Over the past decade, the role of Chief Information Security Officers (CISOs) has expanded significantly, reflecting cybersecurity’s growing importance in corporate governance and risk management. Once primarily responsible for managing firewalls and protecting data, CISOs now play a critical role…
Category: CySecurity News – Latest Information Security and Hacking Incidents
MIT Database Lists Hundreds of AI Dangers Impacting Human Lives
Artificial intelligence is present everywhere. If it isn’t powering your online search results, it’s just a click away with your AI-enabled mouse. If it’s not helping you enhance your LinkedIn profile, it’s benefiting you at work. As AIs become…
Citrine Sleet APT Exploits Chrome Zero-Day Vulnerability for Rootkit Infiltration
It is believed that North Korean hackers have been able to use unpatched zero-day in Google Chrome (CVE-2024-7971) to install a rootkit called FudModule after gaining admin privileges by exploiting a kernel vulnerability in Microsoft Windows. An investigation by…
Rise in Ransomware Attacks in Southeast Asia Driven by Rapid Digitalization and Security Gaps
A wave of ransomware attacks across Southeast Asia during the first half of this year marks just the beginning of a larger trend. Companies and government agencies, particularly in countries like Thailand, Japan, South Korea, Singapore, Taiwan, and Indonesia,…
Security Analysts Observe Massive Surge in Telegram App Downloads Following Durov Arrest
The arrest of Telegram creator and CEO Pavel Durov in France is beginning to have an influence on the app’s popularity and position. The founder was arrested last month for allegedly allowing illicit practices to thrive on the social…
Adopting a Connected Mindset: A Strategic Imperative for National Security
In today’s rapidly advancing technological landscape, connectivity goes beyond being just a buzzword—it has become a strategic necessity for both businesses and national defense. As security threats grow more sophisticated, an integrated approach that combines technology, strategic planning, and…
Is Telegram Still a Safe Messaging App? An In-Depth Look
Telegram, a popular messaging app launched in 2013, has earned a reputation for its robust security features. This Dubai-based platform offers end-to-end encryption for video and voice calls and in its optional feature, Secret Chats. This encryption ensures that only…
EU’s Initiative to Define ‘Important Data’ in China: A Step Towards Global Data Governance
The flow of data across borders is often hampered by varying national regulations. One such challenge is China’s restrictive data export laws, which have left many international businesses grappling with compliance. The European Union (EU) is now stepping up efforts…
AI System Optimise Could Help GPs Identify High-Risk Heart Patients
Artificial intelligence (AI) is proving to be a game-changer in healthcare by helping general practitioners (GPs) identify patients who are most at risk of developing conditions that could lead to severe heart problems. Researchers at the University of Leeds…
Automatic Burn-In Technology by Sinon Elevates Windows Deception Hosts
As an open-source, modular tool, Autre enables the automatic burn-in of deception hosts based on Windows system types. By using generative capabilities, this framework intends to reduce the complexity involved in orchestrating deception hosts on a large scale while…