Tag: Information Security Buzz

OpenAI To Proffer Solutions To Italy’s ChatGPT Ban

Regulators announced Thursday that the company behind ChatGPT would submit ways to address the data protection issues that prompted a temporary Italian ban on the artificial intelligence chatbot. This means that OpenAI to profer solutions to Italy’s ChatGPT ban. Last…

How HTTPS Works And Overview Of Its Components

In the modern world, technology has enabled people to connect and communicate virtually anywhere. With the internet being a critical part of our lives, we transmit and receive a vast amount of sensitive data daily, from banking information to personal…

YouTube Alerts About Phishing Emails that Appear Authentic

The authentic no-reply@youtube.com email address is being used in a new phishing scam that YouTube is investigating and alerting users to. The scam attempts to trick users into divulging their login information. One of the biggest video-sharing websites in the…

Marketplace 600K Records Leaked by Database Snafu

More than 600,000 records from a well-known online store have leaked due to a database bug. Concerns have been made about the security and privacy of users’ personal information in the wake of the incident brought on by a system…

OneNote Security Tightened By Microsoft To Block 120 File Extensions

After allegations that the note-taking service is being increasingly misused for malware transmission, Microsoft has revealed steps to automatically remove embedded files with “dangerous extensions” in OneNote security. Users were previously presented with a window warning them that opening specific…

Western Digital Reveals Network Breach, My Cloud Is Unavailable

Western Digital reported today that a compromise in its network allowed an unauthorized person access to several corporate systems. The network security vulnerability was discovered last Sunday, March 26, according to a press release from the California-based manufacturer of computer…

Summary Of News And Events That Happened This Week

Here is the rundown of news and events that happened this week in the world of cybersecurity. 14 Million Customer Details Breached In Latitude Financial Firm A significant security breach took the personal data of 14 million Australians and New…

Tor Browser: What Is It? And How It Can Aid In Identity Protection

Privacy and anonymity are increasingly becoming rare commodities in today’s digitally-driven world. With governments and corporations tracking our online activities, protecting our identity and online data has become imperative. One such action is using the Tor Browser without disclosing your…

FDA Sets New Medical Devices Cybersecurity Standards

Beginning on October 1, the Food and Drug Administration(FDA) will “refuse to accept” medical devices and associated systems due to cybersecurity concerns, according to a March 29 announcement from the agency. Beginning March 29, all new device submissions must have…

Supply Chain Attack By Hackers On 3CX Desktop App

The 3CX desktop app is being utilized with a digitally signed and trojanized version by an ongoing supply chain attack to target the customers of the business. 3CX is a software development company that specializes in VoIP IPBX, and its…

Barracuda Ransomware Report

38% of organisations hit with ransomware in 2022 were repeat victims Highlights: Barracuda Networks, Inc., a trusted partner and leading provider of cloud-first security solutions, today published its 2023 Ransomware Insights report, which shows that 73% of the organisations surveyed report…

Executive Order Limiting Usage Of Commercial Spyware Signed

On Monday, President Joe Biden of the United States issued an executive order restricting federal agencies’ use of commercial spyware. According to the order, the spyware ecosystem “poses serious security or counterintelligence threats to the United States Government or significant…

Pwn2Own Hacking Competition Awards Over $1 Million In Vancouver

Following the conclusion of Pwn2Own Vancouver 2023, competitors received $1,035,000 and a Tesla Model 3 for exploiting 27 zero-day vulnerabilities between March 22 and March 24. Security researchers targeted devices in the enterprise applications and communications, the local elevation of…

OpenAI: ChatGPT Payment Data Leak Caused By Open-Source Bug

A glitch in the open-source software of the widely-used language model, OpenAI’s ChatGPT payment, has led to a significant data leak. As per OpenAI’s confirmation, the bug resulted in ChatGPT payment inadvertently exposing its paid users’ payment details along with…

Rundown Of News And Events That Happened This Week

Here is the rundown of news and events that happened this week in the world of cybersecurity. FBI Detains Owner Of Notorious Cybercrime Forum, BreachForums BreachForums founder Conor Brian Fitzpatrick, 26, of New York, was arrested by the FBI. This…

GitHub Replaces Exposed RSA SSH Key To Keep Git Operations

After unintentionally publishing its private SSH key, GitHub.com rotated it. The software development and version control provider took action out of “an excess of caution” after the private RSA key was briefly exposed. GitHub acknowledged this week that a public…

WooCommerce Payments Plugin Patches Critical Vulnerability

Developers of the popular WooCommerce payments plugin recently identified a critical security flaw that could have affected over 500,000 WordPress sites. The plugin, developed by Automattic, offers a fully integrated payment solution for WooCommerce, making it a highly attractive target for cybercriminals…

City Of Toronto Admits Data Theft, Clop Takes Blame

The City of Toronto has acknowledged today that a third-party vendor did provide unlawful access to Municipal data in the City of Toronto. Access is only permitted for files that cannot be transferred securely to a third party. A city…

New Government Cyber Security Strategy Vital For Healthcare

The Senate Homeland Security Committee cleared legislation on March 30, 2022, aimed at enhancing the cyber readiness of the U.S. healthcare sector. The proposed “Healthcare Cybersecurity Act,” or S. 3904, calls for collaboration between the U.S.The agency responsible for cybersecurity…

BreachForums Admin Baphomet Closes The Hacking Forum

An important update came up where BreachForums has been officially taken down. Still, Baphomet, the current BreachForums administrator, stressed that “it’s not the end” in an abrupt change of events on March 21, 2023. Baphomet stated in a post on…

Ferrari Reveals Data Breach After Getting Ransom Demand

Ferrari, a luxury automaker, admitted a data leak after hackers demanded a ransom. The event occurred last month, and the company is cooperating with law police to investigate. The Italian automaker said in a statement that the breach only involved…

Mandiant Zero-Day Exploitation Report 2022

This report shares key findings from the Mandiant zero-day exploitation investigation of 2022. A zero-day vulnerability, according to Mandiant, is one that was used in the real world before a fix was made available. Focusing on zero-day exploits used by…

Royal Dirkzwager Attacked By Play Ransomware Group

The Play ransomware group’s campaign, the most recent in a succession of strikes on the shipping sector, was proven to have affected the Dutch marine transport company Royal Dirkzwager. The company’s CEO, Joan Blaas, who acquired it in October after…

FBI Detains Owner Of Notorious Cybercrime Forum, BreachForums

Conor Brian Fitzpatrick, a 26-year-old native of New York, has been detained by the Federal Bureau of Investigation (FBI) for running BreachForums. Hackers sell their stolen data and confidential information on this notorious cybercrime forum. Charges of computer crime, identity…

What Is Shoulder Surfing? How Does It Affect Cybersecurity

We rely primarily on technology to protect our sensitive data, including financial information, personal information, and corporate secrets, in the extremely digital world we live in today. Our personal and sensitive information is vulnerable to being obtained by evil people…

Healthcare Firm ILS Alerts 4.2 Million People Of Data Breach

A data breach at Independent Living Systems (ILS), a Miami-based supplier of healthcare administration and managed care solutions, exposed 4,226,508 people’s data. This year’s largest revealed healthcare data breach, according to the number of affected individuals. ILS owns and manages…

ChipMixer Crypto Mixer Shutdown By German & US Authorities

The European and U.S. authorities recently revealed that ChipMixer, a darknet cryptocurrency “mixing” service, had been taken down in a coordinated international operation. Between 2017 and till date, ChipMixer has been implicated in laundering more than $3 billion in cryptocurrencies for…

Microsoft Outlook Zero-Day Vulnerabilities Exposed

On Tuesday, Microsoft released a sizable number of software security updates and published advisories for two zero-day vulnerabilities that still threaten Windows OS users. The software giant from Redmond, Washington, released patches for at least 80 Windows problems and specifically…

Cybercriminals Devising More Tactics For Phishing Attacks

Cybercriminals are constantly improving their phishing attacks by implementing new strategies and techniques. In an effort to deceive victims, get around security controls, and stay undetected. Phishing is a form of social engineering assault that is frequently employed to obtain…

Future-Proofing Your Business Against Insider Threats

In today’s digital world, businesses face various cybersecurity threats, including malware, hacking, and phishing scams. Insider threats, unfortunately, are widely ignored. These threats could emerge from former or present staff members, professionals, or affiliates with access to sensitive company data.…

Two Young US Men Charged, Hacked Into DEA Portal In 2022

Prosecutors accused two young American men of breaking into a DEA portal in 2022 yesterday. Given that the portal was connected to the databases of 16 federal law enforcement organizations, the breach offered the criminals access to sensitive data. The…

Rubrik Admits Data Theft In GoAnywhere Zero-Day Attack

The secure file transfer platform Fortra GoAnywhere has a zero-day vulnerability that was used to steal data, according to cybersecurity company Rubrik. The company stated that it had been the target of a widespread attack employing a zero-day vulnerability targeting…

YoroTrooper Cyberspies Aims At EU Embassies, CIS Energy Orgs

Since June 2022, a new threat actor named “YoroTrooper” has been conducting cyberespionage operations against governments and energy companies in CIS nations. According to Cisco Talos, the World Intellectual Property Organization (WIPO), several European embassies, and a crucial European Union…

1 Million People Affected By Zoll Medical Data Breach

Zoll Medical, a medical technology developer, recently announced that it had suffered a data breach. The company said that the breach was detected at the end of January when it found some unusual activity on its internal network. After investigation,…

The Revolutionizing Power of AI In Cybersecurity

AI in cybersecurity positively affects the rapid evolution of technology, and the threat landscape for cyber-attacks has increased. Cybercriminals are developing increasingly complex attacks, making it increasingly difficult for businesses to keep up with their security measures. This is where…

AT&T Data Breach Hits Nine Million Customer Accounts

In the AT&T data breach, nine million user accounts were compromised after a third-party marketing partner was breached. As a result of the breach, customer data, including first names, account numbers, phone numbers, and email addresses, were exposed. Nonetheless, the…

Cyberthreat on New Email By Exotic Lily

Exotic Lily is known as PROJECTOR LIBRA and TA580, which is an initial access broker (IAB). Since its start, the threat actor has been well-known in the dark web due to its connections to Diavol and Conti, two ransomware outfits.…

GRC: The Ultimate Guide To Governance, Risk, And Compliance

Do you need help keeping up with governance, risk, and compliance (GRC) requirements? With the increasing regulatory demands, managing and mitigating risks and ensuring compliance can be difficult for any organization. But GRC is super important for keeping things ethical,…

Xenomorph Android Malware Steals Data From 400 Banks

A new automatic transfer system (ATS) framework and the capacity to steal login information for 400 banks are two of the main capabilities added to the Xenomorph Android virus in this new iteration. ThreatFabric found the initial iteration in February…

SoulSearcher Malware Released By Chinese Sharp Panda Group

Sharp Panda’s new “SoulSearcher” malware framework is targeting high-profile government agencies in Vietnam, Thailand, and Indonesia. Chinese APTs used the virus to spy on vital Southeast Asian organizations. Check Point found a spear-phishing-based malware campaign that started in late 2022…

Police Seize Netwire RAT Malware Framework, Detains Admin

After seizing the website and bringing down the infrastructure used by criminals connected to the NetWire remote access malware, international law enforcement authorities have declared another triumph over cybercriminals (RAT). A guy who allegedly ran the worldwiredlabs website, which has…

New Rise In ChatGPT Scams Reported By Fraudsters

Since the release of ChatGPT, the cybersecurity company Darktrace has issued a warning, claiming that a rise in criminals utilizing artificial intelligence to craft more intricate schemes to defraud employees and hack into organizations has been observed. The Cambridge-based corporation…

What TikTok’s Data Decision Means For Cybersecurity

TikTok has become one of the world’s most popular social media platforms in recent years. However, TikTok’s data collection policies have been scrutinized, especially regarding cybersecurity. Following pressure from European governments, TikTok recently announced a data security regime for protecting…

The US RESTRICT Act Gains More Support From Lawmakers

The RESTRICT Act has gained more support from lawmakers as concerns over the security implications of foreign technology continue to increase. The legislation aims to strengthen the US government’s ability to identify and act against potential threats from foreign technology,…

There’s A RAT In mi Note, What Am I Gonna Do?

Cybercriminals use Microsoft OneNote attachments in phishing emails to spread malware and password stealers. Phishing campaigns are one of the most typical ways criminals obtain private or sensitive information. According to Verizon Data Breach Investigations Report, 94% of the malware…

Steps To Planning And Implementation Of Application Security

Securing your application is of utmost importance in today’s world, where cybercrime is becoming more prevalent. Application security is a critical component of software development that helps to protect against various cyber threats and attacks. Most organizations spend a lot…

Steps To Planning And Implementation Of Cloud Security

Cloud security is essential to many businesses, offering numerous benefits, including scalability, flexibility, and cost savings. However, cloud computing also brings unique security challenges that must be addressed to protect sensitive data and ensure business continuity. The key to a…

Application Security Capability Guide

In an era where enterprises are overwhelmingly dependent on digital technologies, the significance of application security has become an indispensable constituent of every organization’s security stance. It is particularly undeniable, given the flagrant endeavors of malevolent cyber malefactors who relentlessly…

Acer’s Sensitive Data Allegedly For Sale On A Hacker Forum

Taiwan-based computer hardware and electronics company Acer is facing another potential data breach as a threat actor claimed to have posted the company’s sensitive data for sale on a popular hacking forum. According to reports, the data allegedly contains confidential…

Cloud Security Capability Guide

The advent of cloud computing has greatly improved data management. The cloud allows companies of all sizes to centrally and conveniently store, manage, and access their data from any internet-connected device. However, as the use of cloud computing continues to…

An Essential Guide To Threat Modeling Cloud Platform

Threat modeling is a proactive method for locating the points of entry on a system’s attack surface, listing the threats, and putting security measures in place. Its main objective is to guard against security lapses. An illustration of a system’s…

Law Enforcement Triumphs DoppelPaymer Ransomware Gang

With assistance from Europol, the Dutch Police (Politie), the United States Federal Bureau of Investigations, and the German Regional Police (Landeskriminalamt Nordrhein-Westfalen), the DoppelPaymer ransomware was used on February 28 to target suspected core members of the criminal organization thought…

TPM 2.0 Library Flaws May Affect Billions Of IoT Devices

Two buffer overflow flaws in the Trusted Platform Module (TPM) 2.0 specification could let attackers access or replace sensitive data, like cryptographic keys. TPM is a hardware-based solution that offers tamper-resistant operating systems and secure cryptographic services. It can be…

WH Smith: Employee Data Compromised In Cyberattack

WH Smith reports a cyberattack and claims that employee data was accessed. Attackers were able to obtain the company’s data during a cybersecurity breach, according to WH Smith, which was the target of the intrusion. The store reported that information…

BlackLotus: UEFI Bootkit Bypass Secure Boot On Windows 11

Researchers from the cybersecurity company ESET in Slovakia have discovered that a UEFI bootkit known as BlackLotus is capable of getting beyond UEFI Secure Boot, a crucial platform security feature. The researchers discovered that BlackLotus makes use of an outdated…

Chick-fil-A Admits Accounts Hacked In “Automated” Attack

Chick-fil-A, an American fast food company, has acknowledged that consumers’ accounts were compromised in a months-long credential stuffing assault, giving threat actors access to personal data and the ability to use saved reward balances. Chick-fil-A started looking into what it…

White House Institutes National Cybersecurity Strategy

On Thursday, the White House instituted its National Cyber Strategy, which serves as a roadmap for how the Biden administration plans to protect the United States from dangers online. The strategy would transfer responsibility for cybersecurity from people and small…

Trezor Wallet Alerts Of Major Crypto Phishing Campaign

Trezor wallet is involved in an ongoing phishing attack that attempts to steal a target’s cryptocurrency wallet and assets by impersonating Trezor data breach alerts. Trezor is a cryptocurrency wallet that allows users to keep their cryptocurrency offline as opposed…

Google: Client-Side Encryption Added To Gmail And Calendar

After testing the functionality in late 2022, Google has now made client-side encryption (CSE) for Gmail and Calendar generally available. According to Google’s Ganesh Chilakapati and Andy Wen, the data privacy restrictions allow “even more businesses to take charge of…

London Honeypots Being Attacked 2000 Times Per Minute

Following the discovery of 91 million threats over the course of 28 days in January, security experts have warned that remote employees in the capital of the UK are under constant cyberattacks. In order to determine the extent of cyber-threat…