The Government Accountability Office (GAO) has called on federal agencies to fully implement essential cloud security practices in order to enhance their cybersecurity posture. In a recent report, the GAO highlighted the importance of adopting and adhering to these practices…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Fake ChatGPT Apps may Fraud you out of Your Money
The growing popularity of ChatGPT has given online scammers a good chance to take it as an opportunity to scam its users. Numerous bogus apps have now been released on the Google Play Store and the Apple App Store as…
How Hackers Launched an Attack on European Spacecraft
Space warfare is unavoidable, and the space ecology must be ready at all times. The European Space Agency (ESA) issued a challenge to cybersecurity specialists in the space industry ecosystem to interfere with the operation of the ESA’s “OPS-SAT”…
Data And Employees Of BSI Shared On The Dark Web By LockBit Ransomware Gang
An international data breach affecting one of Indonesia’s leading Islamic banks, Bank Syariah Indonesia, caused significant disruptions to its normal operations and payment systems which in turn hampered the business flow. Customers’ personal and financial details have been compromised…
FBI Warns of Hackers Exploiting Public Charging Stations to Steal iPhone Data
The FBI has issued a warning about a new threat targeting iPhone users – hackers using public charging stations to steal personal data. As the popularity of public charging stations continues to grow, so does the risk of falling victim…
This Brute-force Fingerprint Attack has the Potential to Compromise Your Android Phone
Based on a research paper from cybersecurity researchers at Tencent Labs and Zhejiang University, there is a means to “brute-force” fingerprints on Android smartphones, and with physical access to the smartphone and enough time, a hacker would be able…
Hackers Utilise Azure Serial Console to Get Unauthorized Access to Virtual Machines
Mandiant has identified a financially driven cybergroup known as ‘UNC3944’ that is utilizing phishing and SIM swapping attacks to compromise Microsoft Azure admin credentials and get access to virtual machines. The attackers then use the Azure Serial Console to install…
How Blockchain Technology is Playing a Major Role in Combating Crypto Hacking Risk
The world of cryptocurrencies is not immune to the shadows that come with living in a time when digital currencies are having such a significant impact on the global financial landscape. Malicious actors are devising complex plans to take…
Tackling the Top Initial Attack Vectors in Ransomware Campaigns
Ransomware attacks remain a major concern for organizations worldwide, causing significant financial losses and operational disruptions. A recent report by Kaspersky sheds light on the primary attack vectors used in ransomware campaigns, highlighting the importance of addressing these vulnerabilities to…
Changing Methods of Tracking and Sharing Healthcare Data
As artificial intelligence (AI) becomes more and more prevalent in healthcare, there is a growing need to manage its development, as rapidly. Private companies and organizations own and control AI technologies. Because of the way artificial intelligence is implemented,…
KeePass Vulnerability: Hackers May Have Stolen the Master Passwords
One would expect an ideal password manager to at least keep their users’ passwords safe and secure. On the contrary, a new major vulnerability turned out to be putting the KeePass password manager users at serious risk of their passwords…
The Infamous Cybercrime Marketplace Now Offers Pre-order Services for Stolen Credentials
In accordance with Secureworks, info stealer malware, which consists of code that infects devices without the user’s knowledge and steals data, is still widely available for purchase through underground forums and marketplaces, with the volume of logs, or collections…
Malware Detected on Millions of Mobile Phones
In the Google Play Store, you can often find apps that contain malware, adware, or spyware. Some of these apps are even labeled as spyware or malware. The fact that malware is installed through pre-installed apps is a less…
Businesses Rely on Multicloud Security to Protect Cloud Workloads
On Thursday, cloud networking company Aviatrix unveiled its new Distribution Cloud Firewall security platform, which integrates traffic inspection and policy enforcement across multicloud environment. According to Rod Stuhlmuller, VP of solutions marketing at Aviatrix, the company utilizes native cloud platform…
IRS Sends Cyber Attachés Abroad to Combat Cybercrime
The Criminal Investigation (CI) of the Internal Revenue Service (IRS) is taking a courageous initiative in the fight against cybercrime by sending cyber attachés across four continents. Earlier on Thursday, the regulator provided this update. The most recent plan…
Royal Mail’s £1bn Losses: Strikes, Cyber Attack, and Online Shopping Crash
The Royal Mail, the UK’s national postal service, has reported losses surpassing £1 billion as a combination of factors, including strikes, a cyber attack, and a decrease in online shopping, has taken a toll on its post and parcels business.…
Hackers and Cybercriminals Use Dark Web Data to Train DarkBert AI
There is a paper released by a team of South Korean researchers describing how they developed a machine-learning model from a large dark web corpus collected by crawling Tor’s network. It was obvious that there were many shady sites…
Balancing Industrial Secure Remote Access: Essentiality and Risk Concerns
As industries continue to embrace digitalization and remote operations, industrial secure remote access has become an essential component of modern industrial automation systems. The ability to connect to and manage industrial assets remotely brings numerous benefits, such as increased operational…
Mackenzie Investements: Canada’s Largest Investment Firm Confirms a Major Data Breach
One of Canada’s major investment firms’ clients’ compromising their social insurance numbers (SIN) to a data breach is “so dangerous,” according to a former high-level employee of the business. Till his retirement in 2019, Terry Beck worked with Mackenzie Investments…
Police Blocked 20K+ Mobile Numbers Issued on Fake Papers
In accordance with a police officer, Haryana Police’s cyber nodal unit has blocked 20,545 mobile phones issued on fraudulent and counterfeit paperwork. According to a Haryana police spokesman, the majority of the blocked SIM cards were issued in Andhra…
ClearML Launches First Generative AI Platform to Surpasses Enterprise ChatGPT Challenges
Earlier this week, ClearGPT, the first secure, industry-grade generative AI platform in the world, was released by ClearML, the leading open source, end-to-end solution for unleashing AI in the enterprise. Modern LLMs may be implemented and used in organisations…
Several RCE Bugs Making Industrial IoT Devices Vulnerable to Cyberattacks
Eleven vulnerabilities in the cloud-management platforms of three industrial cellular router vendors put operational technology (OT) networks at risk for remote code execution, even when the platform is not actively set up for cloud management. Eran Jacob, team leader of…
BianLian Ransomware has Switched to Extortion-only Attacks, FBI Confirms
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a joint Cybersecurity Advisory from government agencies in the United States and Australia, alerting organizations about the latest tactics, methods, and procedures (TTPs) utilized by the BianLian ransomware group. BianLian…
Homeland Security Employs AI to Analyze Social Media of Citizens and Refugees
The Customs and Border Protection (CBP) division of the US Department of Homeland Security (DHS) is using intrusive AI-powered systems to screen visitors coming into and leaving the nation, according to a document obtained by Motherboard through a freedom…
Cyberattack That Stole Personal Data of 16,000 Law Society Members, What Was Lacking?
Law Society Members’ personal information was leaked through the Law Society of Singapore’s VPN. Ransomware headlines are making the rounds, however, the reality is even grimmer. There is a high probability that victims of domestic violence will never see…
Preinstalled ‘Guerrilla’ Malware Infects Millions of Smartphones Worldwide
Security experts have made the alarming discovery that preloaded ‘Guerrilla’ malware has been disseminated on millions of smartphones globally. Once embedded in the device, this sneaky type of malware grants attackers unrestricted access to private user data, potentially resulting…
China’s Access to TikTok User Data Raises Privacy Concerns
A former executive of ByteDance, the parent company of the popular social media platform TikTok, has made shocking claims that China has access to user data from TikTok even in the United States. These allegations have raised concerns about the…
Generative AI Empower Users, But it May Challenge Security
With the easy-going creation of new applications and automation in recent years, low-code/ no code has been encouraging business partakers to deal with their requirements on their own, without depending on the IT. The power of generative AI, which has…
Hackers Target Apple macOS Systems with a Golang Version of Cobalt Strike
Threat actors intending to attack Apple macOS systems are likely to pay attention to Geacon, a Cobalt Strike implementation written in the Go programming language. The details were accumulated by SentinelOne, which noticed an increase in the quantity of…
Google Refuses to Disclose Reason for Withholding Bard AI in EU
While Google’s AI helper Bard is presently available in 180 countries worldwide, the European Union and Canada have yet to be invited to the AI party. Almost two months after the launch of Google’s friendly AI chatbot, Bard, the…
Babuk is Customized by RA Ransomware Group
It has recently been discovered that an actor called the RA Group uses leaked Babuk source code in its attacks. The wrath of the same jas been faced by the companies in the United States and South Korea. Manufacturing,…
Here’s How ChatGPT is Charging the Landscape of Cyber Security
Security measures are more important than ever as the globe gets more interconnected. Organisations are having a difficult time keeping up with the increasingly sophisticated cyberattacks. Artificial intelligence (AI) is now a major player in such a situation. ChatGPT,…
Possible Cyberattack on ‘The Philadelphia Inquirer’ Disrupts Printing Operations
The daily newspaper The Philadelphia Inquirer is attempting to patch up the systems that were damaged by what was reportedly a cyberattack that struck its network over the weekend. The attacks hampered the newspapers’ print operation, and the newspaper was…
Outdated Technology Could Cost Your Business a Lot
Owners and managers are constantly faced with tough choices in today’s fast-paced business environment when cash allocation becomes one of the most pivotal factors in maintaining smooth operations. Business owners often take short-term approaches to saving money and reducing costs.…
Convincing Phishing Pages are Now Possible With Phishing-as-a-Service
In several phishing campaigns since mid-2022, a previously unknown phishing-as-a-service (PaaS) offering named “Greatness” has been used as a backend component for various spam campaigns. In addition to MFA bypass, IP filtering, and integration with Telegram bots, Greatness includes…
Beware of WhatsApp Scam Calls From International Numbers
A growing number of people have recently reported getting unexpected calls on WhatsApp from foreign numbers. These calls frequently originate from unknown or unfamiliar parties and may be a part of a fraud or scam. It is crucial to exercise…
Chip-Maker Arm Reveals Side-attack on Cortex-M, Denies it as failure of The Architecture’s Defenses
Chip designer Arm confirms that a successful side-channel attack on one of its TrustZone-enabled Cortex-M based systems cannot be viewed as a failure of the architecture’s defenses. In a statement last Friday, BLACK HAT ASIA Arm said that a successful…
Hacker Marketplace Remains Operational Despite Police ‘Takedown’ Claim
A hacker marketplace notorious for stealing accounts from popular services such as Netflix and Amazon is still operational despite claims by authorities that it had been shut down. Last month, an international police operation declared that Genesis Market had…
Backups can be Quicker and Less Expensive than Paying the Ransom
Ransomware operators want to spend as little time as possible within your systems, which means the encryption they use is shoddy and frequently corrupts your data. As a result, paying ransoms is typically a more expensive chore than simply…
Bl00dy Ransomware Targets Education Orgs via PaperCut Flaw
The Federal Bureau of Investigation (FBI) has issued a warning about the Bl00dy ransomware gang targeting educational organizations through vulnerabilities in the popular print management software, PaperCut. The cybercriminals are exploiting a critical flaw in PaperCut to gain unauthorized access…
Year-long Cyber Campaign Reveals Potent Backdoor and Custom Implant,
A new hacking group has targeted the government, aviation, education, and telecom industries in South and Southeast Asia as part of a highly focused campaign that began in mid-2022 and extended into the first quarter of 2023. Broadcom Software’s…
A US Cyber Team’s Perspective on US Military Cyber Defense of Ukraine
Despite analysts’ numerous predictions, Russia could not destroy Ukraine’s computer systems in this year’s invasion with a massive cyber-attack. This may be because an unknown US military branch hunts down rivals online to enforce their interests. To cover these…
Critical WordPress Plugin Vulnerability Enables Hackers To Exploit Over 1M Sites
Threat actors are apparently exploiting two security flaws in the Elementor Pro and Ultimate Addons for Elementor WordPress plugins, in an effort to remotely execute arbitrary code and completely compromise unpatched targets. As reported by the Threat Intelligence team at…
‘Greatness’ Phishing Tool Abuses Microsoft 365 Credentials
The ‘Greatness’ phishing-as-a-service (PhaaS) platform has experienced an increase in activity as it targets organisations using Microsoft 365 in the United States, Canada, the United Kingdom, Australia, and South Africa. The Microsoft 365 cloud-based productivity tool is used by…
XWorm Malware Exploits Critical Follina Vulnerability in New Attacks
Security researchers have identified a new wave of attacks using the XWorm malware that exploits the Follina vulnerability. XWorm is a remote access trojan (RAT) that has been previously linked to state-sponsored Chinese hacking groups. The Follina vulnerability is a…
Hackers Come up With Innovative Methods to Enforce Ransomware Payment
Ransomware is still one of the most serious cybersecurity risks that organizations and governments face. However, as organizations make a conscious decision to deny ransom payment demands, cybercriminals are devising new methods to recover ransom from their victims. The…
Microsoft 365 Phishing Attacks Made Easier With ‘Greatness’
It is a method of stealing money, or your identity, by attempting to get you to reveal personal information through websites that pretend to be legitimate websites, such as credit cards, bank details, or passwords, that aim to get…
Beware of “Quishing”: Fraudsters Steal Data Using QR Codes
The vulnerability of protected health data may be increased by the usage of QR codes, which are intended to speed up processes like picture file transfers but actually expose organisations’ weak points in mobile device security. A fake QR…
Dragos Hacked: Cybersecurity Firm Reveals “Cybersecurity Event”, Extortion Attempt
Industrial cybersecurity company Dragos recently revealed a “cybersecurity event,” where a notorious cybercrime gang attempted to breach Dragos’ defenses and access the internal network to encrypt devices. The firm disclosed the incident on its blog on May 10, alleging that…
Google Launches Next-Gen Large Language Model, PaLM 2
Google has launched its latest large language model, PaLM 2, in a bid to regain its position as a leader in artificial intelligence. PaLM 2 is an advanced language model that can understand the nuances of human language and generate…
ChatGPT and Data Privacy Concerns: What You Need to Know
As artificial intelligence (AI) continues to advance, concerns about data privacy and security have become increasingly relevant. One of the latest AI systems to raise privacy concerns is ChatGPT, a language model based on the GPT-3.5 architecture developed by OpenAI.…
Google’s Search Engine Received AI Updates
Microsoft integrated GPT-4 into Bing earlier this year, complementing the previous development. Google’s CEO, Sundar Pichai, recently announced that the company would completely reimagine how all of its core products, including search, are implemented. To ensure the success of…
Twitter Launches End-to-End Encrypted Messaging Services
Twitter has become the newest social media platform to be providing encrypted messaging service. End-to-end Encryption Direct messages delivered on the platform will be end-to-end encrypted, i.e. private and only readable by the sender and receiver. However, Chief executive Elon…
VMware ESXi Ransomware on the Rise Due to Leaked Babuk Code
Security experts claim to have discovered ten distinct ransomware families that have recently diverged from Babuk, a ransomware outbreak whose source code was exposed online in 2021. Hackers have been using leaked source code from well-known ransomware firms like…
WhatsApp Users Alerted About Possible Scam Calls From International Numbers
As per experts, if you’re receiving missed calls, messages, or WhatsApp calls from international numbers starting with +254, +84, +63, or others, it’s advised to “report and block” them. The Indian Cybercrime Coordination Centre (I4C) of the Home Ministry…
SideWinder APT Group: Victims in Pakistan and Turkey Stricken with Multiphase Polymorphic Attack
Government authorities and individuals in Turkey are apparently been targeted by India’s well-known SideWinder APT group, which is using polymorphism techniques, enabling bypass standard signature-based antivirus (AV) detection and deliver a next-stage payload. In an article published on their blog…
Here’s How Global Firms are Capturing First- & Zero-Party Data of Consumers
Changes in consumer privacy in the digital marketing environment are forcing firms to fundamentally rethink their data-driven marketing tactics. Consumers are becoming more conscious of the importance of their personal information. Simultaneously, tech titans and authorities worldwide are cracking…
Private Keys for Intel Boot Guard Have Reportedly Been Leaked, Jeopardizing the Security of Many PCs
Every other day, hackers are out there committing a new attack, exploiting a vulnerability, or attempting to extort people with ransomware. MSI is the latest victim, with hackers disclosing material acquired from a last-month breach of MSI’s systems. This…
Chinese Government to Ban TikTok Apps From Collecting U.S. Data
A spokesperson for TikTok issued a statement today responding to charges that the U.S. Congress was working to advance legislation. This would create another avenue for the US president to ban the popular video-sharing application from the country. There…
Adopting ChatGPT Securely: Best Practices for Enterprises
As businesses continue to embrace the power of artificial intelligence (AI), chatbots are becoming increasingly popular. One of the most advanced chatbots available today is ChatGPT, a language model developed by OpenAI that uses deep learning to generate human-like responses…
Here’s All You Know About Public Key Cryptography
Public key cryptography is one of the most efficient ways to ensure financial security, which is a crucial concern for organisations. This article will go into great detail about the advantages and disadvantages of this potent technology. We’ll look…
NextGen Data Breach, Personal Data of 1.5M Patients Hacked
NextGen Healthcare, the US-based electronic health record company, has recently revealed that their firm has suffered a breach in its systems, where hackers ended up stealing the personal data of more than one million patients, including roughly 4,000 individuals from…
Passwords and 2FA Codes Stolen by the Android FluHorse Malware
The latest Android malware named ‘FluHorse’ has been discovered which targets Eastern Asian users with malicious apps that look like legitimate versions with over a million installs and are designed to steal personal data and spread malware. Check Point…
Dish Network Hit by Cyberattack and Multiple Lawsuits
Satellite TV provider, Dish Network, recently suffered a ransomware attack that compromised the sensitive data of its customers and employees. The attack occurred in February 2023 and was only revealed by the company in April. Since then, the company has…
Verified Facebook Accounts Being Hijacked to Distribute Malware; Here’s How You Can Protect Yourself
Hackers have been caught getting into popular verified Facebook pages and using them to distribute malware through adverts on the social media behemoth. Matt Navarra, a social strategist, was the first to notice the harmful effort, exposing the danger…
IPFS Phishing Attacks: How Cybercriminals Exploit Decentralized File Storage
IPFS Phishing Attacks are becoming increasingly common as more users adopt the InterPlanetary File System (IPFS) technology to store and share files. This decentralized file storage system is designed to provide users with more control over their data and protect…
Learn How to Use the New Bing AI Image Generator in the Edge Browser
On April 7, Microsoft made its Image Creator tool, powered by OpenAI’s DALL-E 2 AI image generator, available to all Edge browser users on desktops worldwide, enabling them to create their own AI-generated images with ease. The Image Creator tool…
Emails With HTML Attachments are Still Popular Among Phishing Scammers
Cybercriminals are increasingly using malicious HTML files to attack computers, according to a recent study conducted by security researchers. In addition to this, Barracuda Networks’ study also revealed that malicious files now account for over half of all HTML…
Here’s How the FTX Collapse Turned into an Identity Issue
The cryptocurrency love affair has ended. After years of expansion and investment profits, everything came crashing down in November 2022 with the demise of the FTX Trading exchange. The devastation was evident. Since then, investors have abandoned cryptocurrency, a…
Cactus: New Ransomware Encrypts Itself to Evade Detection
Cactus, a newly discovered ransomware operation has apparently been exploiting vulnerabilities in VPN appliance vulnerabilities to gain initial access to the networks of “large commercial entities.” Although the new threat actor uses the usual file encryption and data stealing techniques…
AI Poses Greater Job Threat Than Automation, Experts Warn
Until a few months ago, the whole concern about machines taking over human employment revolved around automation and robots/humanoids. The introduction of ChatGPT and other generative artificial intelligence (AGI) models has triggered a real and more serious threat. What…
Enterprise Targeted by Akira Ransomware’s Extortion Techniques
A new ransomware operation called Akira has been found targeting enterprise organizations. According to reports, Akira ransomware is a relatively new strain that is used in targeted attacks and is designed to infiltrate enterprise networks. The ransomware is primarily distributed…
Understanding the TikTok Ban: A CISO’s Perspective on the Implications for Enterprises
As the federal government considers a potential ban on the popular video-sharing app TikTok, many enterprises are beginning to ponder the implications such a move could have on their operations. As Chief Information Security Officers (CISOs) evaluate their companies’ risks,…
How the Economy is Impacting Cybersecurity Teams
A recent study conducted by HackerOne, the world’s largest ethical hacker community, revealed that half of the surveyed organizations experienced a surge in cybersecurity vulnerabilities in the last year. This alarming trend has been attributed to security budget cuts and…
Deloitte Launches Blockchain Integration for Digital Credentials
One of the “Big Four” accounting firms, Deloitte, is in the forefront of the adoption of blockchain technology to transform the issue of digital credentials. KILT’s blockchain technology will be used to create reusable digital credentials for Know Your…
Study: Artificial Intelligence is Fueling a Rise in Online Voice Scams
In accordance with McAfee, AI technology is supporting an increase in online speech scams, with only three seconds of audio required to duplicate a person’s voice. McAfee studied 7,054 people from seven countries and discovered that one-quarter of adults…
Protecting Your Privacy on ChatGPT: How to Change Your Settings
OpenAI’s ChatGPT is an advanced AI language model that has been trained on vast amounts of text data from the internet. However, recent concerns have arisen regarding data privacy and the use of personal data by AI models like ChatGPT.…
Pentagon Weapons Systems Have ‘Nearly All’ Vulnerabilities
It appears as though the United States has penetrated Russian military and intelligence services deeply in the past year, as evidenced by the revelations of secret Pentagon documents that have been leaked online through social media, revealing that Washington…
New Way to Exploit PaperCut Vulnerability Detected
Cybersecurity professionals have recently discovered a new way to exploit a new critical vulnerability in PaperCut servers in a way that gets past all current detections. The flaw, tracked as CVE-2023-27350 (CVSS score 9.8), which affects PaperCut MF or NG…
Kimsuky Spear-Phishing Campaign Goes Global Using New Malware
On Thursday, security researchers from SentinelOne reported that the North Korean state-sponsored APT group, Kimsuky, has been observed utilizing a brand new malware component called ReconShark. The malware is disseminated through spear-phishing emails that are specifically targeted, containing OneDrive links…
The Rising Popularity of Remote Browser Isolation
The Importance of Browser Isolation in a Remote Work Environment The COVID-19 pandemic has caused a seismic shift in the way we work, with remote work becoming the norm for many organizations. While this has brought numerous benefits, it has…
Russian Hackers use WinRAR as Cyberweapon
Russian hackers are known for their notorious cyber-attacks. They have once again been accused of using a popular file compression software, WinRAR, to launch an attack on a state agency in Ukraine. The attack wiped out the agency’s data, resulting…
RFK Jr. Criticizes Crypto, Following Anti-CBDC Remark
On Tuesday, US Democratic presidential candidate Robert F. Kennedy has taken another dig at cryptocurrency, following earlier comments he made opposing a U.S. central bank digital currency, or CBDC. His tweets came out swinging on defense of the digital assets…
Bangladeshi Hacker Group Targets Multiple Indian News Agencies
An update regarding the cyberattack on Alt News has brought up cybersecurity news in Indian media once more. After focusing on Indian news agency ANI News for a few hours, the threat actor group “Mysterious Team Bangladesh” has now…
Constellation Software Cyberattack Claimed by ALPHV
According to the ALPHV/BlackCat ransomware group’s claims, Constellation Software’s network was compromised as a result of a cyberattack, it was also mentioned in the recent posting on the ransomware gang’s leak site. Essen Medical Associates, as well as a…
OpenAI’s Regulatory Issues are Just Getting Started
Last week, OpenAI resolved issues with Italian data authorities and lifted the effective ban on ChatGPT in Italy. However, the company’s troubles with European regulators are far from over. ChatGPT, a popular and controversial chatbot, faced allegations of violating…
Global Ransomware Attack Targets VMware ESXi Servers
Cybersecurity firms around the world have recently warned of an increase in cyberattacks, particularly those targeting corporate banking clients and computer servers. The Italian National Cybersecurity Agency (ACN) recently reported a global ransomware hacking campaign that targeted VMware ESXi servers,…
TikTok Tracked UK Journalist via her Cat’s Account
Cristina Criddle, a technology correspondent for the Financial Times, received a call from TikTok two days before Christmas, informing her that four employees (two in China and two in the US) had successfully accessed user data from her personal account…
Dragon Breath’s Latest Double-Clean-App Technique Targeting Gambling Industry
The Double-Clean-App Technique Explained The Dragon Breath APT group is known for its sophisticated cyber-attacks on a wide range of industries, including the gambling industry. Recently, security researchers have uncovered the group’s latest technique: the use of the double-clean-app method…
This New Android FluHorse Malware Steals Passwords & 2FA Codes
A new Android malware known as ‘FluHorse’ has been uncovered, which targets users in Eastern Asia with fake applications that seem like legitimate versions. Check Point Research uncovered the malware, which has been targeting various regions of Eastern Asia…
US Government Takes Down Try2Check Services Used by Dark Web Markets
The US Government, on Wednesday, announced that it had taken down the credit card checking tool ‘Try2Check’ that apparently gave cybercrime actors access to bulk purchases and sale of stolen credit card credentials to check which cards were legitimate and…
UK Banks Issue a Warning Regarding an Upsurge in Internet Scams
Banks have issued a warning about a sharp rise in fraud in 2022, much of it coming from online sources. 77% of frauds now take place on dating apps, online markets, and social media., Barclays reported. According to TSB, the…
A New FTC Rule Prohibits Data Mining by Minors for Meta-Profits
As a result of an investigation by the Federal Trade Commission, Meta’s Facebook (NASDAQ: META) was accused of misleading parents about their kids’ protection, and the commission proposed tightening existing privacy agreements and preventing profit from minors’ personal information. …
Online Predators Target Children’s Webcams, Study Finds
The Internet Watch Foundation has reported a significant rise in the production of sexual abuse images using webcams and similar recording equipment across the globe. The increase has been staggering, with the number of such images having multiplied ten…
Google is Phasing Out Passwords and Adopting Passkeys: Here’s What You Should Know
Users will soon be able to log in to their Google accounts without ever having to remember a single password again, according to the firm. Instead, Google is betting big on passkeys, which are cryptographic keys kept on your…
The Ransomware Gang Targets University Alert Systems
“RamAlert,” an emergency broadcast system used by Bluefield University to communicate with its students and staff, has been hijacked by the Avos ransomware gang. The gang sent SMS texts and emails informing them that their data had been stolen…
Mobile Menace: McAfee’s 2023 Report on the Top Mobile Threats
Mobile Data Security: Insights from McAfee’s 2023 Consumer Mobile Threat Report Mobile devices are an essential part of our lives today. From staying connected with our loved ones to handling our finances and work-related tasks, smartphones have become indispensable. However,…
CERT-In Warns Of ‘Royal Ransomware’ Virus Attacking India’s Critical Sectors
Indian citizens and organisations have been alerted about the Royal Ransomware virus by the Indian Computer Emergency Response Team (CERT-In). This malicious malware targets key infrastructure industries, such as manufacturing, communications, healthcare, and education, as well as individuals, encrypting…
Imperva Red Team Patches a Privacy Vulnerability in TikTok
The Imperva Red Team has recently identified a vulnerability in TikTok, apparently allowing threat actors to look into users’ activities over both mobile and desktop devices. The vulnerability, which has now been patched, was the result of a window message…
FTC Proposes Ban on Meta Profiting Off Children’s Data
The Federal Trade Commission (FTC) has accused Facebook of violating its 2019 privacy agreement by allowing advertisers to target children with ads based on their activity on other apps and websites. The FTC has proposed a ban on Meta from…