Tag: CySecurity News – Latest Information Security and Hacking Incidents

100K+ ChatGPT Login Credentials Leaked to the Dark Web

A Singaporean cybersecurity company discovered that over the last few year, login credentials of more than 100,000 online users using chatbot like ChatGPT has been leaked and traded in the Dark Web. According to the security researchers, infostealers illicitly acquire…

Critical WordPress Plugin Vulnerabilities

  WordPress, the popular content management system (CMS), is no stranger to security vulnerabilities. In recent news, critical vulnerabilities have been discovered in certain WordPress plugins, putting thousands of websites at risk. These vulnerabilities have the potential to allow unauthorized…

EU Now Wants Smartphones to Feature Replaceable Batteries

  In a noteworthy development, the European Union (EU) is making strides to reintroduce a long-lost and highly sought-after element that has gradually vanished from the smartphone market. An upcoming regulation is currently being advocated, aiming to reinstate user-replaceable batteries…

Government Agencies are Compromised by Russian Ransomware

  Several federal agencies, including the Department of Energy and several others, have been hacked by a Russian cyber-extortion gang. However, Homeland Security officials warned Thursday that the impact would not be very significant. The hack of a popular file-transfer…

Understanding Blockchain: The Network of Networks

  Blockchain, a revolutionary technology that has gained significant attention globally, operates as a decentralized digital ledger spread across multiple nodes. It enables the recording, storage, and verification of transactions among various parties through this ledger. The unique characteristics of…

Beware of Fake ChatGPT Apps: Android Users at Risk

In recent times, the Google Play Store has become a breeding ground for fraudulent applications that pose a significant risk to Android users. One alarming trend that has come to light involves the proliferation of fake ChatGPT apps. These malicious…

LockBit Digital Gang Named Top Ransomware Threat by World Nations

On Wednesday, a group of seven countries, including the United States, Canada, Britain, France, Germany, Australia, and New Zealand, collectively identified the primary ransomware threat worldwide as the criminal organization known as “LockBit.” This digital extortion gang operates under the…

5 Tips to Protect Yourself from Deepfake Crimes

The rise of deepfake technology has ushered in a new era of concern and vulnerability for individuals and organizations alike. Recently, the Federal Bureau of Investigation (FBI) issued a warning regarding the increasing threat of deepfake crimes, urging people to…

Using AI for Loans and Mortgages is Big Risk, Warns EU Boss

  The mortgage lending sector is experiencing a significant revolution driven by advanced technologies like artificial intelligence (AI) and machine learning. These cutting-edge technologies hold immense potential to revolutionize the lending process.  However, alongside the benefits, there are also valid…

Oracle and Cohere Collaborate for New Gen AI Service

  During Oracle’s recent earnings call, company founder Larry Ellison made an exciting announcement, confirming the launch of a new generation AI service in collaboration with Cohere. This partnership aims to deliver powerful generative AI services for businesses, opening up…

Vietnamese Public Companies Targeted by SPECTRALVIPER Backdoor

  Vietnamese public companies are facing an ongoing targeted campaign involving the SPECTRALVIPER backdoor. This backdoor, previously undisclosed and in the x64 variant, offers a range of capabilities such as manipulating files, impersonating tokens, and loading PE files. Elastic Security…

AEI Reports: Threat Actors are Targeting High-profile Companies

According to an American Enterprise Institute (AEI) study, threat actors have been targeting high profile companies, that are exceptionally profitable, hold high value and have generous spending on advertisings, since year 1999. FBI confirmed that the potential losses from cybercrime…

Extreme Networks Hit by Clop MOVEit Attack

  Extreme Networks has revealed that it has fallen victim to the rapidly evolving MOVEit cyber attack. As a consequence, customers who rely on the network hardware and services provided by Extreme Networks may face the potential threat of having…

IoT: Why is this Attacker’s Favorite Target?

  Internet of Things (IOT) devices are increasingly emerging as the preferred targets of attackers due to their lack of built-in security and persistent default password usage. It should come as no surprise that hackers choose to target IoT devices…

How to Prevent Phishing Attacks

  Phishing is the most common and dangerous type of online threat. It involves hackers pretending to be trustworthy companies to trick people into sharing their account information or downloading harmful files. That’s why it’s crucial to learn how to…

A Hacking Group Spotted Combining Cybercrime and Cyberespionage

  A suspected Belarusian hacking group has targeted Ukraine; ‘Unusual’ crime cross-over. According to security researchers, a hacker gang aligned with Belarusian government interests appears to be combining cybercrime with cyberespionage. The group, known as Asylum Ambuscade, since 2020 has…

Aberdeen AI Trial helps Doctors Spot Breast Cancers

  A trial is happening at Aberdeen Royal Infirmary to test if artificial intelligence (AI) can help radiologists review many mammograms each year. In the trial, AI helped detect early-stage breast cancer in June, who is a healthcare assistant and…

Increasing Threat of Generative AI Technology

Think of a drastic surge in advanced persistent threats (APTs), malware attacks, and organizational data breaches. An investigation on the case scenario revealed that these attacks are actually developed by threat actors who have access to generative AI. However, it…

Online Thieves Exploits Vulnerability in Microsoft Visual Studio

  Security professionals are alerting users regarding a vulnerability in the Microsoft Visual Studio installer that enables hackers to distribute harmful extensions to application developers while posing as a trusted software vendor. From there, they may sneak into development environments…

PoC Published for Windows Win32k Flaw Exploited in Assaults

  For a Windows local privilege escalation vulnerability that was patched as part of the May 2023 Patch Tuesday, researchers have published a proof-of-concept (PoC) exploit.  The Win32k subsystem (Win32k.sys kernel driver) controls the operating system’s window manager and handles…

Atomic Wallet Hit by North Korean Hackers

  According to a recent blog post by Elliptic, a blockchain intelligence firm, users of Atomic Wallet may have been targeted by Lazarus, the notorious hacking group from North Korea. The post highlights that Atomic Wallet users could have potentially…

Outlook Services Paralyzed: Anonymous Sudan’s DDoS Onslaught

  In the last few days, several distributed denial-of-service (DDoS) attacks have been launched against Microsoft Outlook, one of the world’s leading email providers. Anonymous Sudan, a hackers’ collective, has launched DDoS attacks against Microsoft Outlook. The attacks, which aim…

Exploring Zero-Knowledge Proofs: A Powerful Tool for Cybersecurity

In today’s digital age, preserving privacy and security while verifying information is an ongoing challenge. Fortunately, zero-knowledge proofs (ZKPs) have emerged as a promising solution.  ZKPs enable the verification of sensitive information without revealing any underlying data, ensuring a higher…

Over 60K Adware Apps Target Android Devices

Over 60,000 adware apps disguised as cracked versions of popular apps have been discovered, posing a significant threat to Android device users. These malicious apps have been circulating for the past six months, secretly installing adware and compromising user privacy.…

Privacy and Security Features Revealed by Apple

  During this year’s WWDC, Apple announced its latest privacy and security innovations. This reaffirms the company’s commitment to respecting individual privacy as one of mankind’s foundational rights. As part of these updates, Safari Private Browsing has been significantly improved.…

N.S. Software Breach: Microsoft Blames Ransomware Gang

A recent software breach in Nova Scotia has raised concerns as the extent of the attack remains unknown. Microsoft has identified the ransomware gang known as Clop as the primary culprit behind the breach, highlighting the ever-growing threat of cybercriminals…

Coinbase Sees Transformative Future of AI-Blockchain

  Coinbase, a prominent cryptocurrency exchange, acknowledges the profound potential of artificial intelligence (AI) in the realm of digital currencies. Being at the forefront of the industry, Coinbase recognizes the considerable influence AI can wield in transforming the utilization, comprehension,…

The Risks and Ethical Implications of AI Clones

The rapid advancement of artificial intelligence (AI) technology has opened up a world of exciting possibilities, but it also brings to light important concerns regarding privacy and security. One such emerging issue is the creation of AI clones based on…