A significant amount of cryptocurrency, valued at nearly $10 million, has been reported stolen from personal accounts belonging to Jeff “Jihoz” Zirlin, one of the co-founders associated with the video game Axie Infinity and its affiliated Ronin Network. According…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Nvidia CEO Believes AI Would Kill Coding
When ChatGPT was first made public by OpenAI in November 2022, many were taken aback by its abilities. People discovered an array of opportunities for the AI chatbot, ranging from asking it to write poetry and music to debug…
Google’s Magika: Revolutionizing File-Type Identification for Enhanced Cybersecurity
In a continuous effort to fortify cybersecurity measures, Google has introduced Magika, an AI-powered file-type identification system designed to swiftly detect both binary and textual file formats. This innovative tool, equipped with a unique deep-learning model, marks a significant…
From Classrooms to Cyberspace: The AI Takeover in EdTech
Recently, the intersection between artificial intelligence (AI) and education technology (EdTech) has become one of the most significant areas of concern and growth within the educational industry. The rapid adoption of AI-based EdTech tools is creating a unique set…
Ransomware Distributed Through Mass Exploitation of ConnectWise ScreenConnect
Shortly after reports emerged regarding a significant security flaw in the ConnectWise ScreenConnect remote desktop management service, researchers are sounding the alarm about a potential large-scale supply chain attack. Kyle Hanslovan, CEO of Huntress, expressed concerns about the exploitation…
Serco Leisure Faces Legal Action for Unlawful Employee Face Scanning
Serco Leisure, a prominent leisure firm based in the UK, finds itself at the centre of a regulatory storm as the Information Commissioner’s Office (ICO) intensifies its scrutiny. The ICO has raised serious concerns over the alleged illegal processing of…
Amazon Issues ‘Warning’ For Employees Using AI At Work
A leaked email to employees revealed Amazon’s guidelines for using third-party GenAI tools at work. Business Insider claims that the email mandates employees to refrain from using third-party software due to data security concerns. “While we may find ourselves…
LockBit Ransomware: Covertly Evolving Towards Next-Gen Threats Amid Takedown Efforts
In a significant development, law enforcement dismantled the infrastructure of LockBit ransomware earlier this week, uncovering the clandestine work on a next-generation file encryption malware. Referred to as LockBit-NG-Dev, this emerging threat, likely the precursor to LockBit 4.0, was…
Rethinking Trust: The Case Against Blind Reliance on Antivirus Software
Most users would believe that the best antivirus programs are the most trustworthy type of software in the market, however, it turns out that perceptions can be deceiving and there is no such thing as a foolproof solution. As…
Cell Service Restored Following Extensive AT&T Outage
AT&T has resolved issues affecting its mobile phone customers following widespread outages on Thursday, according to a company announcement.Throughout the day, tens of thousands of cell phone users across the United States reported disruptions. Reports on Downdetector.com, a platform…