Category: CySecurity News – Latest Information Security and Hacking Incidents

ERP Firm Data Breach Exposes Over 750 Million Records

  A leading Enterprise Resource Planning (ERP) company based in Mexico inadvertently left an unsecured database online, exposing sensitive information on hundreds of thousands of users. This was discovered by cybersecurity researcher Jeremiah Fowler, who reported his findings to Website…

AI’s Rapid Code Development Outpaces Security Efforts

  As artificial intelligence (AI) advances, it accelerates code development at a pace that cybersecurity teams struggle to match. A recent survey by Seemplicity, which included 300 US cybersecurity professionals, highlights this growing concern. The survey delves into key topics…

LangChain Gen AI Under Scrutiny Experts Discover Significant Flaws

  Two vulnerabilities have been identified by Palo Alto Networks researchers (CVE-2023-46229 and CVE-2023-44467) that exist in LangChain, an open-source computing framework for generative artificial intelligence that is available on GitHub. The vulnerabilities that affect various products are CVE-2023-46229. It…

LA County Superior Court Hit by Ransomware Attack

  The Superior Court of Los Angeles County experienced a notable disruption early on July 19 when a ransomware attack forced the court to disable its network systems. This prompt action was taken to prevent any additional damage from occurring.…

AI Surveillance at Paris Olympics Raise Privacy Concerns

  French authorities’ plans to employ artificial intelligence to scan the thousands of athletes, coaches and spectators descending on Paris for the Olympics is a form of creeping surveillance, rights groups said.  In recent months, authorities have tested artificial intelligence…

IRS Warns Car Dealers of New Phishing and Smishing Threats

  The Internal Revenue Service (IRS) has issued an urgent warning to car dealers and sellers across the United States, highlighting a surge in sophisticated phishing and smishing scams targeting the automotive industry. These cyber threats pose a significant risk…

Quantum Navigation as the Successor to GPS

  The cause of the recent flight cancellations by Finnair planes flying into Estonia did not have anything to do with mechanical failures or bad weather the cause was the GPS signal not being received by the aircraft. To prevent…

Why Passkeys Are the Future of Digital Authentication

  Passwords have been a fundamental aspect of digital security for years, but they come with significant drawbacks. They are not only a hassle to remember but also vulnerable to various hacking techniques. Passkeys have emerged as a robust alternative,…

HUMAN Team Shuts Down Major Mobile Ad Fraud Scheme

  In a major development, the HUMAN Satori Threat Intelligence and Research Team has successfully dismantled a vast mobile advertising fraud operation known as “Konfety.” This scheme, which generated billions of fake ad requests each day, was designed to deceive…

New EDR Bypass Tool Advertised by FIN7 Hacking Group

  SentinelOne researchers warn that the financially motivated group FIN7 is utilising various pseudonyms to promote a security evasion tool on several criminal underground forums. FIN7 created a tool called AvNeutralizer (also known as AuKill) that can circumvent safety measures.…

Cyberattack Exposes Patient Data in Leicestershire

  A recent cyberattack has compromised sensitive patient data in Leicestershire, affecting several healthcare practices across the region. The breach, which targeted electronic patient records, has led to significant concerns over privacy and the potential misuse of personal information. Those…

Activist Hacking Group Claims Leak of Disney’s Internal Data

  An activist hacking group has alleged that it leaked a substantial amount of Disney’s internal communications, including details about unreleased projects, raw images, computer code, and some login credentials. The group, known as Nullbulge, has claimed responsibility for the…

The Role of IoT in Modern Infrastructure

Imagine if someone told you in the early 2000s that entire industries would run almost by themselves, thanks to a network of connected devices. Today, this is no longer science fiction but our reality, thanks to the Internet of Things…

How to Protect Your Online Accounts from Hackers

  Hackers are increasingly targeting individuals to steal cryptocurrency, access bank accounts, or engage in stalking. Although these attacks are relatively rare, it’s crucial to know how to protect yourself if you suspect someone has accessed your email or social…

3 Billion Attacks and Counting: The IDF’s Cyber Resilience

The Battlefield: Cloud Computing Cloud computing has become an integral part of modern military operations. The IDF relies heavily on cloud-based systems from troop management to logistics, communication, and intelligence gathering. These systems allow for flexibility, scalability, and efficient resource…

Are We Ready for the Next Wave of Cyber Threats?

In our increasingly digital world, cybersecurity is a growing concern for everyone— from businesses and governments to everyday individuals. As technology advances, it opens up exciting possibilities and creates new, sophisticated cyber threats. Recent high-profile attacks, like those on Ascension…

New Hacking Method: Akami DNS Data Exfiltration

  When it comes to cybercrime, getting into a system is only half the battle; the real challenge is extracting the stolen data without being detected. Companies often focus on preventing unauthorised access, but they must also ensure that data…

Raman Research Institute’s Breakthrough in Quantum Cybersecurity

  Scientists at the Raman Research Institute have achieved a significant breakthrough in cybersecurity by developing a novel method for generating truly unpredictable random numbers. This development is essential for strengthening encryption in quantum communications, addressing one of the most…

AI Minefield: Risks of Gen AI in Your Personal Sphere

Many customers are captivated by Gen AI, employing new technologies for a variety of personal and corporate purposes.  However, many people ignore the serious privacy implications. Is Generative AI all sunshine and rainbows? Consumer AI products, such as OpenAI’s ChatGPT,…

Phishing Kit FishXProxy Equips Online Criminals for Success

  Phishing campaigns have always been a threat, but a new toolkit called FishXProxy is making it alarmingly easy for even inexperienced cybercriminals to carry out sophisticated scams.  SlashNext Email Security researchers have disclosed exclusive details about FishXProxy, a new…

Microsoft Faces Criticism Over Data Breach Notification Emails

  Microsoft recently began notifying some customers via email about a potential data breach that might have compromised their personal information. However, the company’s approach has faced heavy criticism, with many saying the emails resembled spam or phishing attempts. Cybersecurity…

Debunking Common Myths About VPNs

Virtual Private Networks (VPNs) are important tools for online privacy, but they’re often misunderstood. Here, we clear up the top five myths to help you understand what VPNs can and can’t do for your digital security. Myth 1: All VPNs…

Akira Ransomware: The Need for Rapid Response

Threat actors wielding the Akira ransomware demonstrated unprecedented efficiency in a recent cyber attack that sent shockwaves through the cybersecurity community.  Their lightning-fast data exfiltration took just over two hours, representing a dramatic shift in the average time it takes…

Improved ViperSoftX Malware Distributed Through eBooks

  Researchers have found new advancements in the ViperSoftX info-stealing malware, which was first discovered in 2020. This malware has become more sophisticated, using advanced techniques to avoid detection. One of its new methods is using the Common Language Runtime…

The Impact of AI on Society and Science

  Nowadays, everyone is talking about artificial intelligence (AI). Governments view AI as both an opportunity and a challenge. Industries are excited about AI’s potential to boost productivity, while academia is actively incorporating AI into teaching and research. However, the…

Poland Pushes for Shorter Drug Data Protection in EU

  At a recent EU meeting in Luxembourg, Poland supported a European Commission proposal to shorten the time new drugs are protected by data exclusivity rules. Health Minister Izabela Leszczyna said Poland prefers one year of market protection over longer…

Microsoft’s Breach Notification Emails Wind Up in Spam Folder

  Midnight Blizzard, a Russian nation-state hacker gang, breached Microsoft’s security last year, gaining access to the emails of multiple customers. In late June, Microsoft revealed that more organisations were affected than previously assumed. However, the company’s attempts to notify…

Mobile Encryption Innovation Aids Criminals, Europol Reports

  Europol has proposed solutions to address some of the challenges posed by privacy-enhancing technologies found in Home Routing, which pose a challenge for law enforcement agencies in intercepting communications during criminal investigations as a result of these technologies. There…

DarkMe RAT: Microsoft SmartScreen Vulnerability Explored

In recent months, cybersecurity researchers have detected a surge in the exploitation of a critical vulnerability known as CVE-2024-21412. This vulnerability specifically targets Microsoft SmartScreen, a security feature designed to protect users from malicious websites and downloads.  In this blog…

Double-Scam Alert: How Fraudsters Exploit Scam Victims Twice

The ACCC (Australian Competition and Consumer Commission) has cautioned that scammers are approaching victims with false offers to assist them in recovering from scams.  Scammers and Fake Recovery Offers The National Anti-Scam Centre warns Australians who have had their money…