We all use far too many passwords, and they’re probably not all that secure. Passkeys are the next development in password technology and are intended to replace passwords with a more secure approach. Password troubles For a very long…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
The DEA Portal Hack was Perpetrated by Two Cybercriminals Last Year
During the investigation into the hacking of the DEA portal in 2022, one of the young American men was accused of breaking in and stealing data from the site. The portal breach provided criminals with access to sensitive information because…
Rising Cyberattacks Increase Stress on Healthcare Industry
The health industry has recently come under increasing pressure to protect sensitive data from cyberattacks as these attacks become more frequent and sophisticated. Healthcare providers have been targeted by cybercriminals seeking to obtain sensitive patient data such as medical…
Two ‘ViLE’ Cybercrime Group Members Charged in 2022 Hacking of DEA Portal
Last year, cybercriminals began using a novel method to steal subscriber data from social media companies: they would hack into police email accounts using stolen passwords purchased on the dark web, then utilise their access to file an emergency…
How Much Will Each Stolen Client SSN Cost You Now That You Have Been Pwned?
Following the theft from its systems of more than 447,000 patient names, Social Security numbers, and private medical information, a Florida healthcare organization has resolved a class-action lawsuit. Orlando Family physicians, which has 10 clinics in central Florida, has agreed…
BreachForums Mastermind Pompompurin Arrested in New York
Earlier this week, U.S. law enforcement officials arrested a New York man as part of their efforts to crack down on the infamous hacking forum BreachForums, which was run by an individual who used the alias “Pompompurin.” According to…
Emotet Recurs: Avoids Macro Security Using OneNote Attachments
Microsoft OneNote email attachments are now being used to spread the infamous Emotet malware, which is making a brief comeback. This malware aims to compromise systems by getting around macro-based security measures. Despite attempts by law enforcement to neutralise…
EV Charging Stations Prone to Cyber Attacks : Indian Govt to Parliament
Electric vehicle charging stations, like any other technological application, are vulnerable to cyber attacks and cyber security incidents, Indian Parliament was informed on Thursday. Union Minister Nitin Gadkari stated in a written reply to the Lok Sabha that the…
LockBit 3.0 Ransomware: Inside the Million Dollar Cyberthreat
US government organizations have recently published a joint cybersecurity advisory stating the indicators of compromise (IoCs) and tactics, techniques and procedures (TTPs) linked with the malicious LockBit 3.0 ransomware. The alert comes through the FBI, the CISA, and the Multi-State…
Threat Actors Exploit Adobe Acrobat Sign to Propagate Redline Info-Stealing Malware
Cybercriminals are exploiting Adobe Acrobat Sign, an online document signing service, to trick users into downloading malware that steals their personal information. In order to get around security measures and dupe users into believing the email they got is…
Lender Latitude Customer Records Were Hacked in a Cyberattack
Cyber-attacks on a finance company belonging to Latitude Financial that could have compromised the privacy of more than 300,000 people may have led to the breach of more than 300,000 people’s data in New Zealand and Australia. With Genoapay,…
San Francisco Battles Cybercrime Surge
San Francisco is currently battling a surge in cybercrime, which officials are calling a ‘tsunami.’ The recent attack on Oakland has been one of the biggest hits in the area, and authorities are working tirelessly to prevent similar incidents.…
ChipMixer: Cryptocurrency Mixer Taken Down After ‘Laundering $3bn in Cryptocurrency’
Darknet cryptocurrency mixer, ChipMixer has been shut down as a result of a sting conducted by Europol, the FBI, and German police, which investigated servers, and internet domains and seized $46 million worth of cryptocurrency. During the raid, it was…
Cybersecurity Experts are Scarce for Companies and SMBs
In 2023, more than half of small and midsized businesses (SMBs) intend to increase their expenditures on cybersecurity — which is a positive development since six out of ten firms (61%) do not have cybersecurity staff, about half (47%)…
How ChatGPT May Act as a Copilot for Security Experts
Security teams have been left to make assumptions about how generative AI will affect the threat landscape since ChatGPT-4 was released this week. Although it is now widely known that GPT-3 may be used to create malware and ransomware…
Boosting AI with Synthetic Data: Benefits & Challenges
Artificial intelligence (AI) is becoming increasingly important across a wide range of industries. However, one of the biggest challenges facing AI is the need for large amounts of high-quality data to train algorithms effectively. This is where synthetic data…
McAfee Invoice Fraud Email Pretending to be a Subscription Renewal Receipt
Readers should beware of clicking links in a McAfee invoice scam email that claims to be a “confirmation receipt” for the subscription renewal of the company’s products. This email does not come from McAfee Corp. Email scams that use…
Exfiltration Malware: At the Forefront of Cybersecurity Issues
While massive public security breaches are understandably concerning, the increase in malware designed to exfiltrate data directly from devices and browsers is a significant contributor to continued user exposure, according to SpyCloud . Last year, over 22 million unique…
Beyond Identity Officially Announces the Release of ‘Zero Trust Authentication’
Beyond Identity’s launch of Zero Trust Authentication is a game-changer in the field of cybersecurity. The sub-category of zero-trust security is a step forward in aligning verification with zero-trust principles. The passwordless capability and phishing resistance features of Zero…
Cloud Data Theft is Booming According to CrowdStrike
An industry-leading cybersecurity company known as CrowdStrike reported that it had seen the largest increase in adversaries in one year. This was in comparison with what it had observed in the past. There was an increase in cloud attacks…
Threat Actors Hack US Federal Agency Using Telerik Bug to Steal Data
In a joint security advisory on Wednesday, CISA reported that the threat actors have exploited a three-year-old Progress Telerik UI flaw in order to compromise a server at a federal civilian executive branch agency. An unidentified federal civilian executive branch…
Growing Threat From Deep Fakes and Misinformation
The prevalence of synthetic media is rising as a result of the development of tools that make it simple to produce and distribute convincing artificial images, videos, and music. The propagation of deepfakes increased by 900% in 2020, according…
Enterprise Attack Surface Widening Access Control Gap in Microsoft Active Directory
Users in Windows environments may be able to access domains other than those for which they are authenticated due to a security flaw in Microsoft’s Active Directory (AD) service that IT administrators may not be aware of. The majority…
After Hundreds of Penetration Tests, Here are Top 5 Lessons
To keep applications safe, developers must strike a balance between creativity and security frameworks. Correlating business logic with security logic will pay dividends in terms of safety. Web applications are the most common vectors used by attackers to carry…
Stay Alert Against Messages Like ‘Account Suspended, Update PAN’
Banking fraud has increased in recent years. There has been an increase in digital phishing attacks claimed by HDFC Bank customers as the social media outcry has mounted in recent days. Several HDFC Bank customers reported to the authorities that…
Cybercriminals Exploit SVB’s Downfall for Phishing
The downfall of Silicon Valley Bank (SVB) on March 10, 2023, has caused instability all across the global financial system, but for hackers, scammers, and phishing schemes, it’s evolving into a huge opportunity. Security experts have already observed a variety…
Ring Data Breach: What you Need to Know About the Home Security Company Attack
With innovative doorbells and security cameras making a huge breakthrough for home security across the world, Ring now stores a great amount of data. Although the company has recently been facing ransomware gang threats to expose the data online. About…
Cerebral Admits to Revealing Patient Information to Meta, TikTok, and Google
As per TechCrunch, Cerebral, a telehealth startup specialising in mental health, inadvertently shared sensitive information of over 3.1 million patients with Google, Meta, TikTok, and other third-party advertisers. Cerebral admits to exposing a slew of patient data with the…
Using Employment Offers, North Korean Hackers Target Security Researchers
Security experts have been the victim of a hacking campaign by threat actors associated with the North Korean government that use cutting-edge methods and malware in an effort to infiltrate the organizations the targets work for, according to researchers.…
How Scammers Trap Businesses
With significant ramifications for South African businesses that have vulnerabilities in their payment systems, the growth in financial and accounting hacking through phishing and Business Email Compromise (BEC) has made headlines. However, strong financial controls combined with strong server,…
Psychological Tactics Used by Cybercriminals to Conduct Malicious Activities
Recently, the emergence of finance and accounting related cyberattacks via phishing campaigns and Business Email Compromise (BEC) attack has been a hot topic for South African companies having gaps in their payment systems. BEC attack is a type of cybercrime…
GOBruteforcer: an Active Web Server Harvester
Known as Golang, the Go programming language is relatively new. It is one of the most popular malware programmers interested in creating malware. Capable of developing all kinds of malware, such as ransomware, stealers, or remote access Trojans (RATs),…
Who Is Responsible for the NetWire Remote Access Trojan?
A Croatian national was arrested for reportedly running NetWire, a Remote Access Trojan (RAT) that has been advertised on cybercrime forums since 2012 as a covert way to spy on infected systems and steal passwords. The arrest coincided with…
SVB Collapse: An Attackers Paradise you Should Beware of
Lately, the Silicon Valley Bank has been closed down by the California Department of Finance Protection and Innovation. This was apparently the result of a bank run that followed the risk of insolvency and a stock crash. Customers of SVB…
Discord Upgraded Their Privacy Policy
Discord has updated its privacy policy, effective on March 27, 2023. The company has added the previously deleted clauses back in as well as built-in tools that make it easier for users to interact with voice and video content,…
LastPass Breach: CISA Warns of Exploited Plex Bug
An employee of LastPass was responsible for the massive breach at the company as he failed to update Plex on his home computer when he was updating Plex on his work computer. A potential danger lurks in failing to…
Targeting Businesses Globally, the Medusa Ransomware Gang Gains Momentum
In 2023, a ransomware operation by the name of Medusa began to gain momentum. It targets corporate targets globally and demands a million-dollar ransom. Starting in June 2021, the Medusa operation saw just a small number of victims and…
Change Your Passwords on These Five Platforms Right Away
Have you ever gotten an email advising you to change your security details because one of your accounts has been compromised? Well, you are not alone Regular users are suffering the most damage as hacking grows more sophisticated. According…
Here’s all you Need to Know About Snake Keylogger
In this age of ever-evolving technological developments, crime pertaining to the same is also emerging at a higher scale. One of the most talked about and harsh cybercrimes are data breaches. In today’s world, a cybercriminal is capable of stealing…
Korean University Disclosed a Potential Covert Channel Attack
The School of Cyber Security at the Korean University in Seoul has developed a novel covert channel attack called CASPER that may leak data from air-gapped computers to a nearby smartphone at a pace of 20 bits per second. What…
AT&T Alerts Millions About Data Breach That Exposed Sensitive Information
An internal supply chain cyber-incident that occurred in AT&T’s supply chain revealed some sensitive information belonging to tens of millions of the company’s customers, exposing them to some serious vulnerabilities in their systems. A hacking incident did occur in…
Unpatched Akuvox Smart Intercom Flaws Can Be Exploited for Spying
The E11, a popular smart intercom and videophone from Chinese company Akuvox, contains more than a dozen flaws, including a critical bug that allows unauthenticated remote code execution (RCE). Malicious actors could use these to gain access to an…
Google Announces Drone Delivery Network
Network of Wing Delivery Services Several companies worldwide have been developing drone technologies designed to improve last-mile delivery by integrating them with ground transportation. Wing’s ultimate goal is to create an automated logistics system that moves millions of packages…
The United States has Released its National Cybersecurity Strategy: Here’s What you Need to Know
The US government is taking steps to enhance the country’s cybersecurity capabilities and improve its overall technology governance strategy. President Joe Biden recently unveiled a new National Cybersecurity Strategy aimed at securing cyberspace and building a resilient digital ecosystem…
Telehealth Startup Reveals Exposing Private Data of Millions of its Patients
Telehealth startup, Cerebral, which specializes in mental health has recently revealed that it has exposed its patients’ private information that includes mental health assessments. This data of more than 3.1 million patients in the US has apparently been shared with…
OpenSea NFT Market Users’ Identities Were Exposed via a Bug
In 2022, OpenSea had more than 1 million members who had registered and more than 121 million people visited the website each month. Because of this, OpenSea is not only the biggest NFT market but also a highly attractive target…
Fake ChatGPT Chrome Extension Targets Facebook Accounts
As ChatGPT becomes increasingly well-known, more and more individuals desire to use cutting-edge chatbot. In turn, this makes them a desirable target for cybercriminals. This time around, hackers are using a browser extension called “Quick access to Chat GPT”…
ChatGPT Scams Up Since Darktrace Released It
Since the release of ChatGPT, Darktrace, a British cybersecurity firm, has warned that since the release of this application, criminals have been using an increase in the use of artificial intelligence to create sophisticated scams that con employees and…
Netherlands Restricts Key Tech Exports in US-China Chip Battle
According to sources, the Netherlands government would impose export limits on the nation’s most cutting-edge microprocessor technology in order to safeguard national security. Products manufactured by ASML, a significant company in the worldwide semiconductor supply chain, will be subject to…
Countering Ransomware: Don’t Let Your Data be Held Hostage
Today’s enterprises operate in a digitally connected world, where technology and connectivity are at the heart of their digital transformation strategies and operations. However, organizations must contend with hyper-exposure to cyber risk due to hyper-connectivity. Ransomware, one of the…
FBI Admits to Have Gained US Citizens’ Location Data, Unwarranted
According to a Wired report, FBI Director Christopher Wray revealed for the first time at a Senate Intelligence Committee hearing yesterday that the organization has previously acquired the location data of US citizens without obtaining a warrant. Despite the practice…
New Cybersecurity Vulnerabilities are Being Discovered Using ‘Intelligent Mining’
When brute force attacks shut down operations and force mines to pay a ransom, “intelligent mining” activities have emerged as the gold mine for cybercriminals. Dr. Pierre Jacobs, the head of cybersecurity operations and compliance at CyberAntix, a member…
Expert Suggested Ban on TikTok for Government-issued Phones in Australia
The Australian government recently decided to stop their employees from using TikTok, which is an app that lets people make and share short videos. The government is worried that the company that owns TikTok has connections to the Chinese government…
Growing Public Cloud Spending is Leading to a Shadow Data Risk
Public cloud spending and adoption has emerged as a growing sector. As per the assumptions made by analysts, organizations will spend $591.8 billion on cloud infrastructure and services this year, more than 20.7% from last year. According to the Forrester,…
Qakbot Distributes Malware Through OneNote
There have been reports of a new wave of Qakbot campaigns that use a novel method of distributing malware as part of the delivery process. The name of this sophisticated malware is Qakbot, though this malware has several different…
This Website Wants to Use AI to Make Models Redundant
Deep Agency is an AI photo studio and modelling agency founded by a Dutch developer. For $29 per month, you can get high-quality photos of yourself in a variety of settings, as well as images generated by AI models…
India’s Dream of a $5 Trillion Economy Threatened by Rising Cybercrime Risks
The Evolving Cybercrime Landscape in India India is one of the fastest-growing economies in the world and has set an ambitious target of becoming a USD 5 trillion economy by 2025. However, this dream is being threatened by the rising…
Fortinet: Remote Working has Resulted in Breaches for Two-Thirds of Businesses
When the COVID-19 global epidemic hit nearly three years ago, millions of people were compelled to complete their tasks away from their offices and coworkers. Due to this, there has been an unheard-of rise in the number of workers…
ChatGPT Sparking Security Concerns
Cyberhaven, a data security company, recently released a report in which it found and blocked requests to input data into ChatGPT from 4.2% of the 1.6 million employees at its client companies due to the potential leakage of sensitive…
Flutterwave Hit by Unknow Hackers Lost Millions of Dollars
Flutterwave, Africa’s largest startup, suffered a cyberattack resulting in the disappearance of over ₦2.9 billion (~$4.2 million) from its accounts last month. According to the reports, the missing funds were transferred across 28 accounts in 63 transactions in early February…
Verifiable Credentials: How has it Changed the Identity Verification Status
Online authentication has been a challenge to firms, regardless of their shapes and sizes. Despite more advanced cybersecurity solutions, threat actors and criminals continue to find sneaky new ways to access corporate systems. Verifiable credentials are one of the methods…
Demanding Data Privacy Measures, FBI Cyber Agent Urges Users
The FBI maintains a close eye on cyber security risks, but officials emphasized that in order to be more proactive with the prevention, they need the assistance of both people and businesses. Every one of us can simply navigate that…
Attacks are Being Outmanoeuvred by AI Cybersecurity in Novel Ways
These days, chatbots that use artificial intelligence (AI) are the hot topic. Yet, AI cybersecurity is one of the software program’s most rapidly expanding functions. That’s because real-time detection and defence against cyberattacks saves money for businesses, governments, and…
Customers’ Accounts Were Exposed in the Verizon breach
There have been a lot of talks lately about telecom companies and consumer data breaches. In the past few years, you are more likely to hear about T-Mobile announced in the headlines. There have been numerous attacks on the…
How the SYS01 Campaign Uses Multiple Evasion Tactics to Avoid Detection in Cyber Espionage
Multiple Malware Families: The Primary Evasion Tactic of the SYS01 Campaign In the world of cybersecurity, it is not uncommon for attackers to use multiple tactics to evade detection and carry out their malicious activities. The SYS01 campaign is a…
AI Takes Center Stage: How Artificial Intelligence is Revolutionizing the Marketing Industry
Artificial Intelligence (AI) has become a buzzword in the business world, and it’s no surprise that it is transforming marketing in unprecedented ways. AI-driven marketing is revolutionizing the industry by providing marketers with the ability to analyze data and personalize…
Despite the Risk of Ransomware Attacks, Businesses Continue to Pay
Most companies in four Asia-Pacific countries have had to protect against phishing and ransomware attacks, with those infected in Australia being the most willing to pay ransomware demands. Australians are also the most likely to be victims of such…
Does Antivirus Detect and Remove All Malware?
Antivirus software has become an essential tool in safeguarding our system online and offline. However, the question often arises in our heads is whether these software programs provide us complete protection against all types of malware and viruses or not. …
The West Accuses TikTok of Espionage & Data Mining
TikTok is one of the few social media corporate giants that was not created by a Silicon Valley business. The parent business, ByteDance, which launched the internet service in China in 2016, has offices spread across the globe, including…
New MOTW Bypass Method Introduced by LockBit
Despite being on the winning side of the race, LockBit operators continue to exfiltrate data from high-profile organizations and add the names of those organizations to its leak site. It’s well known that the tactics and techniques employed by…
APT41: Cyberespionage Group Targets Asian Materials Industry
The Chinese-sponsored APT41 cyberespionage group, also known as Blackfly, Barium Bronze Atlas, Double Dragon, Wicked Panda, and Wicked Spider has emerged as one of the most active threat groups since at least 2007. The cyber-threat group has recently been targeting…
Freenom Suspends Domain Registrations After Being Sued by Meta
Freenom, a domain name registrar that has attracted spammers and phishers with its free domain names, no longer accepts new domain name registrations. The action was taken just days after Meta filed a lawsuit against the Netherlands registrar, alleging…
Transparent Tribe Hackers Disseminate CapraRAT via Trojanized Messaging Apps
Transparent Tribe, an alleged Pakistan-aligned advanced persistent threat (APT) group, has been interconnected to an ongoing cyber espionage campaign targeting Indian and Pakistani Android users with a backdoor called CapraRAT. “Transparent Tribe distributed the Android CapraRAT backdoor via trojanized…
LastPass Releases New Security Incident Disclosure and Recommendations
LastPass was compromised twice last year by the same actor, once in late August 2022 and again on November 30, 2022. On Wednesday, the global password manager company released a report with new findings from its security incident investigation…
New Phishing Scam Targets User’s With Fake ChatGPT Platform
The general population is fascinated with AI chatbots like OpenAI’s ChatGPT. Sadly, the popularity of the AI tool has also attracted scammers who use it to carry out extremely complex investment frauds against naive internet users. Nevertheless, security experts warn…
Here are the Countries That Have Imposed TikTok Ban
This week, the U.S. and Canada have issued orders to ban the use of TikTok on state-issued gadgets, following the raising cybersecurity concerns over the video-sharing app. Bytedance, the Chinese company that owns TikTok, has long insisted that it does…
7 Essential Tips to Ensure Your Wi-Fi Security and Protect Your Personal Information
In today’s digital world, Wi-Fi has become an essential part of our lives. It provides us with access to the internet and allows us to connect to our devices wirelessly. However, as much as Wi-Fi has made our lives more…
Law Enforcement Using Facebook Chat Logs to Prosecute Abortion Seekers
Facebook and Google are two tech giants companies that provide online services such as social media and search engines, to millions of people worldwide. These companies collect vast amounts of data on their users. It has been reported that these…
Air Fryers are Offered by Scammers as a ‘Free’ Kitchen Gadget
The deputy chief executive officer of Sainsbury’s and Argos has warned shoppers to be vigilant against an air fryer scam targeting them at the moment. Taking part in an online survey is the only way to receive a free…
AI Image Generators: A Novel Cybersecurity Risk
Our culture could be substantially changed by artificial intelligence (AI) and there is a lot to look forward to if the AI tools we already have are any indication of what is to come. A number of things are…
Zoom Boss Greg Tomb Fired ‘Without Cause’
Zoom, the video conferencing platform that many people use to work from home, has terminated the contract of its President, Greg Tomb. Tomb was in charge of sales and had been involved in the company’s financial calls. But, Zoom has…
Thousands of Websites Attacked Via Compromised FTP Credentials
Wiz, a cloud security startup, has issued a warning about a widespread redirection campaign in which thousands of East Asian-targeted websites have been affected using legitimate FTP credentials. In many cases, the attackers gained access to highly secure auto-generated…
Attack on Oakland City attributed to Play Ransomware
Oakland recently became the victim of a ransomware attack that disrupted the city’s services and caused a state of emergency to be declared by the city. Cyberattacks are a real-world problem with real-world consequences and the recent attack on…
Southeastern Louisiana University & Tennessee State Hit by Breaches
After a possible incident last week forced the Southeastern Louisiana University to shut down its network and call in Louisiana State Police to investigate, the University is now on its fifth day without a website, email, or mechanism for submitting…
Consumers of Chick-fil-A had Grievances Following Account Takeovers
An automated credential stuffing attack that affected more than 71,000 customers of Chick-fil-A, an American food chain,for months has been made known to its clients. Attacks that use automation—often through bots—to test a large number of username-password combinations against…
Information of European Hotel Chain’s Customers Discovered in Unprotected Server
A researcher has recently found an unprotected server storing the personal data of several Falkensteiner hotel chain clients in Europe. Falkensteiner, the Austria-based hotel chain has hotels that are spread across Central and Eastern Europe, including Austria, Italy, Croatia, Slovakia,…
Visa Bolsters Cybersecurity Defenses with AI and Machine Learning
Enhancing Fraud Detection and Prevention with Visa Advanced Authorization (VAA) Visa is one of the largest payment companies in the world, handling billions of transactions every year. As such, it is a prime target for cyberattacks from hackers looking to…
Dubai’s Crypto Industry Introduces New Licensing Regulations
The crypto industry in Dubai is witnessing a huge breakthrough since the jurisdiction has recently come up with its new crypto regulatory framework, apparently providing individuals with a concrete licensing regime for their digital asset issues and service vendors. The…
A GoAnywhere MFT hack Exposes Hatch Bank’s Data Breach
Hackers exploited a zero-day vulnerability in Hatch Bank’s internal file transfer software, allowing access to thousands of Social Security numbers from customers, according to Hatch Bank, a digital-first bank that provides infrastructure for fintech companies offering their brand credit…
Crypto Scammer Monkey Drainer Shuts Down Criminal Operations
Cyber threats are not new in the crypto space. The industry has been witnessing advanced cyber security attacks since its inception and even recorded more during the 2022 crypto winter, especially in the DeFi Sector. According to Yahoo Finance, the…
For Your Mid to Large-Sized Firm, Here Are Four Best Cybersecurity Practices
As technology advances and becomes more sophisticated, cybercriminals continue to look for new ways to take advantage of enterprises. A cyber attack could result in financial loss, loss of reputation, and legal repercussions, among other catastrophic and permanent harms.…
Digital Resignation is Initial Stage of Safeguarding Privacy Online
Several internet businesses gather and use our personal information in exchange for access to their digital goods and services. With the use of that data, they can forecast and affect our behavior in the future. Recommendation algorithms, targeted marketing,…
Beware of Bot Malware: Understanding the Dangers and How to Protect Your Computer
How Bot Malware Spreads and Infects Your Computer Bot malware, also known as botnet malware, is a type of malicious software designed to create a network of infected computers or “bots” that can be remotely controlled by a hacker. These…
Trezor Users: Target of a Major Cryptocurrency Wallet Phishing Campaign
Trezor users are being coerced into disclosing their seed phrases. A new phishing campaign targeting cryptocurrency hardware wallet firm Trezor has been discovered. These wallets enable cryptocurrency users to keep their funds offline rather than in a “hot wallet”…
Some Hackers Use Malware-Free Methods
As cybercriminals try to become more and more sophisticated, they are turning away from their adversaries. They are turning back on their hacking attacks without even using any malware as part of their hacking campaigns, according to new research. …
Twitter Returns After Two-Hour Outage Affecting Tweets
On Wednesday, Twitter experienced a service disruption that resulted in users being unable to access certain parts of the platform, specifically the “Following” and “For you” feed. These feeds displayed an error message rather than the expected content. The problem…
YouTube Charged for Data Gathering on UK Minors
A million children’s personal data might be collected by YouTube, as per the research. According to the claim, YouTube violates the ‘age-appropriate design code’ set forth by the Information Commissioner’s Office (ICO). The UK’s data protection rules pertaining to the…
Resecurity Discovered the Investment Scam Network Digital Smoke
Resecurity discovered one of the largest investment fraud networks in terms of size and volume of operations designed to defraud InteSecurity from Australia, Canada, China, Colombia, the European Union, India, Singapore, Malaysia, the United Arab Emirates, Saudi Arabia, Mexico,…
What Are Some Big Cyber-Security Fears Concerning TikTok?
China claims that the US has inflated national security concerns over TikTok in an effort to suppress the Chinese startup. Due to concerns over cyber-security, US federal entities have been asked to remove the Chinese app from all staff devices…
Blue Cross Customers at Risk: Sobeys Hack Exposes Personal Data in Latest Breach
The Rising Threat of Data Breaches: An Overview of Recent Incidents Blue Cross, a Canadian insurance organisation, has recently alerted its customers about a possible data breach resulting from a cyberattack that occurred at Sobeys, a famous Canadian grocery chain.…