Category: CySecurity News – Latest Information Security and Hacking Incidents

Ransomware Attackers Are Weaponizing PHP Flaw to Infect Web Servers

  Security researchers revealed that ransomware attackers have swiftly turned a simple-to-exploit PHP programming language vulnerability—which allows malicious code to be executed on web servers—into a weapon.  As of Thursday last week, Censys’ Internet scans had found 1,000 servers infected…

Identity Verification Becomes Crucial in the Digital Age

  In the rapidly changing digital landscape, identity verification is emerging as a critical concern. As Web3 places increasing emphasis on data ownership and trust, authenticating one’s identity is becoming a major challenge. Recently, Roundtable anchor Rob Nelson and Ralf…

Researchers Find ChatGPT’s Latest Bot Behaves Like Humans

  A team led by Matthew Jackson, the William D. Eberle Professor of Economics in the Stanford School of Humanities and Sciences, used psychology and behavioural economics tools to characterise the personality and behaviour of ChatGPT’s popular AI-driven bots in…

New Malware Campaign Exploits Windows Search to Spread

  A new and intricate alware campaign has been discovered by Trustwave SpiderLabs, leveraging the Windows search feature embedded in HTML code to spread malicious software. The attack begins with a phishing email containing an HTML attachment disguised as a…

Data in Danger: Analyzing the Alleged Data Broker Breach

The protection of personal data is of utmost importance. A recent report has brought to public attention an alleged significant data breach involving a U.S. data broker. This incident, which purportedly affects billions of records and over 300 million people,…

STR RAT: A Persistent Remote Access Trojan

  The STR RAT is a remote access trojan (RAT) written in Java, first detected in 2020. Like other RATs, it allows threat actors full control of an infected machine. STR RAT is capable of keylogging, credential theft, and deploying…

Apple Introduces Exclusive AI Features for Newest Devices

  Apple’s WWDC 2023 brought exciting news for tech enthusiasts: the introduction of Apple Intelligence, a groundbreaking AI system. However, if you’re eager to try out these new features, you’ll need the latest devices. Apple Intelligence features will be exclusively…

Securing a Dynamic World: The Future of Cybersecurity Operations

Cybersecurity has become a critical concern for organizations worldwide. As threats evolve and technology advances, the role of cybersecurity operations is undergoing significant transformation. Let’s delve into the key aspects of this evolution.  Today’s changing cyber threat landscape presents a…

Ransomware Attackers Target Canada’s Largest School Board

  The Toronto District School Board (TDSB) has issued a warning following a ransomware attack on its software testing environment and is currently investigating whether any personal data was compromised.  TDSB is Canada’s largest school board and the fourth largest…

AI vs. Developers: A Modern-Day Conundrum

  According to many experts, large language models and artificial intelligence are dramatically simplifying the process of creating quality software, and this is a perspective that is being touted a lot. It has even been predicted that this trend could…

Here’s How to Solve Top Challenges in Data Storage

  Data volumes are not only expanding, but also accelerating and diversifying. According to recent IDG research, data professionals state that data volumes are rising by 63 percent every month on average in their organisations. The majority of these organisations…

Tech Giants Aid Rural Hospitals in Cybersecurity Battle

  Microsoft and Google have announced initiatives to offer free or discounted cybersecurity services to rural hospitals across the United States, aiming to reduce their vulnerability to cyberattacks that have disrupted patient care and threatened lives, according to a joint…

AI Brings A New Era of Cyber Threats – Are We Ready?

  Cyberattacks are becoming alarmingly frequent, with a new attack occurring approximately every 39 seconds. These attacks, ranging from phishing schemes to ransomware, have devastating impacts on businesses worldwide. The cost of cybercrime is projected to hit $9.5 trillion in…

Enhancing Home Security with Advanced Technology

  With global tensions on the rise, ensuring your home security system is up to par is a wise decision. Advances in science and technology have provided a variety of effective options, with even more innovations on the horizon. Smart…

New Extortion Scheme Targets GitHub Repositories

  A new wave of cyberattacks is targeting GitHub repositories, wiping their contents, and demanding ransom from victims. This alarming campaign, first identified on Wednesday by Germán Fernández, a security researcher at Chilean cybersecurity firm CronUp, is being orchestrated by…

Microsoft Revises AI Feature After Privacy Concerns

  Microsoft is making changes to a controversial feature announced for its new range of AI-powered PCs after it was flagged as a potential “privacy nightmare.” The “Recall” feature for Copilot+ was initially introduced as a way to enhance user…

New macOS Malware Threat: What Apple Users Need to Know

  Recently, the Moonlock Lab cybersecurity team discovered a macOS malware strain that can easily evade detection, posing a significant threat to users’ data privacy and security. The infection chain for this malware begins when a Mac user visits a…

Newfoundland TV Station Hit by Ransomware Attack

  ST. JOHN’S – The Newfoundland Broadcasting Company Limited, owner of a popular independent TV station in Newfoundland and Labrador, has been targeted by a ransomware attack. Attack Details and Immediate Impact The cyberattack, claimed by the Play ransomware group,…

Not a Science Fiction: What NVIDIA CEO Thinks About AI

Jensen Huang, CEO of NVIDIA, highlighted the company’s robotics and industrial digitization advances at COMPUTEX 2024 in Taipei. Huang described how manufacturers like Foxconn use NVIDIA technology, such as Omniverse, Isaac, and Metropolis, to create advanced robotic facilities. “Robotics are…

Google Leak Reveals Concerning Privacy Practices

  An internal leak has revealed troubling privacy and security practices at Google, exposing substantial lapses over a span of six years. This revelation highlights the tech giant’s failure to prioritise user data protection, raising concerns about the company’s handling…

First American Reveals Impact of December Cyberattack

    The cyberattack that disrupted First American Financial’s systems in late December impacted 44,000 individuals, according to regulatory filings on Friday. In an 8K disclosure to the Securities and Exchange Commission (SEC), the title insurance company stated that its…

Strengthening Healthcare Cybersecurity: A Collaborative Imperative

  In recent years, cyberattacks have surged, putting every segment of the nation’s healthcare system—from hospitals and physician practices to payment processing companies and biomedical facilities—under stress. These attacks disrupt patient care and cost the industry billions. Erik Decker, Vice…

Bitcoin Heist Hits Japanese Exchange DMM Bitcoin

  In a security breach, Japanese cryptocurrency exchange DMM Bitcoin announced the theft of approximately 4,502.9 Bitcoin, valued at around 48.2 billion yen (approximately $304 million). The incident marks one of the largest cryptocurrency heists in recent history. The breach…

Global Resurgence of Grandoreiro Banking Trojan Hitting High

  The cybercriminal group behind the Grandoreiro banking trojan has re-emerged in a global campaign since March 2024, following a significant law enforcement takedown earlier this year. This large-scale phishing operation targets over 1,500 banks across more than 60 countries,…

RedTail Cryptominer Exploits Critical Zero-Day in PAN-OS

A new wave of cyberattacks has been reported, leveraging a critical zero-day vulnerability in Palo Alto Networks’ firewall software, PAN-OS. The flaw, identified as CVE-2024-3400 and assigned a maximum CVSS score of 10.0, enables unauthenticated attackers to execute arbitrary code…

From Text to Action: Chatbots in Their Stone Age

The stone age of AI Despite all the talk of generative AI disrupting the world, the technology has failed to significantly transform white-collar jobs. Workers are experimenting with chatbots for activities like email drafting, and businesses are doing numerous experiments,…

Santander Bank Faces Major Data Breach Affecting 30 Millions

In a significant cybersecurity incident, Spain’s largest bank, Santander, has confirmed a data breach involving unauthorized access to sensitive information. The breach, detected two weeks ago, was linked to a third-party provider’s database and impacted employees and customers in Chile,…

Meta to Train AI with Public Facebook and Instagram Posts

    Meta, the company behind Facebook and Instagram, is set to begin using public posts from European users to train its artificial intelligence (AI) systems starting June 26. This decision has sparked discussions about privacy and GDPR compliance. Utilising…

Ransomware Attacks in Healthcare: A Threat to Patient Safety

Ransomware attacks in Healthcare: A threat to patient safety A ransomware attack on a major U.S. hospital network has been endangering patients’ health. Nurses are forced to manually enter prescription information and work without electronic health records cyberattacks have become…

Shell Data Breach: Hacker Group 888 Claims Responsibility

  A hacker group known as 888 has claimed responsibility for a data breach targeting Shell, the British multinational oil and gas company. The breach, allegedly impacting around 80,000 individuals across multiple countries, has raised significant concerns about data security…

Why CVEs Reflect an Incentives Problem

  Two decades ago, economist Steven Levitt and New York Times reporter Stephen Dubner published “Freakonomics,” a book that applied economic principles to various social phenomena. They argued that understanding how people make decisions requires examining the incentives they respond…