Data is the new currency, but what happens when the guardians of our privacy mess up? The recent incident involving iCabbi, a taxi software vendor, brings notice to the delicate balance between convenience and security. The Breach Unveiled On a…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Second Largest Employer Amazon Opts For Robots, Substituting 100,000 Jobs
Amazon.com Inc. is swiftly increasing the use of robotics, with over 750,000 robots functioning alongside its employees. There are 1.5 million people at the second-largest private company in the world. Even if it’s a large number, it represents a…
Nationwide Scam Targets Road Toll Users via SMS Phishing Scheme
The Federal Bureau of Investigation (FBI) has alerted the public to a widespread SMS phishing scam sweeping across the United States. The scam, which began in early March 2024, specifically targets individuals with fraudulent messages regarding unpaid road toll…
Apple Steps Up Spyware Alerts Amid Rising Mercenary Threats
It has been reported that Apple sent notifications on April 10 to its Indian and 91 other users letting them know they might have been a victim of a possible mercenary spyware attack. As stated in the company’s notification…
Navigating the Complex Landscape of Cyber Threats: Insights from the Sisense Breach and North Korean Tactics
In the intricate tapestry of cybersecurity, recent events have thrust vulnerabilities and threats into the spotlight once again. The breach of data analytics powerhouse Sisense, coupled with the emergence of novel sub-techniques utilized by North Korean threat actors, underscores…
Apple Alerts iPhone Users of ‘Mercenary Attack’ Threat
Apple issued security alerts to individuals in 92 nations on Wednesday, cautioning them that their iPhones had been targeted in a remote spyware attack linked to mercenaries. The company sent out threat notification emails, informing recipients, “Apple has detected…
Iranian Hackers Use New C2 Tool ‘DarkBeatC2’ in Recent Operation
MuddyWater, an Iranian threat actor, has used a novel command-and-control (C2) infrastructure known as DarkBeatC2 in its the most recent attack. This tool joins a list of previously used systems, including SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go. In a recent…
Is Facial Biometrics the Future of Digital Security?
Within the dynamic sphere of digital technology, businesses are continually seeking innovative solutions to streamline operations and step up their security measures. One such innovation that has garnered widespread attention is facial biometrics, a cutting-edge technology encompassing face recognition…
The Silent Flaw: How a 6-Year-Old BMC Vulnerability Went Unnoticed
A six-year-old vulnerability has recently come to light, affecting Intel and Lenovo servers. Let’s delve into the details of this silent flaw and its implications. About vulnerability The vulnerability resides within the Lighttpd web server, a lightweight and efficient open-source…
300 Strikes: Fort Worth’s Battle Against the Medusa Gang
In the wake of a cyberattack on Tarrant County Appraisal District in March, the Medusa ransomware gang has claimed responsibility for the hack and has threatened the public with the threat of leaking 218 GB of the stolen data…