There remains a significant disparity in utilisation of resources between defensive and offensive cybersecurity technologies. When comparing the return on investment (ROI) for defensive and offensive investments, security experts discovered that offensive security routinely outperforms defensive security. For example,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Unmasking the “Golden Top” Cybercrime Syndicate: Zambia’s Battle Against Deception
Zambia has exposed a sophisticated Chinese cybercrime syndicate that preyed on unsuspecting victims across the globe. The operation, which unfolded during a multi-agency raid, led to the apprehension of 77 individuals, including 22 Chinese nationals. This case sheds light on…
AI’s Role in Averting Future Power Outages
Amidst an ever-growing demand for electricity, artificial intelligence (AI) is stepping in to mitigate power disruptions. Aseef Raihan vividly recalls a chilling night in February 2021 in San Antonio, Texas, during winter storm Uri. As temperatures plunged to -19°C,…
X’s URL Blunder Sparks Security Concerns
X, the social media platform formerly known as Twitter, recently grappled with a significant security flaw within its iOS app. The issue involved an automatic alteration of Twitter.com links to X.com links within Xeets, causing widespread concern among users.…
E-Challan Fraud, Man Loses Rs 50,000 Despite Not Sharing Bank OTP
In a cautionary tale from Thane, a 41-year-old man, M.R. Bhosale, found himself embroiled in a sophisticated online scam after his father fell victim to a deceptive text message. The incident sheds light on the dangers of trusting unknown…
Cybercriminals Employ Obfuscation in Invoice Phishing Malware Campaigns
An array of cunning cyberattack campaigns utilizing seemingly innocuous invoices to deliver malware attacks have been uncovered by cybersecurity researchers. In this deceptive campaign, malicious Scalable Vector Graphics (SVG) file attachments are embedded in phishing emails that have been…
Windows Systems Vulnerable to Attacks Due to Critical ‘BatBadBut’ Rust Flaw
A significant security loophole within the Rust standard library has emerged, posing a threat specifically to Windows users by enabling potential command injection attacks. Designated as CVE-2024-24576 and carrying a maximum severity score of 10.0 according to the Common…
Secrets of SharePoint Security: New Techniques to Evade Detection
According to a recent discovery by Varonis Threat Labs, two new techniques have emerged that pose a significant threat to data security within SharePoint, a widely used platform for file management. These techniques enable users to evade detection and…
The Future of Quantum Computers: Challenging Space Encryption with Light
In the realm of technology and communications, the race for supremacy between quantum computers and space encryption is intensifying. While quantum computers hold the promise of unprecedented processing power, space encryption, leveraging light to beam data around, presents a…
AI Could Be As Impactful as Electricity, Predicts Jamie Dimon
Jamie Dimon might be concerned about the economy, but he’s optimistic regarding artificial intelligence. In his annual shareholder letter, JP Morgan Chase’s (JPM) CEO stated that he believes the effects of AI on business, society, and the economy would…