In exchange for the payment of a ransom, LockBit ransomware blocks access to the computer systems of its users. With LockBit, all computers on a network can be encrypted by encrypting them, confirming that the target is valuable, spreading…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Private Operators to Manage Mobile Speed Cameras in New Zealand
In a significant shift, New Zealand Transport Agency Waka Kotahi (NZTA) has opened a tender to hand over the management of the country’s 45 mobile speed cameras to private operators from next year. This move, the first of its…
Change Ransomware Attack: UnitedHealth Profits from a Crisis it Created
Change Ransomware Incident: Details so far The change Ransomware attack Last week, an Oregon medical practice suffered a serious Ransomware attack called Change Ransomware. Due to the attack, the medical practice was left with an empty bank account. The only…
Europe’s Digital Markets Act Compels Tech Corporations to Adapt
Europeans now have the liberty to select their preferred online services, such as browsers, search engines, and iPhone apps, along with determining the usage of their personal online data. These changes stem from the implementation of the Digital Markets…
Japan Blames Lazarus for PyPi Supply Chain Attack
Japanese cybersecurity officials issued a warning that North Korea’s infamous Lazarus Group hacking group recently launched a supply chain attack on the PyPI software repository for Python apps. Threat actors disseminated contaminated packages with names like “pycryptoenv” and “pycryptoconf”…
Cybersecurity Teams Tackle AI, Automation, and Cybercrime-as-a-Service Challenges
In the digital society, defenders are grappling with the transformative impact of artificial intelligence (AI), automation, and the rise of Cybercrime-as-a-Service. Recent research commissioned by Darktrace reveals that 89% of global IT security teams believe AI-augmented cyber threats will…
Hyper-Personalization in Retail: Benefits, Challenges, and the Gen-Z Dilemma
Customers often embrace hyper-personalization, which is defined by customized product suggestions and AI-powered support. Marigold, Econsultancy, Rokt, and The Harris Poll polls reveal that a sizable majority of consumers—including 88% of Gen Zers—view personalized services as positive additions to their…
Critical Vulnerabilities in GovQA Platform Expose Sensitive Government Records
In a significant cybersecurity revelation, critical vulnerabilities were discovered in the GovQA platform, a tool extensively used by state and local governments across the U.S. to manage public records requests. Independent researcher Jason Parker uncovered flaws that, if exploited,…
Microsoft Source Code Heist: Russian Hackers Escalate Cyberwarfare
There was an update on the hacking attempts by hackers linked to Russian foreign intelligence on Friday. They used data stolen from corporate emails in January to gain access to Microsoft’s systems again, which were used by the foreign…
Rise in Phishing Attacks Targeting US Schools Raises Concerns
Through a recent report by PIXM, a cybersecurity firm specialising in artificial intelligence solutions, public schools in the United States face a significant increase in sophisticated phishing campaigns. Threat actors are employing targeted spear phishing attacks, utilising stealthy patterns…