Tag: CySecurity News – Latest Information Security and Hacking Incidents

US Air Force Denies AI Drone Attacked Operator in Test

The recent Future Combat Air & Space Capabilities Summit hosted by the Royal Aeronautical Society in London brought together experts, industry leaders, and military personnel worldwide to discuss the future of combat air and space capabilities.  The two-day conference covered…

Conti’s Legacy: Ransomware’s Evolution and Future Threats

Ransomware has been a persistent and highly lucrative threat in the cybersecurity landscape, and one group that has garnered significant attention is Conti. Known for their sophisticated tactics and high-profile attacks, Conti has left a lasting impact on the cybersecurity…

Harvard Pilgrim Health Care Hit by Ransomware Attack

  Harvard Pilgrim Health Care, one of the largest health insurance providers in the United States, has recently experienced a major ransomware attack that has affected approximately 2.5 million individuals. The incident has raised serious concerns about data security and…

Fraudsters Target Kolkatans With Message-Forwarding Software

  As online financial transactions became simpler and easier to conduct, the number of fraudulent transactions involving digital financial transactions also increased. Taking advantage of the increased sophistication of the fraudsters does not seem to be a problem. Cybercriminals, especially…

Cyberattack Diverted Ambulances of Idaho Hospital

  In yet another instance of a cyberattack affecting healthcare facilities in the United States, a hospital representative has confirmed to CNN that an Idaho-based hospital has been redirecting ambulances to alternative medical facilities for over 24 hours. This diversion…

Safeguarding Your Work: What Not to Share with ChatGPT

  ChatGPT, a popular AI language model developed by OpenAI, has gained widespread usage in various industries for its conversational capabilities. However, it is essential for users to be cautious about the information they share with AI models like ChatGPT,…

Watch Out For These ChatGPT and AI Scams

  Since ChatGPT’s inception in November of last year, it has consistently shown to be helpful, with people all around the world coming up with new ways to use the technology every day. The strength of AI tools, however, means…

VPN Split Tunneling: A Better VPN Option?

  As long as your VPN connection is encrypted, you can protect your privacy and security because you cannot see your IP address. A VPN is an application that offers users a secure tunnel through which they can send and…

AI: the cause of the metaverse’s demise?

  In a dramatic change from its past plans to create a virtual world known as “the metaverse,” Facebook has taken a completely different direction that has not been seen before. It was a project that consumed billions of dollars…

The Challenges with Passkeys: Addressing Limitations

Passkeys have become a popular method for authentication, offering an alternative to traditional passwords. However, despite their advantages, there are several key issues that need to be addressed. This article explores the problems associated with passkeys and the need for…

Android Phone Hacked by ‘Daam’ Virus, Government Warns

  It has been announced by the central government that ‘Daam’ malware is infecting Android devices, and the government has issued an advisory regarding the same. CERT-IN, the national cyber security agency of the Indian government, released an advisory informing…

What is AceCryptor Malware? A Quick Insight

AceCryptor first appeared in the year 2016. Since, this cryptor has been used to pack tens of malware to date, many of its technical components have already been discussed and detailed. We may already be familiar with this cryptor, sometimes…

American Financial Data Exposed by Debt Collector

  An NCB breach notification letter has been sent to affected customers informing them that their data has been hacked. Over 1.1 million people have been exposed by this breach. On February 1st, a US-based company claimed that its systems…

Email Scams v/s Phishing: Here’s All You Need to Know

  Becoming a victim of any crime can be emotionally distressing, financially burdensome, and socially humiliating. While some scams are easily recognizable, others are cleverly disguised, making it difficult to detect that you are being exploited. Scams exist in various…

Microsoft Issues Alert Over Rise in Advanced Phishing Scams

Microsoft has issued a warning regarding a surge in sophisticated phishing scams targeting individuals and organizations. These scams employ advanced tactics to deceive users and steal sensitive information. With an increasing number of people falling victim to such attacks, it…

How is 3-2-1 Backup Policy now Out-dated?

With the growing trend of ransomware attacks, it has become important for individuals and organizations to adopt efficient backup policies and procedures. According to reports, in year 2022 alone, around 236.1 million ransomware attacks have been detected globally. Cyber criminals…

How Hackers Launched an Attack on European Spacecraft

  Space warfare is unavoidable, and the space ecology must be ready at all times. The European Space Agency (ESA) issued a challenge to cybersecurity specialists in the space industry ecosystem to interfere with the operation of the ESA’s “OPS-SAT”…

Tackling the Top Initial Attack Vectors in Ransomware Campaigns

Ransomware attacks remain a major concern for organizations worldwide, causing significant financial losses and operational disruptions. A recent report by Kaspersky sheds light on the primary attack vectors used in ransomware campaigns, highlighting the importance of addressing these vulnerabilities to…

Changing Methods of Tracking and Sharing Healthcare Data

  As artificial intelligence (AI) becomes more and more prevalent in healthcare, there is a growing need to manage its development, as rapidly. Private companies and organizations own and control AI technologies. Because of the way artificial intelligence is implemented,…

Malware Detected on Millions of Mobile Phones

  In the Google Play Store, you can often find apps that contain malware, adware, or spyware. Some of these apps are even labeled as spyware or malware. The fact that malware is installed through pre-installed apps is a less…

Businesses Rely on Multicloud Security to Protect Cloud Workloads

On Thursday, cloud networking company Aviatrix unveiled its new Distribution Cloud Firewall security platform, which integrates traffic inspection and policy enforcement across multicloud environment. According to Rod Stuhlmuller, VP of solutions marketing at Aviatrix, the company utilizes native cloud platform…

IRS Sends Cyber Attachés Abroad to Combat Cybercrime

  The Criminal Investigation (CI) of the Internal Revenue Service (IRS) is taking a courageous initiative in the fight against cybercrime by sending cyber attachés across four continents. Earlier on Thursday, the regulator provided this update. The most recent plan…

Police Blocked 20K+ Mobile Numbers Issued on Fake Papers

  In accordance with a police officer, Haryana Police’s cyber nodal unit has blocked 20,545 mobile phones issued on fraudulent and counterfeit paperwork. According to a Haryana police spokesman, the majority of the blocked SIM cards were issued in Andhra…

Babuk is Customized by RA Ransomware Group

  It has recently been discovered that an actor called the RA Group uses leaked Babuk source code in its attacks. The wrath of the same jas been faced by the companies in the United States and South Korea. Manufacturing,…