Businesses and cybercriminals alike are seeking skilled cybersecurity professionals, with the latter advertising for talent capable of developing dark AI models and penetration-testing tools, commonly used for ransomware. These efforts aim to strengthen their malware and reduce the risk…
Category: CySecurity News – Latest Information Security and Hacking Incidents
User Tracking: Google to Store User Data for 180 Days
Google has made a major change in its user tracking, a big leap in privacy concerns for users. Google will stop the nosy cloud storage of data it gets from tracking user location in real time. The privacy change Called…
US Exposes Major Chinese Cyber-Espionage Targeting Telecom Networks
The United States has accused China of conducting a vast cyber espionage operation that targeted multiple telecommunications networks. The hackers allegedly stole sensitive data and intercepted communications relating to a few government and political leaders. The incident raises national…
New Ghost Tap Assault Exploits NFC Mobile Payments to Steal Funds
The attackers are increasingly relying on a novel approach that employs near-field communication (NFC) to pay out victims’ funds at scale. ThreatFabric’s Ghost Tap technology enables fraudsters to cash out money from stolen credit cards related to mobile payment…
Creating a Strong Cybersecurity Culture: The Key to Business Resilience
In today’s fast-paced digital environment, businesses face an increasing risk of cyber threats. Establishing a strong cybersecurity culture is essential to protecting sensitive information, maintaining operations, and fostering trust with clients. Companies that prioritize cybersecurity awareness empower employees to…
How Agentic AI Will Change the Way You Work
Artificial intelligence is entering a groundbreaking phase that could drastically change the way we work. For years, AI prediction and content creation have been utilised, but the spotlight has shifted toward the most advanced: agentic AI. Such intelligent systems are…
The Hidden Dangers of Compromised Wi-Fi Routers
Cybercriminals who attack routers are swift and precise, spending countless hours studying network vulnerabilities to compromise sensitive data and then taking advantage of those vulnerabilities to compromise the router. The term “router hacking” refers to taking control of a user’s…
Amazon Employee Data Leaked in MOVEit Attack Fallout
Amazon has confirmed that some employee data was accessed last year, presumably as part of the huge MOVEit hacking campaign. A hacker recently revealed on the BreachForums cybercrime forum that they had stolen Amazon employee information, such as names,…
Reimagining Healthcare with Synthetic Data
It has been espoused in the generative AI phenomenon that the technology’s key uses would include providing personalized shopping experiences for customers and creating content. Nonetheless, generative AI can also be seen to be having a very real impact…
Gmail Alert: Massive Phishing Campaign Spreads Rhadamanthys Malware
Cybersecurity experts have issued a new warning about a large-scale phishing attack targeting Gmail users worldwide. Researchers at Check Point have uncovered the threat, which uses fake Gmail accounts to send emails impersonating well-known companies. These fraudulent messages claim…