Category: CySecurity News – Latest Information Security and Hacking Incidents

Predictive AI: What Do We Need to Understand?

We all are no strangers to artificial intelligence (AI) expanding over our lives, but Predictive AI stands out as uncharted waters. What exactly fuels its predictive prowess, and how does it operate? Let’s take a detailed exploration of Predictive AI,…

Emphasizing Post-Breach Strategies in Cybersecurity

  Cybersecurity discourse heavily emphasizes prevention, yet often neglects post-breach strategies. While we invest significant effort in establishing protocols to avert attacks, breaches remain an unavoidable reality. The “IBM Cyber Security Intelligence Index” report highlights human error as a leading…

Dell Data Breach Exposes Personal Information Of 49 Million

  Dell, the renowned computer manufacturer, has issued a cautionary notice to its customers regarding a disconcerting data breach. The breach, which affects an estimated 49 million customers, involves unauthorised access to an online portal containing sensitive customer information. Dell…

Microsoft Introduces Innovative AI Model for Intelligence Analysis

  Microsoft has introduced a cutting-edge artificial intelligence (AI) model tailored specifically for the US intelligence community, marking a leap forward in secure intelligence analysis. This state-of-the-art AI model operates entirely offline, mitigating the risks associated with internet connectivity and…

Why Active Directory Is A Big Deal?

  In a cutting-edge study by XM Cyber and the Cyentia Institute, a comprehensive analysis has unveiled a startling reality: a staggering 80% of cybersecurity vulnerabilities within organisations stem from issues related to Active Directory. This might sound like tech…

Malware Lurking in Minecraft Source Packs

In the world of gaming, customization is king. Players love tweaking their favourite games to make them even more exciting. But while mods and customizations can enhance your gaming experience, they can also hide dangerous threats. A new version of…

US Authorities Charge LockBit Ransomware Ringleader

  US officials have uncovered and indicted the ringleader of LockBit, a widespread ransomware operation that has extorted victims out of half a billion dollars. He is facing over two dozen criminal charges.  According to a 26-count indictment released on…

Microsoft to Enforce Executive Accountability for Cybersecurity

  Microsoft is undergoing organizational adjustments to enhance cybersecurity measures throughout its products and services, focusing on holding senior leadership directly responsible. Charlie Bell, Microsoft’s executive vice president of security, outlined these changes in a recent blog post aimed at…

Chinese Attackers Deployed Backdoor Quintet to Down MITRE

  China-linked hackers used a variety of backdoors and Web shells to compromise the MITRE Corporation late last year.  Last month, it was revealed that MITRE, widely known for its Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework, had been…

MITRE Links Recent Attack to China-Associated UNC5221

  MITRE recently provided further insight into the recent cyber intrusion, shedding light on the new malicious software employed and a timeline detailing the attacker’s actions. In April 2024, MITRE announced a breach in one of its research and prototyping…

New Attack Renders Most VPN Apps Vulnerable

  A new attack, dubbed TunnelVision, has materialised as a threat to the security of virtual private network (VPN) applications, potentially compromising their ability to protect user data. Researchers have detected vulnerabilities affecting nearly all VPN apps, which could allow…

ATM Card Trap Scam: How to Stay Safe

ATMs have become an integral part of our lives. They provide convenient access to cash and banking services. However, criminals are always finding new ways to exploit technology for their gain. One such deceptive scheme is the ATM card trap…

Scammers Targeting WhatsApp Groups in UK

  When businessman Mohammed Yousaf received an urgent plea for assistance from one of his oldest friends, he rushed to the rescue. The 56-year-old received a WhatsApp message from the account of a man he had been friends with for…

Are The New AI PCs Worth The Hype?

  In recent years, the realm of computing has witnessed a remarkable transformation with the rise of AI-powered PCs. These cutting-edge machines are not just your ordinary computers; they are equipped with advanced artificial intelligence capabilities that are revolutionizing the…

Here’s Why You Shouldn’t Trust VPNs Blindly

  In an era where we should be gravely concerned about online privacy and security, Virtual Private Networks (VPNs) have come through as indispensable tools for safeguarding digital identities. However, amidst the buzz of VPN advertisements promising invincibility against cyber…

Backdoor Malware: Iranian Hackers Disguised as Journalists

Crafting convincing personas APT42, an Iranian state-backed threat actor, uses social engineering attacks, including posing as journalists, to access corporate networks and cloud environments in Western and Middle Eastern targets. Mandiant initially discovered APT42 in September 2022, reporting that the…

Are Big Tech Companies Getting Rich from AI?

  Big Tech companies like Amazon, Microsoft, and Alphabet have showcased impressive earnings, with a substantial boost from their advancements in artificial intelligence (AI) technology. Amazon’s quarterly report revealed a 13% increase in net sales, primarily attributed to its AWS…

Data of Domestic Violence Victims Leaked in ZircoDATA Hack

  Monash Health, a Victorian public health agency, has announced that it had been impacted by the recent ZircoDATA hack.  Earlier this year in February, ZircoDATA, which provides safe document storage, data management, and digital conversion of 9,000 clients across…

New Cuttlefish Malware Hijacks Router Connections, Cloud Data Stolen

  In the ever-evolving landscape of cybersecurity threats, a new menace has emerged: Cuttlefish. This sophisticated malware targets enterprise-grade and small office/home office (SOHO) routers, posing a significant risk to both businesses and individual users alike.  Discovered by Lumen Technologies’…

Hackers are Targeting Routers Across the Globe

  When hackers identify an unsecured router, they penetrate it by installing malware that provides them persistence, the ability to launch distributed denial of service (DDoS) assaults, hide malicious data, and more. But what happens when the hackers discover a…

CISA Ask Companies to Fix Path Traversal Vulnerabilities

CISA and FBI urge companies to take patch actions  CISA and the FBI recommended software companies today to assess their products and fix route traversal security flaws before selling. Attackers can leverage path traversal vulnerabilities (also known as directory traversal)…

Insect Farmers Embrace AI to Drive Down Production Costs

  The insect farming industry, previously thought of as an industry that was in desperate need of development, has rapidly gained popularity as a practical and sustainable solution to the severe worldwide challenges of food safety, environmental degradation, and aid…

DropBox E-Signature Breach Exposes Customer Data

  DropBox has announced a breach in its DropBox Sign eSignature platform, formerly known as HelloSign. The breach, uncovered on April 24, has left customer data vulnerable, including authentication tokens, MFA keys, hashed passwords, and personal information. The breach was…

Sweden Faces Influx of DDoS Attacks Following NATO Membership

  A significant uptick in distributed denial of service (DDoS) attacks has plagued Sweden as the nation navigates its path towards joining NATO, reports network performance management provider Netscout. The onslaught commenced notably in May 2023, following a colossal 500…

Google’s Med-Gemini: Advancing AI in Healthcare

On Tuesday, Google unveiled a new line of artificial intelligence (AI) models geared toward the medical industry. Although the tech giant has issued a pre-print version of its research paper that illustrates the capabilities and methodology of these AI models,…

AI vs Human Intelligence: Who Is Leading The Pack?

  Artificial intelligence (AI) has surged into nearly every facet of our lives, from diagnosing diseases to deciphering ancient texts. Yet, for all its prowess, AI still falls short when compared to the complexity of the human mind. Scientists are…

Hackers Claim Biggest Attack On UAE in History

The United Arab Emirates government was the target of a significant data breach attack that has the cybersecurity industry on edge. The attacker, who goes by the username “UAE,” has not been recognized. Unless a ransom of 150 bitcoins (about…

Cyber Criminal Sentenced for Targeting Therapy Patients

In a recent legal case that has shaken Finland, cyber offender Julius Kivimäki, known online as Zeekill, has been sentenced to six years and three months behind bars for his involvement in a sophisticated cybercrime operation. The case revolves around…

Apple Working to Patch Alarming iPhone Issue

  Apple claims to be working rapidly to resolve an issue that resulted in some iPhone alarms not setting off, allowing its sleeping users to have an unexpected lie-in.  Many people rely on their phones as alarm clocks, and some…

Safeguarding Your Employee Data From Identity Theft

  In today’s digital age, where data breaches and cyberattacks are increasingly common, safeguarding against identity-based attacks has become paramount for organizations worldwide. Identity-based attacks, which involve the unauthorized access to sensitive information through compromised user credentials, pose significant risks…

North Korean Scammers Lure Developers with Fake Job Offers

A new cyber scam, dubbed “Dev Popper,” is preying on software developers through fake job interviews. This elaborate ruse, masquerading as genuine employment opportunities, aims to infiltrate the victim’s computer with a harmful Python backdoor, posing serious cyber threats. How…

Quantum Technology: Implications for Digital Security

  In our modern, highly connected world, where online transactions are everywhere, the looming presence of quantum computing casts a momentous shadow. Unlike classical computers, which rely on bits to process information, quantum computers leverage the peculiar properties of quantum…

Ransomware Strikes St-Jerome Company: Everest Group Suspected

  Les Miroirs St-Antoine Inc., a longstanding company in the St-Jérôme region, is grappling with the aftermath of an alleged ransomware attack orchestrated by the infamous Everest Group. Founded in 1956, Les Miroirs St-Antoine specializes in glazing and aluminum products…

Qlik Sense Servers Prone To Cactus Ransomware Threats

  Security experts are urgently warning about the vulnerability of thousands of Qlik Sense servers to potential ransomware attacks by the troubling Cactus group. Despite prior disclosures of vulnerabilities by Qlik, many organisations remain at risk due to unpatched systems.…

Defense-in-Depth: A Layered Approach for Modern Cybersecurity

  The cybersecurity landscape has shifted dramatically in recent years. Malware, phishing attempts, and data breaches have grown in frequency and scope, prompting organisations to invest more time and money into enhancing their cybersecurity strategies. Organisations should be aware of…

Why Shouldn’t You Upload Files So Readily On Your Browser?

The digital society we live in has made it abundantly clear that being cautious about online activities goes beyond avoiding suspicious links. Recent findings by cybersecurity researchers have surfaced a new ransomware threat that exploits web browsers, potentially putting users’…

Cactus Ransomware Exposes Thousands of Vulnerable Qlik Sense Servers

  Many organizations remain dangerously vulnerable to the Cactus ransomware group, despite security researchers warning of the threat five months ago. The Cactus ransomware group exploits three vulnerabilities in QlikSense’s data analytics and business intelligence platform. Two vulnerabilities were released…

5 Attack Trends Your Company Should Be Aware Of

Cybersecurity is always evolving and demands ongoing awareness Every day, Microsoft analyzes over 78 trillion security signals to gain a deeper understanding of the current threat pathways and methodologies. Since last year, we’ve seen a shift in how threat actors…

North Korean Hackers Exploit LinkedIn in Targeted Attacks

  The North Korean hacker group Lazarus has once again made headlines, this time for exploiting LinkedIn in their cyber operations. According to a report by blockchain security analytics firm SlowMist, Lazarus hackers are leveraging the professional networking platform to…