Tag: CySecurity News – Latest Information Security and Hacking Incidents

Tech Issues Persist at Minneapolis Public Schools

  Students and staff from Minneapolis Public Schools returned to their school buildings this week. However, the ongoing issues resulting from a cyberattack that occurred in the district caused disruptions to continue for the remainder of the week.  There was…

Free MortalKombat Ransomware Decryptor Released

An open-source universal decryptor for the newly discovered MortalKombat malware, which encrypts files, has been made available by the Romanian cybersecurity firm Bitdefender. The virus has been employed on dozens of victims in the United States, United Kingdom, Turkey, and…

Dish Network Blames Ransomware for Ongoing Outage

Dish, a satellite television provider in the United States, has confirmed that a ransomware attack is responsible for an ongoing service outage. The company also warned that the malicious actors have also exfiltrated data from its systems during the breach. …

Cybercriminals Use ChatGPT to Ease Their Operations

  Cybercriminals have already leveraged the power of AI to develop code that may be used in a ransomware attack, according to Sergey Shykevich, a lead ChatGPT researcher at the cybersecurity firm Checkpoint security. Threat actors can use the capabilities…

Future of the Cloud is Plagued by Security Issues

  Several corporate procedures require the use of cloud services. Businesses may use cloud computing to cut expenses, speed up deployments, develop at scale, share information effortlessly, and collaborate effectively all without the need for a centralised site.  But, malicious…

The Ukraine Invasion Blew up Russian Cybercrime Alliances

  Over the years, Russia has built up one of the world’s most formidable cybercriminal ecosystems. Russian hacker groups are linked to disruptive cyberattacks including one of the United States’ most critical oil pipelines and the world’s largest meat producers.  …

Preventing a USB Killer Threat

A USB Killer is a USB drive that was altered to emit an electrical surge that can break or destroy hardware when a modified flash drive is plugged into a computer’s USB port. The concept for USB Killers was created…

Info-stealer Ransomware hit Government Organisations

  Threat actors have targeted government entities with the PureCrypter malware downloader, which is used to deliver several information stealers and ransomware variants to targeted entities.   According to a study conducted by researchers at Menlo Security, the initial payload of…

Meta Announces a New AI-powered Large Language Model

On Friday, Meta introduced its new AI-powered large language model (LLM) named LLaMA-13B that, in spite of being “10x smaller,” can outperform OpenAI’s GPT-3 model. Language assistants in the ChatGPT style could be run locally on devices like computers and…

Online Tracking: What Do You Need to Know?

  You can leave a record of whatever you click on the Internet whenever you browse the Internet, as well as any websites you visit. The majority of websites use small pieces of data known as cookies to track information…

Challenges With Software Supply Chain & CNAPP

In 2021, sales of CNAPP exceeded $1.7 billion, an increase of roughly 49% over 2020, according to a recent Frost & Sullivan analysis. According to Frost & Sullivan, CNAPP revenue growth will average over 26% annually between 2021 and 2026.…

2023: The Year of AI? A Closer Look at AI Trends

  Threats to cyberspace are constantly changing. As a result, businesses rely on cutting-edge tools to respond to risks and, even better, prevent them from happening in the first place. The top five cybersecurity trends from last year were previously…

How to Avoid Cyberattacks on Your Home Network

  As remote working can offer employees several benefits, it also poses the possibility of creating the additional threat of cyber-attacks in the future because employees work outside of their company’s internal network.   There is also the possibility that if…

Canadian Telecom Provider Telus is Reportedly Breached

  One of Canada’s biggest telecommunications companies, Telus, is allegedly investigating a system breach believed to be fairly severe when malicious actors exposed samples of what they claimed to be private corporate information online. As per sources, the malicious actors…

Warnings About Scams, Tips for Avoiding Them

  There have been several frauds and scams that have been presented on various platforms daily and the Ontario Provincial Police (OPP) and the Canadian Anti-Fraud Centre (CAFC) continue to promote awareness to reduce the incidents of community members being…

Top Cybersecurity Trends to Watch Out in 2023

  The most recent research from Malwarebytes, which examines the situation of malware in 2023, has just been published. The research includes information on current significant security advancements, 5 cyber threat archetypes to watch out for this year, the most…

DDoS Attacks: Becoming More Powerful & Shorter in Duration

  Microsoft says that it witnessed distributed denial-of-service attacks turn shorter in duration in 2022 while also becoming more effective and capable of greater impact. As per Microsoft’s DDoS trends report for 2022, the United States, India, and East Asia…

Dark Web Malware Steals Your Data

  As the dark web seeks new customers and victims, it appears that updated versions of information-stealing malware have made their way onto it and are now circulating the dark web.  There have been reports from cybersecurity researchers from SEKOIA…

Crucial US military Emails was Publicly Available

A US Department of Defense exposed a server that was leaking private internal military emails online Security researcher Anurag Sen discovered the unprotected server, which was “hosted on Microsoft’s Azure federal cloud for Department of Defense customers,” according to a…

Researchers Develop AI Cyber Defender to Tackle Cyber Actors

A recently developed deep reinforcement learning (DRL)-based artificial intelligence (AI) system can respond to attackers in a simulated environment and stop 95% of cyberattacks before they get more serious.  The aforementioned findings were made by researchers from the Department of…

How Does Modern Software Work?

  It is encouraging to see a thriving community within the cybersecurity industry clamoring to share experiences as conference season approaches. As a result of the call-for-speakers process, attendees can get a pretty clear idea of what’s on the minds…

Remember to Clear the Cache on Your iPhone

Websites and apps may load more quickly by taking advantage of the cache, a designated area in your iPhone that stores temporary data. As cache data use up space on your phone, it’s a good idea to wipe it off…

How Can Developers Win the Data Security Battle?

  In IT organizations, chief information officers (CIOs) rank security as their top challenge as being one of their biggest weaknesses. It is estimated that 82% of companies are vulnerable to cyber threats in their own software supply chains.  Because…

Managing Privileges is Essential Security Strategy

In order to stop increasingly sophisticated hacker assaults, having a system that regulates privileged access is crucial. Therefore, one must integrate privilege removal into their cyber strategy to ensure secure protection without loopholes. Privileged access: What Is It? Privileged access…

How to Spot New Risks Via Suspicious Activities?

  Unknown malware poses a significant cybersecurity risk and can cause significant harm to both organizations and individuals. Malicious code can gain access to confidential information, corrupt data, and allow attackers to take control of systems if it goes undetected. …

What Makes Helsinki the Mobile Gaming Capital?

  While some of the world’s most ambitious and successful game makers reside on the streets of this relatively quiet northern European capital, they are often covered with snow. This gives them a comfortable environment to thrive.  Finland was the…

Introducing Stealc, a New Infostealer

Stealc, a new data stealer that has emerged on the dark web, is gaining popularity largely to heavy marketing of its theft capability and resemblances to related viruses like Vidar, Raccoon, Mars, and Redline. Researchers at SEKOIA.IO in January 2023 came…

Video Calling Apps Target Children

  Eden Kamar, a Ph.D. student in cybersecurity at the Hebrew University of Jerusalem, and Dr. C. Jordan Howell, a cybercrime specialist at the University of South Florida, collaborated to highlight the various methods that pedophiles prey on young children…

The Initial Indications of a Cyberattack on the Dark Web

  According to research, organizations were subjected to 38% more cyberattack attempts last year than in 2021. While some industry sectors performed better than others (education and research topped the table with 43 percent more attempted attacks, while hardware vendors…

Zero-Knowledge Encryption Might Protect User Rights

  Web3 is an evaluation of the internet that moves past a centralized structure and tries to connect data in a decentralized way in order to offer a speedy and individualized user experience. This version of the internet is sometimes…

Using ChatGPT by Employees Poses Some Risks

  As of November, when ChatGPT became available for general use, employers have been asking questions regarding its use cases for more than two months. As part of this process, it is necessary to determine how the tool should be…

What Can Consumers Do to Protect Their Data?

  There is a growing concern in Australia that the threat of cybercrime is not just increasing but exploding like crazy at a rapid rate. Recent data from the Australian Competition and Consumer Commission (ACCC) shows that from January to…

Small Businesses are Vulnerable to Cyberattacks

Small firms usually lack cybersecurity measures that larger organizations do, making them appealing targets for fraudsters.   According to a new Vodafone Business research, 54% of UK Businesses have recently been the victim of a cyber-attack of some kind. In a…

Utilizing an Integrated Approach for Application Security

Among every industry and organizations, application security has emerged as a progressively complex and challenging issue. Over the past few years, the rapid innovation in this field has resulted in the increase of attack surfaces, significantly where firms have shifted…

Think Twice Before Using Pirated Software

  Everyone has at some point in their lives dabbled in the realm of pirated software. Getting free software appeals to a wide range of users, most of whom are unaware of the risks involved. Many customers choose to install…

Massive DDoS Attack was Thwarted by Cloudflare

  Prioritized firms like gaming providers, hosting providers, cloud computing platforms, and cryptocurrency enterprises, according to Cloudflare, emanated from more than 30,000 IP addresses. The greatest volumetric distributed denial-of-service (DDoS) attack that Cloudflare has seen to date was stopped. The…

Data Theft Feature Added by Russian Nodaria APT

An updated piece of information-stealing malware is being used against targets in Ukraine by the Nodaria spy organization, also known as UAC-0056. The malware was created in Go and is intended to gather a variety of data from the infected…

Google Bard: How to use this AI Chatbot Service?

  Google Bard is a new chatbot tool developed in response to competitor artificial intelligence (AI) tools such as ChatGPT. It is intended to simulate human conversations and employs a combination of natural language processing and machine learning to provide…

Globally, Over 4 Million Shopify Users Are at Risk

  In a report published on Friday by CloudSEK’s BeVigil, a security search engine for mobile apps, it has been found that over four million users of e-commerce apps around the world are exposed to the risk of hardcoded Shopify…

The Cloud Shared Responsibility Model: An Overview

  Control over security is mostly at the purview of internal teams when an organisation manages its own on-premise data centres. They are in charge of maintaining the security of both the data stored on servers and the servers themselves. …

Cryptocurrencies Industry is Impacted by AI and ML

Artificial intelligence (AI) and Machine Learning is a fast expanding technology with the power to completely alter how we operate and live. Blockchain technology, a decentralized digital ledger system, is also thought to form the foundation of other upcoming technologies.…

How Blockchains Can Prevent Data Breaches?

  Today, data breaches have become all too common. Based on the Varonis 2021 Data Risk Report, most businesses have poor cybersecurity practices and unprotected data, putting them at risk for cyberattacks and data loss. Mitigating risks is no longer…

Avoid Accidentally Sharing Your Location

  There is no doubt that the devices and apps on your phone want to know where you are-whether to give you the latest weather updates, make suggestions for restaurants that you might enjoy, or allow you to better target…

Ways Automobile Companies Collect Customer Data

Automobiles collect data on a variety of aspects, including your identity, travel history, driving style, and more. The utilization of this information, according to automakers, will improve driving efficiency and driver and vehicle safety. However, without rules or regulations regulating…

Think Twice Before Using Pirated Software

  Everyone has at some point in their lives dabbled in the realm of pirated software. Getting free software appeals to a wide range of users, most of whom are unaware of the risks involved. Many customers choose to install…

Consenting to Cookies is Not Sufficient

  While most companies are spending a great deal of their time implementing cookie consent notices, it is becoming increasingly evident that the number and size of developments and lawsuits relating to privacy are on the rise. As a result,…

Data Theft Feature Added by Russian Nodaria APT

An updated piece of information-stealing malware is being used against targets in Ukraine by the Nodaria spy organization, also known as UAC-0056. The malware was created in Go and is intended to gather a variety of data from the infected…

An Exploit on Reddit Shows MFA’s Limitations

  It is becoming increasingly obvious that attackers are finding ways to circumvent multifactor authentication mechanisms as a result of the latest hack of a well-known company.  A threat actor sent out an email containing a link as part of…

How Would You Deal with the Inevitable Breaches of 2023?

Large-scale breaches are inevitable in 2023 as a result of cyber criminals speeding up their attacks against businesses today. In the past two months, T-Mobile, LastPass, and the Virginia Commonwealth University Health System have all faced a number of severe…

Cybercrime Utilizes Screenshotter to Find Targets in US

Organizations in Germany and the United States are targets of a new threat actor identified as TA886 that requires new, proprietary malware to spy on users and steal their data from affected devices. Proofpoint reported that it initially identified the…

Can Twitter Fix its Bot Crisis with an API Paywall?

  A newly updated Twitter policy relating to the application programming interface (API) has just been implemented, according to researchers – and the changes will have a profound impact on social media bots, both positive (RSS integration, for example) and…