There is a possibility that these vehicles may be collecting vast amounts of information about their users that can be accessed by advertisers, data brokers, insurance companies and others, and that information could be shared with several companies including…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Unveiling the New Era of Hacking Ethics: Profit Over Principles
Hacking, once a realm of curiosity-driven exploration, has morphed into a complex ecosystem of profit-driven cybercrime. Originating in the 1960s, hacking was fueled by the insatiable curiosity of a brilliant community known as “hackers.” These early pioneers sought to…
Ransomware Strikes Tarrant Appraisal District
Tarrant Appraisal District (TAD) finds itself grappling with a major setback as its website falls prey to a criminal ransomware attack, resulting in a disruption of its essential services. The attack, which was discovered on Thursday, prompted swift action…
Unmasking Cyber Shadows: New Zealand’s Battle Against State-Backed Hackers
Recently, New Zealand accused China of engaging in “malicious cyber activity” targeting its parliament. This accusation sheds light on the growing tensions between nations and the need to safeguard democratic institutions from cyber espionage. In this blog, we delve into…
Facebook Spied on Users’ Snapchat Traffic in a Covert Operation, Documents Reveal
In 2016, Facebook initiated a secret initiative to intercept and decrypt network traffic between Snapchat users and the company’s servers. According to recently revealed court filings, the purpose was to better analyse user behaviour and help Facebook compete with…
‘Tycoon’ Malware Kit Bypasses Microsoft and Google Multifactor Authentication
An emerging phishing kit called “Tycoon 2FA” is gaining widespread use among threat actors, who are employing it to target Microsoft 365 and Gmail email accounts. This kit, discovered by researchers at Sekoia, has been active since at least…
The Great Data Heist: China’s Alleged Theft of Voter Data and Its Potential Impact
Chinese-backed hackers allegedly targeted U.S. officials, journalists, corporations, pro-democracy activists and the United Kingdom’s electoral watchdog in a comprehensive, state-backed attack on March 25, authorities announced in an announcement on March 25. The attack was aimed at targeting officials,…
Safeguarding the NHS: Protecting Against Potential Cyber Attacks from China
Recent concerns have surfaced regarding the vulnerability of the NHS to cyberattacks, particularly from China. Reports indicate that Beijing-backed actors exploited software flaws to access the personal details of millions of Britons. As experts in cybersecurity, it’s crucial to…
What Are The Risks of Generative AI?
We are all drowning in information in this digital world and the widespread adoption of artificial intelligence (AI) has become increasingly commonplace within various spheres of business. However, this technological evolution has brought about the emergence of generative AI,…
Data Breach at Giant Tiger: Protecting Customer Information in the Digital Age
In an increasingly interconnected world, data breaches have become a recurring nightmare for organizations of all sizes. The recent incident at Giant Tiger Stores Ltd., a popular discount retailer based in Ottawa, serves as a stark reminder of the importance…