital Activism Against Anti-Trans Laws

A group of expert hackers known as ‘SiegedSec’ has surfaced in recent months, and they are targeting American state governments that have passed anti-trans legislation. These hackers are members of the furry community, a subculture of people who enjoy anthropomorphic…

Understanding the Drawbacks of Blockchain Smart Contracts

  Blockchain technology has grabbed the attention of companies across the globe. Due to its benefits, such as immutability and transparency, traditional companies outside of banking, like BMW and Bosch, have begun to experiment with smart contracts to produce more…

SolarWinds Hackers Dangle BMWs to Eavesdrop on Diplomats

  The Russia-backed group responsible for the SolarWinds attack, known as Cloaked Ursa or Nobelium/APT29, has shifted its tactics and is now targeting foreign diplomats working at embassies in Ukraine. Instead of using traditional political lures, the group is employing…

Custom Data: A Key to Mitigating AI Risks

Businesses are continuously looking for ways to maximize the advantages while limiting the potential hazards in the quickly developing field of artificial intelligence (AI). One strategy that is gaining traction is using unique data to train AI models, which enables…

Sharp Increase in Malware Attacks via USB Flash Drives

  Instances of cybercriminals employing USB drives for malware attacks have seen a significant rise. According to security researchers from Mandiant, there has been a three-fold increase in malware attacks via USB drives aimed at stealing sensitive information during the…

Unveiling Entrepreneurs’ Hesitations with ChatGPT

ChatGPT has become a significant instrument in the field of cutting-edge technology, utilizing the ability of artificial intelligence to offer conversational experiences. Nevertheless, many business owners are still reluctant to completely adopt this creative solution despite its impressive possibilities. Let’s…

Ransomware Resurgence: A Renewed Wave of Cyber Threats

  Harvard Business Review reports claim that cyberattacks have increased dramatically since the overnight shift from remote to office work in 2020. In 2020, all types of cyberattacks have increased over the previous year, but ransomware is by far the…

ScarletEel Hackers Breach AWS Cloud Infrastructure

  Researchers have discovered that a financially motivated threat actor called ScarletEel has been infiltrating Amazon Web Services (AWS) for various malicious activities. These activities include stealing credentials and intellectual property, deploying crypto mining software, and carrying out distributed denial-of-service…

Ransomware Gangs Exposing Private Files of Students Online

Ransomware groups have lately been dumping private documents acquired from schools online. The stolen content included happens to be raw, intimate and graphic. The confidential ‘data’ leaked online involve content as explicit as describing student sexual assaults, psychiatric hospitalizations, abusive…

Twitter Becomes the Epicentre of FTM Fraud

  Online settings, such as Twitter, are becoming increasingly perilous, rife with fraudulent schemes aimed at naïve victims. Social media giant has recently been the epicentre of deception, with fraudsters deploying innovative ways to abuse its massive user base. One…

This Threat Actor Targeted NATO Summit Attendees

  A Russia-linked threat actor known as RomCom has been targeting entities supporting Ukraine, including guests at the 2023 NATO Summit. The summit is taking place in Vilnius, Lithuania, and will discuss the war in Ukraine and new memberships in…

Critical TootRoot Bug Hijack Mastodon Servers

  Mastodon, the decentralized social networking platform that emphasizes freedom and open-source principles, has recently addressed several vulnerabilities, including a critical one with potentially severe consequences. This particular vulnerability enabled hackers to exploit specially designed media files, allowing them to…