Authentication tokens are not tangible tokens, of course. However, if these digital IDs are not routinely expired or restricted to a single device, they may be worth millions of dollars in the hands of threat actors. Authentication tokens (…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Apple Warns Windows Users: Critical Security Vulnerability in iTunes
Apple confirms the finding of a critical security flaw in the iTunes program for Windows 10 and Windows 11 users, which could have allowed malicious attackers to execute code remotely at will. Willy R. Vasquez, a security researcher at the…
Australia’s Premier Non-Bank Lender Suffers Data Security Breach
One of Australia’s largest non-bank mortgage lenders, Firstmac, has suffered a cyberattack, which resulted in customer information such as credit card and passport numbers, Medicare numbers and driver’s licence numbers being stolen and published on the dark web. In…
Critical Infrastructure and the Importance of Safeguarding it in the Digital Age
In today’s digital age, our society relies heavily on critical infrastructure to function smoothly. These infrastructures, including power grids, water systems, and communication networks, form the backbone of our daily lives, facilitating everything from electricity distribution to internet connectivity. …
Student Hijacking: Cyberattack Exposes 8,000 Students’ Data in Hong Kong
The personal information of over 8,000 students at a private Hong Kong college has been taken and purportedly placed on the dark web, the latest in a string of cyberattacks in the city that have prompted calls for greater security.…
Can Legal Measures Slow Down Cybercrimes?
Cybercrime has transpired as a serious threat in India, prompting calls for comprehensive reforms and collaborative efforts from various stakeholders. Experts and officials emphasise the pressing need to address the evolving nature of cyber threats and strengthen the country’s…
Cyber Criminals Exploiting MS-SQL Severs To Deploy Mallox Ransomware
The MS-SQL (Microsoft SQL) honeypot incident that took place recently highlighted the sophisticated strategies used by cybercriminals that rely on the Mallox ransomware (also known as Fargo, TargetCompany, Mawahelper, etc.). The honeypot, set up by the Sekoia researchers, was…
Ransomware Attacks Now Targeting Corporate Executives’ Children
Mandiant, a prominent cybersecurity firm and subsidiary of Google, highlights the escalating creativity of malicious hackers as corporations reinforce their cyber defenses. These hackers have extended their targets to include the children of corporate executives, employing ransomware tactics to…
26 Million Records Leaked: The Post-Millennial Hack Raises Privacy Concerns
The data from the hack of The Post Millennial conservative news website has been added to Have I Been Pwned, which recently uncovered the information of 26,818,266 people whose data had been stolen. Human Events Media Group is a…
Unlocking the Mystery: Key Fob Vulnerabilities Exposed
According to security researchers, the key fob is extremely hackable, and, in addition, it is convenient. In terms of digital security, the car key fob does not have the greatest reputation when it comes to safety. As of late,…