On Friday, China proposed a four-tier classification system, in an effort to address data security incidents, underscoring concerns of Beijing in regards to the widespread data leaks and hacking incidents in the country. This emergency plan comes when the country…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Hackers Steal Assets Worth $484,000 in Ledger Security Breach
Threat actors responsible for attacking Ledger’s connector library have stolen assets valued at approximately $484,000. This information was given by the blockchain analysis platform Lookonchain. Ledger has said that the security breach might have a large effect, possibly totalling hundreds…
Cybersecurity Incident Causes Outage at Lesotho’s Central Bank
Lesotho’s central bank is grappling with widespread disruptions following a cyberattack detected earlier this week. The landlocked country, surrounded by South Africa and home to over 2 million people, disclosed multiple statements acknowledging the impact of the recent cyber…
Microsoft Shuts Down a Criminal Ring Responsible for Creating Over 750 Million Fake Accounts
Microsoft Corp. has shut down a cybercrime group’s US-based infrastructure, which created more than 750 million fake accounts across the company’s services. Microsoft carried out the takedown with the support of Arkose Labs Inc., a venture-backed cybersecurity firm. The…
China Issues Alert on Geographical Information Data Breaches Impacting Transportation and Military
China has recently issued a stern warning regarding the use of foreign geographic software, expressing serious concerns about the potential leakage of critical information related to its essential infrastructure and military. The Ministry of State Security, while refraining from…
Digital Guardianship: A Call to Arms for Safeguarding Our Children’s Future
It is no longer news that children’s lives are becoming increasingly impacted by the digital realm in our modern world. There are a wide array of educational resources, entertainment, and social connections available on the Internet. Despite this, it…
Securing Generative AI: Navigating Risks and Strategies
The introduction of generative AI has caused a paradigm change in the rapidly developing field of artificial intelligence, posing both unprecedented benefits and problems for companies. The need to strengthen security measures is becoming more and more apparent as these…
OAuth App Abuse: A Growing Cybersecurity Threat
User data security has grown critical in an era of digital transactions and networked apps. The misuse of OAuth applications is a serious danger that has recently attracted attention in the cybersecurity field. OAuth (Open Authorization) is a widely used…
Ransomware Groups are Using PR Charm Tactic to Put Pressure on Victims to Pay Ransom
Recently, ransomware groups have been increasingly adopting newer tactics, one of them being the transparent, quasi-corporate strategy with the media, with the benefits of building pressure on the victims to pay ransom. According to a report, released this week by…
Rise of OLVX: A New Haven for Cybercriminals in the Shadows
OLVX has emerged as a new cybercrime marketplace, quickly gaining a loyal following of customers seeking through the marketplace tools used to conduct online fraud and cyberattacks on other websites. The launch of the OLVX marketplace follows along with…