The recent Future Combat Air & Space Capabilities Summit hosted by the Royal Aeronautical Society in London brought together experts, industry leaders, and military personnel worldwide to discuss the future of combat air and space capabilities. The two-day conference covered…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Conti’s Legacy: Ransomware’s Evolution and Future Threats
Ransomware has been a persistent and highly lucrative threat in the cybersecurity landscape, and one group that has garnered significant attention is Conti. Known for their sophisticated tactics and high-profile attacks, Conti has left a lasting impact on the cybersecurity…
RBI Announces Draft Norms to Ensure Security of Payment System Operators
Reserved Bank of India (RBI), India’s central bank and regulatory body is all set to enhance the safety and security of digital payments amidst the raising cyber risks, the draft regulations for payment system operators (PSOs) announced on Friday. The…
Terminator Antivirus Killer: Vulnerable Windows Driver Masquerading as Threat
Spyboy, a threat actor, has been actively advertising the “Terminator” tool on a hacking forum predominantly used by Russian speakers. The tool supposedly possesses the ability to disable various antivirus, XDR, and EDR platforms. However, CrowdStrike has dismissed these…
The Unintended Consequences of Netflix’s Password Sharing Ban
Netflix’s recent ban on password sharing may have initially appeared as a step forward for cybersecurity. However, emerging data suggest that this policy change has led some users to explore alternative streaming options on the Dark Web. In addition to…
Music Streaming Royalties To Be Examined by The UK Government
Since the early days of the music industry, musicians, writers, and other creatives have spoken out about the unfairness of royalty share payments. This is when their works are played on Spotify and Apple Music. There will be a…
Which Country Ranked the Highest in the Global National Privacy Test?
Apparently, it has turned out that what is known to be the world’s smallest country has also been named the most literate in terms of cybersecurity: Vatican City. As per the National Privacy Test carried out by one of the…
Government and Military Institutions Under Persistent Attacks by Dark Pink Hackers
In 2023, the Dark Pink APT cyber group has been spotted targeting government, military, and education organisations in Indonesia, Brunei, and Vietnam. The threat group has been active since at least mid-2021, primarily targeting companies in the Asia-Pacific region,…
What B2C Service Providers can Learn From Netflix’s Accidental Model
Netflix made a policy error last month that might provide consumers with long-term security benefits. For other business-to-consumer (B2C) firms wishing to enhance client account security, this unintentional pro-customer safety action may serve as a lesson. On May 23,…
Cybersecurity Crisis: Anonymous Sudan Demands $3 Million from SAS Airlines
Scandinavian Airlines (SAS) is currently facing a severe cybersecurity threat as the hacktivist group Anonymous Sudan continues its relentless distributed denial-of-service (DDoS) attacks. The group recently raised its ransom demand from an initial $3,500 to a staggering $3 million. These…
SAS Airlines Faces $3 Million Ransom Demand After DDoS Attacks
Scandinavian Airlines (SAS) has recently become the target of a series of Distributed Denial of Service (DDoS) attacks, resulting in a $3 million ransom demand from a hacker group called Anonymous Sudan. This incident highlights the increasing sophistication and…
Harvard Pilgrim Health Care Hit by Ransomware Attack
Harvard Pilgrim Health Care, one of the largest health insurance providers in the United States, has recently experienced a major ransomware attack that has affected approximately 2.5 million individuals. The incident has raised serious concerns about data security and…
Upsurge in UPI Fraud Cases: How can you Guard Against These Scams
India is going digital as more and more individuals use the internet to shop, order food, and complete other activities. According to a Times of India (TOI) report, in March 2023, Unified Payment Interface (UPI) transactions reached a record…
Deepfake Deception: Man Duped of Rs 5 Crore as Chinese Scammer Exploits AI Technology
A recent incident has shed light on the alarming misuse of artificial intelligence (AI) through the deployment of advanced ‘deepfake’ technology, in which a man was deceived into losing a substantial amount of money exceeding Rs 5 crore. Deepfakes,…
Fraudsters Target Kolkatans With Message-Forwarding Software
As online financial transactions became simpler and easier to conduct, the number of fraudulent transactions involving digital financial transactions also increased. Taking advantage of the increased sophistication of the fraudsters does not seem to be a problem. Cybercriminals, especially…
Mata: Challenges in Data Transfer Between Countries May Affect Services
Meta, in a recent report, stated how its inability to transfer data “between countries and regions,” where the company operates, may alter its ability to provide services to its users. The company added that this issue may further affect its…
Cyberattack Diverted Ambulances of Idaho Hospital
In yet another instance of a cyberattack affecting healthcare facilities in the United States, a hospital representative has confirmed to CNN that an Idaho-based hospital has been redirecting ambulances to alternative medical facilities for over 24 hours. This diversion…
Safeguarding Your Work: What Not to Share with ChatGPT
ChatGPT, a popular AI language model developed by OpenAI, has gained widespread usage in various industries for its conversational capabilities. However, it is essential for users to be cautious about the information they share with AI models like ChatGPT,…
Undiscovered Attacks Against Middle Eastern Targets Conducted Since 2020
Over the last few years, companies in the Middle East have faced a series of targeted attacks using an open-source tool used by threat actors as kernel drivers. Fortinet researchers discovered a sample of the so-called Donut tool while…
Capita Cyberattack Sees 90 Organizations Report Possible Data Breaches
The Information Commissioner’s Office (ICO), the data watchdog, has stated that it has received around 90 reports regarding possible breaches connected to Capita. In the realm of data protection in the UK, the Information Commissioner’s Office (ICO) takes on…
Ghost Sites: Attackers are now Exposing Data From Deactivated Salesforce Sites
Varonis Threat Lab researchers recently discovered that Salesforce ‘ghost sites,’ that are no longer in use, if improperly deactivated and unmaintained may remain accessible and vulnerable of being illicitly used by threat actors. They noted how by compromising the host…
Here’s How Script Kiddies are Targeting Internet Users Worldwide
Most people have an image of hackers in their minds. In our minds, imagery from motion pictures depicting skilled cybercriminals breaking into guarded networks practically instantly while typing at breakneck speeds come to mind. These are not Script kids,…
9 Million Patients’ Data Exposed by Ransomware Attack on US Dental Giant
A ransomware attack may have compromised nearly nine million individuals’ personal information in the United States. This is due to the harm caused by an apparent attack on a dental health insurer — one of the country’s largest. According…
Ransomware Attacks Pose Significant Threats to the Security of Medical Devices
Cybercriminals are increasingly targeting health organizations of all sizes. The rise in healthcare-related cyberattacks suggests that smaller healthcare providers are experiencing a higher rate of cybercrime incidents. Recently Food and Drug Administration has disclosed that ransomware attacks targeting medical facilities…
Most CEOs Increasingly Prioritise Cybersecurity Over Economic Performance
In accordance with a new survey from Palo Alto Networks, an increasing proportion of CEOs are realizing that cyberattacks pose a greater existential danger than economic instability. Palo Alto Research discovered, based on a poll of 2,500 CEOs from…
Watch Out For These ChatGPT and AI Scams
Since ChatGPT’s inception in November of last year, it has consistently shown to be helpful, with people all around the world coming up with new ways to use the technology every day. The strength of AI tools, however, means…
Lazarus Hackers Exploit Windows IIS Web Servers for Initial Access
The notorious Lazarus hacking group has once again made headlines, this time for targeting Windows Internet Information Services (IIS) web servers as a means of gaining initial access to compromised systems. The group, believed to have links to the…
VPN Split Tunneling: A Better VPN Option?
As long as your VPN connection is encrypted, you can protect your privacy and security because you cannot see your IP address. A VPN is an application that offers users a secure tunnel through which they can send and…
New Threat Intelligence Report Provides Actionable Intelligence Against Cyberattacks
In today’s world scenario, it has become a prime requirement for security experts to expand their focus on vulnerabilities that the innovative technologies may possess. They must build expertise when it comes to managing security risk, which can be acquired…
Threat Actors Exploit Qbot Malware: Evolving Tactics for Stealthy Attacks
Qbot operators using .DLL malware to exploit windows systems In the ever-evolving scenario of cyber threats, hostile actors continue to use sophisticated methods to enter computer systems and exploit sensitive data. One such example is the utilization of Qbot operators,…
Here’s How Quantum Computing can Help Safeguard the Future of AI Systems
Algorithms for artificial intelligence are rapidly entering our daily lives. Machine learning is already or soon will be the foundation of many systems that demand high levels of security. To name a few of these technologies, there are robotics,…
NYC’s Metropolitan Opera Faces Lawsuit for 2022 Data Breach
World’s largest opera house, the New York City’s Metropolitan Opera has recently been charged with a class action lawsuit following a data breach that took place in year 2022 and apparently compromised private information of around 45,000 employees and patrons.…
AI: the cause of the metaverse’s demise?
In a dramatic change from its past plans to create a virtual world known as “the metaverse,” Facebook has taken a completely different direction that has not been seen before. It was a project that consumed billions of dollars…
PyPI Enforces the Usage of Two-factor Authentication for All Software PUBLISHES
The Python Package Index (PyPI) has stated that by the end of the year, every account that maintains a project on the system will be compelled to enable two-factor authentication (2FA). PyPI is a software repository for Python programming…
The Challenges with Passkeys: Addressing Limitations
Passkeys have become a popular method for authentication, offering an alternative to traditional passwords. However, despite their advantages, there are several key issues that need to be addressed. This article explores the problems associated with passkeys and the need for…
Elon Musk Withdraws Twitter from EU’s Disinformation Code of Practice
European Union has recently confirmed that Twitter has withdrawn from the European Union’s voluntary code against disinformation. The news was announced on Twitter, by EU’s internal market commissioner Thierry Breton. Breton later took to social media, warning Twitter that it…
‘Hot Pixel’ Attack Exploits Novel GPUs and SoCs to Siphon Browsing History
An innovative cyberattack technique known as “Hot Pixel,” which targets the complex interactions between graphic processing units (GPUs), contemporary system-on-a-chip (SoC), and browser data, has been discovered through a historic partnership between the University of Michigan, Ruhr University Bochum,…
Promoting Trust in Facial Recognition: Principles for Biometric Vendors
Facial recognition technology has gained significant attention in recent years, with its applications ranging from security systems to unlocking smartphones. However, concerns about privacy, security, and potential misuse have also emerged, leading to a call for stronger regulation and…
Facebook Shares Private Information With NHS Trusts
In a report published by The Observer, NHS trusts have been revealed to share private information with Facebook. As a result of a newspaper investigation, it was discovered that all of the websites of 20 NHS trusts were using…
Android Phone Hacked by ‘Daam’ Virus, Government Warns
It has been announced by the central government that ‘Daam’ malware is infecting Android devices, and the government has issued an advisory regarding the same. CERT-IN, the national cyber security agency of the Indian government, released an advisory informing…
Chinese-Sponsored Hacking Group Targeting Critical U.S. Infrastructure, Microsoft Claims
The employment of hackers to gather intelligence data is prevalent in practically every nation on earth. Intelligence organisations like the Fancy Bear and Equation Group are used by both the US and Russia. Microsoft Corp. stated last week that…
The Media & Entertainment Industries’ Major Public Cloud Security Issues
As reported by Wasabi, media and entertainment (M&E) organizations are swiftly resorting to cloud storage to improve their security procedures. While M&E organizations are still fairly new to cloud storage (69% had been using cloud storage for three years…
The Future of Data Security: Staying Ahead of AI Threats
Data security is an ongoing concern as technology continues to advance, and one of the emerging challenges is staying ahead of artificial intelligence (AI) in the realm of cybersecurity. As AI technologies evolve, so do the threats they pose…
Kyocera AVX: Electronic Manufacturer Company the Current Target of LockBit
Kyocera, a global electronics manufacturer, has apparently experienced what seems like a data breach, wherein their data was exposed by ransomware gang LockBit on their dark web blog. The company was one of several who felt the aftershocks of a…
Free VPN Experiences Massive Data Breach, Putting Users at Risk
SuperVPN, a popular free VPN service, is said to have experienced a huge data breach, compromising over 360 million customer accounts. The leak is reported to have exposed 133GB of sensitive information, including user email addresses, originating IP addresses,…
OpenAI, the Maker of ChatGPT, Does not intend to Leave the European Market
According to the sources, the CEO of OpenAI, manager of ChatGPT, and creator of artificial intelligence technology, Sam Altman, in the past, has publicly favored regulations on AI technology development. However, more recently, he has indicated that he opposes…
Three Ways AI-Powered Patch Management is Influencing Cybersecurity’s Future
Approaches to patch management that aren’t data-driven are breaches just waiting to happen. Security teams delay prioritising patch management until a breach occurs, which allows attackers to weaponize CVEs that are several years old. More contextual knowledge about which…
A Vulnerability in OAuth Exposed Social Media Logins to Account Takeover
As reported by security researchers, a new OAuth-related vulnerability in an open-source application development framework could allow Facebook, Google, Apple, and Twitter users to account takeover, personal data leaking, identity theft, financial fraud, and unauthorized actions on other online…
What is AceCryptor Malware? A Quick Insight
AceCryptor first appeared in the year 2016. Since, this cryptor has been used to pack tens of malware to date, many of its technical components have already been discussed and detailed. We may already be familiar with this cryptor, sometimes…
Safeguarding Your Data: 10 Best Practices to Prevent a Data Breach
Data breaches have become a significant concern for organizations and individuals alike, as cyber threats continue to evolve in complexity and scale. The consequences of a data breach can be severe, ranging from financial loss and reputational damage to…
American Financial Data Exposed by Debt Collector
An NCB breach notification letter has been sent to affected customers informing them that their data has been hacked. Over 1.1 million people have been exposed by this breach. On February 1st, a US-based company claimed that its systems…
Netwrix Reports: Enterprises Experience More Cyber Security Incidents Than Smaller Organizations
Cybersecurity company Netwrix, that makes data security simple, has revealed further findings for the enterprise sector (organizations with more than 1,000 workers) in its recent annual global 2023 Hybrid Security Trends Report. As per the reports, around 65% of the…
Confidential Report Highlights Bitfinex Security Breach in Massive 2016 Hack
In 2016, a hacker or hackers gained access to the Bitfinex cryptocurrency exchange and took 119,754 bitcoins worth a total of $72 million. The stolen coins’ worth had risen to almost $4 billion by the time US police detained…
Email Scams v/s Phishing: Here’s All You Need to Know
Becoming a victim of any crime can be emotionally distressing, financially burdensome, and socially humiliating. While some scams are easily recognizable, others are cleverly disguised, making it difficult to detect that you are being exploited. Scams exist in various…
The Security Hole: Prompt Injection Attack in ChatGPT and Bing Maker
A recently discovered security vulnerability has shed light on potential risks associated with OpenAI’s ChatGPT and Microsoft’s Bing search engine. The flaw, known as a “prompt injection attack,” could allow malicious actors to manipulate the artificial intelligence (AI) systems…
Rheinmetall Hit by BlackBasta Ransomware: Disruption to Arms Production
Arms manufacturer Rheinmetall has recently confirmed that it fell victim to a ransomware attack orchestrated by the BlackBasta ransomware group. The cyberattack has caused significant disruption to the company’s operations, including its arms production capabilities. Rheinmetall, a prominent German defense…
Using Ransomware to Extort Employers by Impersonating a Gang
In a court in Fleetwood, Hertfordshire, a 28-year-old United Kingdom man has been found guilty of serving his employer with a forged document and unauthorized access to his computer with criminal intent. SEROCU has released a press release explaining…
Iranian Attackers Employ Novel Moneybird Ransomware to Target Israeli Organizations
A new ransomware variant called “Moneybird” is currently being used by the threat actor “Agrius,” which is thought to be funded by the Iranian government, to target Israeli organisations. Since at least 2021, Agrius has been using various identities…
Companies May Now Prepare for a Shorter TLS Certificate Lifespans
Google put forth a proposal on March 3 to substantially reduce the Transport Layer Security (TLS) digital certificate’s validity period from 398 days to 90 days. Apparently, this will lead to a lot of changes in how businesses manage their…
AI Revolutionizes Job Searching, Promotions, and Workplace Success in America
The impact of artificial intelligence on our careers is becoming more apparent, even if we are not fully aware of it. Various factors, such as advancements in human capital management systems, the adoption of data-driven practices in human resource…
AI Knife Detection System Fails at Hundreds of US Schools
A security company that provides AI weapons scanners to schools is facing new doubts about its technology after a student was assaulted with a knife that the $3.7 million system failed to identify. Last Halloween, Ehni Ler Htoo was…
Microsoft Issues Alert Over Rise in Advanced Phishing Scams
Microsoft has issued a warning regarding a surge in sophisticated phishing scams targeting individuals and organizations. These scams employ advanced tactics to deceive users and steal sensitive information. With an increasing number of people falling victim to such attacks, it…
How is 3-2-1 Backup Policy now Out-dated?
With the growing trend of ransomware attacks, it has become important for individuals and organizations to adopt efficient backup policies and procedures. According to reports, in year 2022 alone, around 236.1 million ransomware attacks have been detected globally. Cyber criminals…
Criminal Digitisation: How UK Police Forces Use Technology
Researchers and law enforcement communities have yet to fully understand cybercrime’s scope and implications, even though it is a growing issue. As a result of the perception that the police were ill-equipped to deal with these types of crimes,…
Malicious Windows Kernel Drivers Utlized in BlackCat Ransomware Attacks
Researchers have discovered an end-point security evasion mechanism used by the group known as BlackCat. The new technique conceals the gang’s defensive measures when inside a network. The cybercrime group was discovered employing signed Microsoft kernel drivers to control…
Ethical Issues Mount as AI Takes Bigger Decision-Making Role in Multiple Sectors
Even if we don’t always acknowledge it, artificial intelligence (AI) has ingrained itself so deeply into our daily lives that it’s difficult to resist. While ChatGPT and the use of algorithms in social media have received a lot of…
Kimsuky Hackers from North Korea Back in Action with Advanced Reconnaissance Malware
Kimsuky, a North Korean APT outfit, has been discovered deploying a piece of bespoke malware named RandomQuery as part of a reconnaissance and information exfiltration operation. “Lately, Kimsuky has been consistently distributing custom malware as part of reconnaissance campaigns…
China’s Assessment of Micron’s Security Was Rejected
As a result of Micron’s failure to pass a security review, the Chinese government has banned the company from supplying memory chips to local industries that are critical to the country. The Chinese cyberspace regulator has announced that it…
Onfido Acquires Airside to Strengthen Digital ID Verification
Tech company, Onfido, is moving a step closer to developing the digital passport of the future, through its acquisition of Airside Mobile, a US-based digital identity solutions provider primarily aimed at the travel industry. Over 10 million travelers have utilized…
GAO Urges Federal Agencies to Implement Key Cloud Security Practices
The Government Accountability Office (GAO) has called on federal agencies to fully implement essential cloud security practices in order to enhance their cybersecurity posture. In a recent report, the GAO highlighted the importance of adopting and adhering to these practices…
Fake ChatGPT Apps may Fraud you out of Your Money
The growing popularity of ChatGPT has given online scammers a good chance to take it as an opportunity to scam its users. Numerous bogus apps have now been released on the Google Play Store and the Apple App Store as…
How Hackers Launched an Attack on European Spacecraft
Space warfare is unavoidable, and the space ecology must be ready at all times. The European Space Agency (ESA) issued a challenge to cybersecurity specialists in the space industry ecosystem to interfere with the operation of the ESA’s “OPS-SAT”…
Data And Employees Of BSI Shared On The Dark Web By LockBit Ransomware Gang
An international data breach affecting one of Indonesia’s leading Islamic banks, Bank Syariah Indonesia, caused significant disruptions to its normal operations and payment systems which in turn hampered the business flow. Customers’ personal and financial details have been compromised…
FBI Warns of Hackers Exploiting Public Charging Stations to Steal iPhone Data
The FBI has issued a warning about a new threat targeting iPhone users – hackers using public charging stations to steal personal data. As the popularity of public charging stations continues to grow, so does the risk of falling victim…
This Brute-force Fingerprint Attack has the Potential to Compromise Your Android Phone
Based on a research paper from cybersecurity researchers at Tencent Labs and Zhejiang University, there is a means to “brute-force” fingerprints on Android smartphones, and with physical access to the smartphone and enough time, a hacker would be able…
Hackers Utilise Azure Serial Console to Get Unauthorized Access to Virtual Machines
Mandiant has identified a financially driven cybergroup known as ‘UNC3944’ that is utilizing phishing and SIM swapping attacks to compromise Microsoft Azure admin credentials and get access to virtual machines. The attackers then use the Azure Serial Console to install…
How Blockchain Technology is Playing a Major Role in Combating Crypto Hacking Risk
The world of cryptocurrencies is not immune to the shadows that come with living in a time when digital currencies are having such a significant impact on the global financial landscape. Malicious actors are devising complex plans to take…
Tackling the Top Initial Attack Vectors in Ransomware Campaigns
Ransomware attacks remain a major concern for organizations worldwide, causing significant financial losses and operational disruptions. A recent report by Kaspersky sheds light on the primary attack vectors used in ransomware campaigns, highlighting the importance of addressing these vulnerabilities to…
Changing Methods of Tracking and Sharing Healthcare Data
As artificial intelligence (AI) becomes more and more prevalent in healthcare, there is a growing need to manage its development, as rapidly. Private companies and organizations own and control AI technologies. Because of the way artificial intelligence is implemented,…
KeePass Vulnerability: Hackers May Have Stolen the Master Passwords
One would expect an ideal password manager to at least keep their users’ passwords safe and secure. On the contrary, a new major vulnerability turned out to be putting the KeePass password manager users at serious risk of their passwords…
The Infamous Cybercrime Marketplace Now Offers Pre-order Services for Stolen Credentials
In accordance with Secureworks, info stealer malware, which consists of code that infects devices without the user’s knowledge and steals data, is still widely available for purchase through underground forums and marketplaces, with the volume of logs, or collections…
Malware Detected on Millions of Mobile Phones
In the Google Play Store, you can often find apps that contain malware, adware, or spyware. Some of these apps are even labeled as spyware or malware. The fact that malware is installed through pre-installed apps is a less…
Businesses Rely on Multicloud Security to Protect Cloud Workloads
On Thursday, cloud networking company Aviatrix unveiled its new Distribution Cloud Firewall security platform, which integrates traffic inspection and policy enforcement across multicloud environment. According to Rod Stuhlmuller, VP of solutions marketing at Aviatrix, the company utilizes native cloud platform…
IRS Sends Cyber Attachés Abroad to Combat Cybercrime
The Criminal Investigation (CI) of the Internal Revenue Service (IRS) is taking a courageous initiative in the fight against cybercrime by sending cyber attachés across four continents. Earlier on Thursday, the regulator provided this update. The most recent plan…
Royal Mail’s £1bn Losses: Strikes, Cyber Attack, and Online Shopping Crash
The Royal Mail, the UK’s national postal service, has reported losses surpassing £1 billion as a combination of factors, including strikes, a cyber attack, and a decrease in online shopping, has taken a toll on its post and parcels business.…
Hackers and Cybercriminals Use Dark Web Data to Train DarkBert AI
There is a paper released by a team of South Korean researchers describing how they developed a machine-learning model from a large dark web corpus collected by crawling Tor’s network. It was obvious that there were many shady sites…
Balancing Industrial Secure Remote Access: Essentiality and Risk Concerns
As industries continue to embrace digitalization and remote operations, industrial secure remote access has become an essential component of modern industrial automation systems. The ability to connect to and manage industrial assets remotely brings numerous benefits, such as increased operational…
Mackenzie Investements: Canada’s Largest Investment Firm Confirms a Major Data Breach
One of Canada’s major investment firms’ clients’ compromising their social insurance numbers (SIN) to a data breach is “so dangerous,” according to a former high-level employee of the business. Till his retirement in 2019, Terry Beck worked with Mackenzie Investments…
Police Blocked 20K+ Mobile Numbers Issued on Fake Papers
In accordance with a police officer, Haryana Police’s cyber nodal unit has blocked 20,545 mobile phones issued on fraudulent and counterfeit paperwork. According to a Haryana police spokesman, the majority of the blocked SIM cards were issued in Andhra…
ClearML Launches First Generative AI Platform to Surpasses Enterprise ChatGPT Challenges
Earlier this week, ClearGPT, the first secure, industry-grade generative AI platform in the world, was released by ClearML, the leading open source, end-to-end solution for unleashing AI in the enterprise. Modern LLMs may be implemented and used in organisations…
Several RCE Bugs Making Industrial IoT Devices Vulnerable to Cyberattacks
Eleven vulnerabilities in the cloud-management platforms of three industrial cellular router vendors put operational technology (OT) networks at risk for remote code execution, even when the platform is not actively set up for cloud management. Eran Jacob, team leader of…
BianLian Ransomware has Switched to Extortion-only Attacks, FBI Confirms
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a joint Cybersecurity Advisory from government agencies in the United States and Australia, alerting organizations about the latest tactics, methods, and procedures (TTPs) utilized by the BianLian ransomware group. BianLian…
Homeland Security Employs AI to Analyze Social Media of Citizens and Refugees
The Customs and Border Protection (CBP) division of the US Department of Homeland Security (DHS) is using intrusive AI-powered systems to screen visitors coming into and leaving the nation, according to a document obtained by Motherboard through a freedom…
Cyberattack That Stole Personal Data of 16,000 Law Society Members, What Was Lacking?
Law Society Members’ personal information was leaked through the Law Society of Singapore’s VPN. Ransomware headlines are making the rounds, however, the reality is even grimmer. There is a high probability that victims of domestic violence will never see…
Preinstalled ‘Guerrilla’ Malware Infects Millions of Smartphones Worldwide
Security experts have made the alarming discovery that preloaded ‘Guerrilla’ malware has been disseminated on millions of smartphones globally. Once embedded in the device, this sneaky type of malware grants attackers unrestricted access to private user data, potentially resulting…
China’s Access to TikTok User Data Raises Privacy Concerns
A former executive of ByteDance, the parent company of the popular social media platform TikTok, has made shocking claims that China has access to user data from TikTok even in the United States. These allegations have raised concerns about the…
Generative AI Empower Users, But it May Challenge Security
With the easy-going creation of new applications and automation in recent years, low-code/ no code has been encouraging business partakers to deal with their requirements on their own, without depending on the IT. The power of generative AI, which has…
Hackers Target Apple macOS Systems with a Golang Version of Cobalt Strike
Threat actors intending to attack Apple macOS systems are likely to pay attention to Geacon, a Cobalt Strike implementation written in the Go programming language. The details were accumulated by SentinelOne, which noticed an increase in the quantity of…
Google Refuses to Disclose Reason for Withholding Bard AI in EU
While Google’s AI helper Bard is presently available in 180 countries worldwide, the European Union and Canada have yet to be invited to the AI party. Almost two months after the launch of Google’s friendly AI chatbot, Bard, the…
Babuk is Customized by RA Ransomware Group
It has recently been discovered that an actor called the RA Group uses leaked Babuk source code in its attacks. The wrath of the same jas been faced by the companies in the United States and South Korea. Manufacturing,…