An investigation by BBC Newsnight on July 27, 2023, revealed that Google’s earthquake warning system failed to reach many residents in southern Turkey before the devastating double earthquake disaster that occurred in February, claiming tens of thousands of lives.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Here’s How to Safeguard Your Credit Card Info
Sure, you recognise a phishing email (even if your parents don’t). Unfortunately, thieves are constantly coming up with new ways to get unauthorised access to credit card information, leaving you with financial losses and emotional distress. While hackers demonstrate…
Tech Meets Healthcare: GoodRx’s Rewarding ‘Medicine Cabinet’ Promotes Medication Adherence
To help people keep track of the medications they are taking, GoodRx is launching a digital medicine cabinet. As stated earlier, this app has been developed to increase medication adherence, or how well you comply with your doctor’s orders…
Police Van Equipped with AI Can Detect if Drivers are Using Mobile Phones
Law enforcement officers in Hampshire and the Isle of Wight, in collaboration with the Thames Valley Police recently conducted an operation in order to observe commercial vehicles. The said operation was conducted from July 17 to 21 on the A34…
Hackers Infect Call of Duty Players with Self-Spreading Malware
Hackers have recently been discovered abusing Call of Duty players with a self-propagating software attack, raising serious concerns among the gaming community. This malicious activity, which security researchers have uncovered, has aroused concerns since it may compromise user data and…
ChatGPT’s Plug-In Vulnerabilities
ChatGPT, the revolutionary language model developed by OpenAI, has been making waves in the tech world for its impressive capabilities in natural language understanding. However, recent developments have highlighted a significant concern – ChatGPT’s plug-in problem, which poses potential…
FraudGPT: ChatGPT’s Evil Face
Threat actors are promoting the FraudGPT artificial intelligence (AI) tool, which follows in the footsteps of WormGPT, on a number of Telegram channels and dark web marketplaces. This is an AI bot, solely designed for malicious purposes, such as…
Out of 50,000 Cybercrimes Reported in 6 Years, Only 23% Successfully Solved
Over the span of nearly six and a half years, a significant number of cybercrime cases, totaling 50,027, were reported in the city up until May 31 of this year. However, the resolution rate for these cases is rather…
The Unyielding AI Challenge: Safeguarding Organizations in the Digital Era
As ChatGPT and other generative artificial intelligence tools continue to rise, defining workplace productivity has become more difficult. For a productive workplace to be achieved, however, there must be a consideration of how artificial intelligence (AI), machine learning (ML),…
CERT-In Warns Against Mallox Ransomware Targeting Unsecured MS SQL Servers
Indian government’s nodal agency, CERT-In has issued warning about the Mallox ransomware that is exploiting MS-SQL servers through dictionary attacks. By using dictionary attack method, the ransomware acquire unauthorized access to victims’ networks, finally succeeding in server compromise and data…
‘Verified human’: Worldcoin Users Crowd for Iris Scans
The Worldcoin project, founded by Sam Altman, CEO of OpenAI (the developer of ChatGPT), is offering people around the world the opportunity to get a digital ID and free cryptocurrency in exchange for getting their eyeballs scanned. Despite concerns…
Challenge Arising From the ChatGPT Plugin
OpenAI’s ChatGPT has achieved important advancements in AI language models and provides users with a flexible and effective tool for producing human-like writing. But recent events have highlighted a crucial problem: the appearance of third-party plugins. While these plugins promise…
Zenbleed: Security Flaw Steals Data from AMD Zen 2 CPUs
After initially disclosing the flaw to AMD on May 15, Google security researcher Tavis Ormandy published an overview of it on his blog. Because of the Zenbleed vulnerability, AMD’s entire Zen 2 product line is said to be affected. The…
Corporate Data Heist: Infostealer Malware Swipes 400,000 Credentials in a Record Breach
Recent research has revealed that corporate credentials are being stolen alarmingly. The study revealed that over 400,000 corporate credentials were stolen by malware specialized in data theft. Approximately 20 million malware logs were examined in the study. The study…
Employees are Feeding Sensitive Data to ChatGPT, Prompting Security Concerns
Despite the apparent risk of leaks or breaches, according to the latest study from Netskope, employees are still sharing private company information with chatbots like ChatGPT and AI writers. The study, which examines 1.7 million users across 70 international…
Singapore Explores Generative AI Use Cases Through Sandbox Options
Two sandboxes have been introduced in Singapore to facilitate the development and testing of generative artificial intelligence (AI) applications for government agencies and businesses. These sandboxes will be powered by Google Cloud’s generative AI toolsets, including the Vertex AI…
Stolen Session Cookies Turns Into the Next Cyber Threat
According to the recent Identity Exposure Report by SpyCloud, 87,000 credentials linked to Fortune 1000 C-level executives were recovered from the criminal underworld, in year 2022. Security leaders across organizations continue to live in constant terror of becoming a victim…
Exposed Secrets: Backdoor Vulnerabilities in Worldwide Radio Systems
The world has been secretive for over 25 years about a technology used for critical data and voice radio communication around the globe. No one could closely examine its security properties to detect vulnerabilities. A small group of researchers…
Notorious Lazarus Hacking Outfit Linked to a $60 Million Alphapo Crypto Theft
The latest attack on payment processing site Alphapo, in which the attackers stole over $60 million in cryptocurrency, is attributed by blockchain researchers to the North Korean Lazarus hacker gang. The hack on Sunday, July 23rd, targeted Alphapo, a…
Lazarus Hackers Target Microsoft IIS Servers to Propagate Malware
The infamous Lazarus hacker collective has reappeared in a recent wave of cyberattacks, using a cunning plan to spread malware through infected Microsoft Internet Information Services (IIS) servers. Cybersecurity professionals are actively watching the situation to reduce any hazards as…
BlackCat Attackers Target Italian Asset Manager Azimut
Azimut Group, an Italian asset management firm that oversees over $87.2 billion in assets, declared in a public statement that it will “not comply by any means” with a ransomware demand from the notorious hacking organisation BlackCat. Israeli hacking…
Google Cloud’s Security Strategy: Emphasizing ‘Secure by Design’ and ‘Secure by Default’
As artificial intelligence takes center stage, organizations are grappling with new considerations regarding the appropriate security measures and their evolution. For Google LLC and Google Cloud, ensuring security across the organization involves a combination of central teams providing consistent…
Travel HACK: Why you Should not Share Photos of Your Boarding Pass Online
You are done packing the bags, you put on your airport look and now you are all set to board the flight to your dream vacation. You might as well want to post a picture of the trip, or share…
Security Breach: Clearweb Sites Attacked by MOVEit, Data Exposed
A cybercrime syndicate used by the Clop ransomware gang is substantially more prevalent than any other cybercrime syndicate in exploiting the MOVEit vulnerability than any other. As an additional complication, the ransomware gang’s data stolen through the MOVEit vulnerability…
Rise of Bossware: Balancing Workplace Surveillance and Employee Privacy
The emergence of ‘Bossware’ or staff surveillance software in recent years has been a troubling trend in offices all around the world. Bossware refers to a collection of devices and software that give employers the ability to track, keep…
Stay Vigilant: Google Docs Phishing Scams Spreading Rapidly
Phishing scam sophistication is increasing every day, making them more difficult to detect and avoid at the same time. A wide variety of file-sync and share platforms are now available for users, making scammers impute these services and try…
Human Error: A Helping Hand for Cyber Criminals
The use of passwords, a fundamentally faulty strategy that was developed many years ago, has been the primary method for securing an organisation’s internal systems and its customers’ accounts for far too long. Despite efforts to provide better, more…
Yoga Trainer Defrauded of Rs.94,998 in a Paytm Fraud
In a shocking incident of cyber fraud in Lucknow, India, a yoga trainer lost Rs. 94,998 from her bank account within five transactions that she made online. The victim claims to have been approached by the fraudsters impersonating a BSF…
Critical Vulnerabilities in AMI MegaRAC BMC Software
Eclypsium, a cybersecurity company, recently discovered two serious flaws in the AMI MegaRAC Baseboard Management Controller (BMC) software, raising questions about the security of millions of servers throughout the world. If these weaknesses are used against the affected systems, serious…
Canadian Cybersecurity Head Warns of Surging AI-Powered Hacking and Disinformation
Sami Khoury, the Head of the Canadian Centre for Cyber Security, has issued a warning about the alarming use of Artificial Intelligence (AI) by hackers and propagandists. According to Khoury, AI is now being utilized to create malicious software,…
Beyond Security: The Comprehensive Approach to Tackling Cyberattacks
In today’s digital landscape, organizations are increasingly facing the harrowing consequences of cyberattacks, particularly ransomware incidents. In these malicious schemes, hackers encrypt vital data, rendering it inaccessible, and then demand exorbitant payments for its restoration. Unfortunately, such attacks are…
Movie Scam: Fraudsters Take Advantage of the Popularity of Barbie and Oppenheimer
The films Barbie and Oppenheimer quickly rose to the top of the list of the year’s most anticipated films. Unfortunately, scammers seized the opportunity to use Barbie and Oppenheimer’s enormous popularity for their own nefarious purposes right away, as…
Storm-0558 Breach: Microsoft Breach Risks Millions of Azure AD Apps
Storm-0558 breach, that enabled the China-based advanced persistent threat (APT) group to access emails of at least 25 US agencies seems to be more notorious than anticipated, since the breach may put significant risk on Microsoft cloud services than one…
Warcraft Fans Trick AI with Glorbo Hoax
Ambitious Warcraft fans have persuaded an AI article bot into writing about the mythical character Glorbo in an amusing and ingenious turn of events. The incident, which happened on Reddit, demonstrates the creativity of the game industry as well as…
GitHub Issues Alert on Lazarus Group’s Social Engineering Attack on Developers
According to a security alert issued by GitHub, this social engineering campaign is designed to compromise developers’ accounts in the blockchain, cryptocurrency, online gambling, and cybersecurity industries. This is done through social engineering techniques. The campaign was reportedly linked…
Web Development Revolution: Chrome’s Cookie-Free Tools
It has become increasingly common for browsers to use third-party cookies as part of their browsing process, which makes it possible for advertisers and bad actors to spy on large chunks of your browsing history to provide more relevant…
North Korea-Backed Hackers Breach US Tech Company to Target Crypto Firms
A North Korean state-sponsored hacking group has recently breached a US IT management company, in a bid to further target several cryptocurrency companies, cybersecurity experts confirmed on Thursday. The software company – JumpCloud – based in Louisville, Colorado reported its…
Nigel Farage Controversy Results in Hundreds of NatWest Private Data Requests
Numerous requests for copies of personal data have been made to NatWest Bank under the provisions of data protection regulations. It unfolded after an argument between the group and Nigel Farage, a pro-Brexit advocate. According to the former UKIP…
Microsoft Offers Free Security Features Amid Recent Hacks
Microsoft has taken a big step to strengthen the security of its products in response to the growing cybersecurity threats and a number of recent high-profile attacks. The business has declared that it will offer all users essential security features…
As More MOVEit Hack Victims Emerge, Ofcom Declares Non-Payment of Ransom
As the mass-hacking incidents continue to affect users of the widely used file-transfer application MOVEit Transfer, an increasing number of victims are emerging, with nearly 400 organizations now known to be impacted. In a recent statement, Estée Lauder, a…
Ransomware Outbreak in Canada: Cybersecurity Meltdown
Canadians and Canadian organizations are increasingly falling victim to ransomware attacks. There was an emphasis placed on the urgency of addressing the cyber security issue by Sami Khoury, the president of the Canadian Centre for Cyber Security. The President…
Estée Lauder: Cosmetic Brand Amongst the new Victims of Ransomware Attack
On Tuesday, U.S.-based cosmetic brand Estée Lauder Cos. Inc. confirmed to have witnessed a ransomware attack, following which it compromised some of its data and took down some of its systems. Apparently, ransomware gangs ALPHV/BlackCat claim to have executed the…
AI Will Result in Greater Game Development and Job Growth
Artificial intelligence will increase employment in the video game business, one of the bodies representing games developers stated. The head of TIGA, Dr. Richard Wilson, claims that AI will “reduce the cost of making games and speed up the…
Inside the World of Ransomware Negotiations: From Colonial Pipeline to JBS
In January 2021, JBS, the world’s largest meat-processing company, revealed that it paid a ransom of $11 million in Bitcoin to cyber attackers. Similarly, in May of the same year, Colonial Pipeline, the largest refined-products pipeline in the U.S.,…
Cybercriminals Masquerade as Cybersecurity Company to Hijack Entire PCs
In the latest cyber threat, hackers have devised a new approach to deceive unsuspecting victims, even using reputable names as a cover. A ransom-as-a-service (RaaS) attack called “SophosEncrypt” has emerged, masquerading as the cybersecurity vendor Sophos. The operation of…
Ransomware Trends: RaaS and Cryptocurrency Impacts
Ransomware attacks have become a pressing concern for individuals, businesses, and governments worldwide. Cybercriminals are constantly evolving their tactics, and two significant trends that demand close monitoring are the rise of Ransomware-as-a-Service (RaaS) and the growing reliance on cryptocurrencies for…
Top Cyber Official Says AI Needs Better Security
Artificial intelligence (AI) is used by hackers and propagandists to develop malicious software, draft convincing phishing emails to infect computers, and spread false information via the web, according to Canada’s top cybersecurity official, who spoke to Reuters on Thursday.…
Security Professionals Propose Guidelines for AI Development in an Open Letter
A new voluntary framework for designing artificial intelligence products ethically has been revealed by a global consortium of AI experts and data scientists. There are 25,000 members of the World Ethical Data Foundation, including employees of several digital behemoths…
Growing Surveillance Threat for Abortions and Gender-Affirming Care
Experts have expressed alarm about a worrying trend in the surveillance of people seeking abortions and gender-affirming medical care in a recent paper that has received a lot of attention. The research, released by eminent healthcare groups and publicized by…
Cyber Trust Mark: U.S. Administration Introduces Program to Boost Home Security
This Tuesday, Joe Biden’s government announced a ‘U.S. Cyber Trust Mark’ program that will focus on cybersecurity certification and product labels of smart home tech, as a step to help consumers choose products that provide better protection against cyber activities.…
With More Jobs Turning Automated, Protecting Jobs Turn Challenging
With the rapid trend of artificial intelligence being incorporated in almost all the jobs, protecting jobs in Britain now seems like a challenge, as analyzed by the new head of the state-authorized AI taskforce. According to Ian Hogarth, a tech…
Enhancing Security and Observability with Splunk AI
During Splunk’s .conf23 event, the company announced Splunk AI, a set of AI-driven technologies targeted at strengthening its unified security and observability platform. This new advancement blends automation with human-in-the-loop experiences to enable organisations to improve their detection, investigation,…
ChatGPT’s Reputability is Under Investigation by the FTC
The Federal Trade Commission (FTC) has recently launched an investigation into ChatGPT, the popular language model developed by OpenAI. This move comes as a stark reminder of the growing concerns surrounding the potential pitfalls of artificial intelligence (AI) and the…
Evil Unleashed: Meet WormGPT Chat’s Wicked Twin
Over 100 million users have signed up for ChatGPT since it launched last year, making it one of the top ten most popular apps in the world. Artificial intelligence has taken the world by storm in recent years with…
Sophisticated Cloud Credential Theft Campaign Targets AWS, Expands to Azure and Google Cloud
A cybercriminal group behind a sophisticated cloud-credential stealing and cryptomining campaign has recently expanded its targets beyond Amazon Web Services (AWS) to include Microsoft Azure and Google Cloud Platform (GCP). Researchers from SentinelOne and Permiso have been tracking the…
macOS Sonoma’s Latest Update Brings Significant Enhancements to Apple’s Password Manager
Password manager applications like 1Password and Proton Pass play a crucial role when setting up a new device. These apps securely store login credentials, credit card information, and notes, with an emphasis on login data security. Not all password managers…
Growing Demand for Healthcare Cybersecurity Specialists
The healthcare sector is increasingly depending on technology to better patient care and increase operational efficiency in today’s quickly evolving digital environment. Cybersecurity dangers are a major worry that comes with this digital transition. The demand for qualified cybersecurity specialists…
Typo Delivers Millions of US Military Emails to Russia’s Ally Mali
Due to a small typing error, millions of emails from the US military were unintentionally forwarded to Mali, a Russian ally. For years, emails meant for the US military’s “.mil” domain have been transmitted to the west African nation…
The Met Police passed victims’ data to Facebook
Using its website to report crimes, such as sexual offences, domestic violence, and other crimes, the most powerful police force in the country gathered sensitive details about the people using the site. Observer reports that Facebook shared users’ data…
AI-Based Deepfake Fraud: Police Retrieves Money Worth ₹40,000 Defrauded From Kozhikode Victim
Kozhikode, India: In a ‘deepfake’ incident, a man from Kozhikode, Kerala lost ₹40,000 after he fell prey to an AI-based scam. According to police officials, the victim, identified as Radhakrishnan received a video call on WhatsApp from an unknown number.…
5 AI Tools That may Save Your Team’s Working Hours
In today’s world of ‘everything digital,’ integrating Artificial Intelligence tools in a business is not just a mere trend, but a necessity. AI is altering how we work and interact with technology in the rapidly transforming digital world. AI-powered solutions…
Cybersecurity: Are Viruses Still a Threat?
Viruses were considered the biggest cybersecurity concern in the world, but is that still the case? How prevalent were viruses in the past, and are they still as deadly today? Understanding the modern computer viruses Viruses are no longer…
A Few Cybercriminals Account for All Email Extortion Attacks, New Research Reveals
New research conducted by Barracuda Networks, in collaboration with Columbia University, has revealed that a surprisingly small group of cybercriminals is responsible for the majority of email extortion attempts worldwide. The study examined over 300,000 flagged emails, identified as…
Urgent Action Required: Delete Apps with Privacy Breach Potential
Whenever your phone is running low on storage, it’s always an excellent idea to remove apps that could be taking up a lot of space – especially if you think they could spy on you. For some apps, however,…
Gay Furry Hackers: Digital Activism Against Anti-Trans Laws
A group of expert hackers known as ‘SiegedSec’ has surfaced in recent months, and they are targeting American state governments that have passed anti-trans legislation. These hackers are members of the furry community, a subculture of people who enjoy anthropomorphic…
Understanding the Drawbacks of Blockchain Smart Contracts
Blockchain technology has grabbed the attention of companies across the globe. Due to its benefits, such as immutability and transparency, traditional companies outside of banking, like BMW and Bosch, have begun to experiment with smart contracts to produce more…
Forget ChatGPT, Google Bard may Possess Some Serious Security Flaws
A latest research claims that Google’s AI chatbot, Google Bard may let its users to use it for creating phishing emails and other malicious content, unlike ChatGPT. At one such instances, cybersecurity researchers Check Point were able to produce phishing…
Privacy Breach Shockwaves: Colorado State University Students and Staff Impacted by Data Breach
According to CBS News, a Colorado university is at risk of exposing 30,000 current and former students’ data to hackers. As reported by the University of Colorado Boulder, the incident is the result of a cyber-attack perpetrated against a…
Understanding Internet Identity: Exploring its Functionality and Operation
Passwords have long been a hassle for daily online logins, even with the help of password managers. However, the DFINITY Foundation’s Web3 experts are developing a promising alternative called Internet Identity (II), which has the potential to transform online…
SolarWinds Hackers Dangle BMWs to Eavesdrop on Diplomats
The Russia-backed group responsible for the SolarWinds attack, known as Cloaked Ursa or Nobelium/APT29, has shifted its tactics and is now targeting foreign diplomats working at embassies in Ukraine. Instead of using traditional political lures, the group is employing…
Fear Grip Users as Popular Diabetes App Faces Technical Breakdown
A widely used diabetes management software recently experienced a serious technical failure, stunning the users and leaving them feeling angry and scared. The software, which is essential for assisting people with diabetes to monitor and manage their blood sugar levels,…
Hollywood vs. AI: Strike Highlights the Emerging Use of Cutting-Edge Technology
The prospects of generative artificial intelligence in Hollywood — and the way it can be used as an alternative labour — has become a critical holding point for actors on strike. In a news conference earlier this week, Screen…
Custom Data: A Key to Mitigating AI Risks
Businesses are continuously looking for ways to maximize the advantages while limiting the potential hazards in the quickly developing field of artificial intelligence (AI). One strategy that is gaining traction is using unique data to train AI models, which enables…
Killnet Attempts to Build Clout Among Russian Hackers With Media Stunts
As a result of Killnet and Killmilk’s leadership over the past several months, ragtag hacker groups from Russia have been consolidated under their leadership. This has formed one group called Killnet. Even though Killnet has made a concerted effort…
Microsoft Confirms Zero Day Exploits, Prompts Users to Update
This week Microsoft confirmed around 132 security vulnerabilities in its product lines, including a total of six zero-day flaws that are currently being actively exploited. Because of this, security professionals advise Windows users to upgrade right away. One of these…
AI Malware vs. AI Defences: WormGPT Cybercrime Tool Predicts a New Era
Business email compromise (BEC) attacks are being launched by cybercriminals with the assistance of generative AI technology, and one such tool used is WormGPT, a black-hat alternative to GPT models that has been designed for malicious goals. SlashNext said…
Sharp Increase in Malware Attacks via USB Flash Drives
Instances of cybercriminals employing USB drives for malware attacks have seen a significant rise. According to security researchers from Mandiant, there has been a three-fold increase in malware attacks via USB drives aimed at stealing sensitive information during the…
Unveiling Entrepreneurs’ Hesitations with ChatGPT
ChatGPT has become a significant instrument in the field of cutting-edge technology, utilizing the ability of artificial intelligence to offer conversational experiences. Nevertheless, many business owners are still reluctant to completely adopt this creative solution despite its impressive possibilities. Let’s…
Ransomware Resurgence: A Renewed Wave of Cyber Threats
Harvard Business Review reports claim that cyberattacks have increased dramatically since the overnight shift from remote to office work in 2020. In 2020, all types of cyberattacks have increased over the previous year, but ransomware is by far the…
Former Amazon Security Engineer Charged of Defrauding a Crypto Exchange
A prominent cybersecurity pro for Amazon is apparently facing a problem. The U.S. Department of Justice has detained security engineer, Shakeeb Ahmed, with charges of defrauding and money laundering from an unnamed decentralized cryptocurrency exchange, both charged carrying a maximum…
Clop Attacks: More Organizations Confirm to have Fallen Prey to MOVEit Mass-hack
As the ongoing MOVEit hack is getting exposed, their seems to be some new names that have fallen prey to the attack. These organizations involve hotel chain Radisson, U.S. based 1st Source Bank, real estate giant Jones Lang LaSalle and…
BlackRock’s Bitcoin ETF Reveals the Future of Cryptocurrency Surveillance
Surveillance is about to reach a new level as Blackrock awaits the SEC’s confirmation regarding its Bitcoin ETF launch. An ETF tied to Bitcoin was filed on June 15 by the world’s largest asset manager, reportedly the world’s largest…
Zscaler, Palo Alto Under Pressure from Microsoft’s Rapidly Increasing Cybersecurity Offerings
Microsoft (MSFT) continues to put pressure on cybersecurity stocks with new products aimed at Zscaler (ZS), Palo Alto Networks (PANW), Cloudflare (NET), CrowdStrike Holdings (CRWD), and others. MSFT stock has kept on shining this year, with a 39% increase,…
Major Companies Restrict Employee Use of ChatGPT: Amazon, Apple, and More
Several major companies, including Amazon and Apple, have recently implemented restrictions on the use of ChatGPT, an advanced language model developed by OpenAI. These restrictions aim to address potential concerns surrounding data privacy, security, and the potential misuse of the…
Massive Data Breach at HCA Healthcare: 11 Million Patients’ Information Compromised by Hackers
Hospital and clinic operator HCA Healthcare has announced that it experienced a significant cyberattack, posing a risk to the data of at least 11 million patients. The breach affects patients in 20 states, including California, Florida, Georgia, and Texas.…
ScarletEel Hackers Breach AWS Cloud Infrastructure
Researchers have discovered that a financially motivated threat actor called ScarletEel has been infiltrating Amazon Web Services (AWS) for various malicious activities. These activities include stealing credentials and intellectual property, deploying crypto mining software, and carrying out distributed denial-of-service…
Genesis Market: Formerly a Popular Dark Web Marketplace Now up for Sale
If one wishes to own a defunct darknet business, they could try reaching out to the backers of Genesis Market, the formerly high-and-mighty seller of stolen data. Today, they appear to be desperate to sell their formerly valued asset for…
Private Data of 12,000 SBI Employees Exposed on Telegram Channels
Over 12,000 employees of the State Bank of India (SBI) had their personal information compromised in a significant data breach, which was later published on Telegram channels. Employees’ names, residences, contact information, PAN numbers, and personal data from their…
Meta Responds to User Complaints by Introducing Feeds for Threads
Meta, the parent company of social media giant Facebook, has recently revealed its plans to introduce feeds for Threads, a messaging app designed for close friends. This move comes in response to user complaints about the lack of a central…
Ransomware Gangs Exposing Private Files of Students Online
Ransomware groups have lately been dumping private documents acquired from schools online. The stolen content included happens to be raw, intimate and graphic. The confidential ‘data’ leaked online involve content as explicit as describing student sexual assaults, psychiatric hospitalizations, abusive…
Twitter Becomes the Epicentre of FTM Fraud
Online settings, such as Twitter, are becoming increasingly perilous, rife with fraudulent schemes aimed at naïve victims. Social media giant has recently been the epicentre of deception, with fraudsters deploying innovative ways to abuse its massive user base. One…
Critical Ransomware Threat: Disguised as Windows Update, Beware!
Ransomware is a form of malware that allows hackers to encrypt non-transferable files on a computer so that they cannot be released. Cyberattackers encrypt the files that they want to access and then demand a ransom payment for the…
Hackers Steal 25 Crore From Thane Company’s Escrow Account
Hackers took 25 crores from a Thane-based company’s escrow bank account during a significant cyberattack. The construction company had placed the funds in the escrow account as a condition of a contract with another business. The money was transferred to…
This Threat Actor Targeted NATO Summit Attendees
A Russia-linked threat actor known as RomCom has been targeting entities supporting Ukraine, including guests at the 2023 NATO Summit. The summit is taking place in Vilnius, Lithuania, and will discuss the war in Ukraine and new memberships in…
Over $30 Billion Stolen from Crypto Sector, Reveals SlowMist’s
A recent report by cybersecurity firm SlowMist has uncovered a shocking revelation regarding the vulnerability of the crypto sector. According to the report, blockchain hacks have resulted in the theft of over $30 billion from the cryptocurrency industry since 2012.…
India’s Finance Ministry Tell State-run Banks to Adopt Emerging Technologies to Increase Operational Efficiency
The Indian finance ministry has ordered state-run banks to collaborate and take use of emerging technology to improve operational effectiveness and customer experience. In a meeting, headed by Finance Minister Nirmala Sitharaman to assess the activities and performance of public…
SCARLETEEL Hackers Target AWS Fargate in Latest Cryptojacking Campaign
An continuing sophisticated attack effort known as SCARLETEEL continues to target cloud settings, with threat actors currently focusing on Amazon Web Services (AWS) Fargate. According to a new report from Sysdig security researcher Alessandro Brucato, “Cloud environments are still…
Users’ Data is Stolen Through 1.5 million Android Apps
As part of an effort to help users gain a better understanding of what data an app collects before downloading it, Google Play introduced “nutrition labels” with a privacy-focused focus last year. However, researchers have found a way to work…
Cybercrime to Cost Global Economy $10.5 trillion By 2025
A report from Cybersecurity Ventures estimates that by 2025, cybercrime will have cost the global economy up to $10.5 trillion. According to a recent Gartner survey, by then, more than half of all cybersecurity assaults will be attributable to…
Critical TootRoot Bug Hijack Mastodon Servers
Mastodon, the decentralized social networking platform that emphasizes freedom and open-source principles, has recently addressed several vulnerabilities, including a critical one with potentially severe consequences. This particular vulnerability enabled hackers to exploit specially designed media files, allowing them to…