According to a new privacy policy introduced by X (formerly known as Twitter), it will soon be collecting its users’ biometric data. The policy says that the company intends to compile individuals’ employment and educational histories. According to the policy…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Rare Technique Deployed by Android Malware to Illicitly Harvest Banking Data
Trend Micro, a cybersecurity research firm, has recently unveiled a novel mobile Trojan that employs an innovative communication technique. This method, known as protobuf data serialization, enhances its ability to pilfer sensitive data from compromised devices. Initially detected by…
Loan App Executive Asks BJP Legislator to Repay Loan That He Never Borrowed
Even prominent politicians fall prey to scammers in the world of cybercrime, which is a tremendous leveller. A person who is still unknown repeatedly called and texted the BJP legislator Ashish Shelar, requesting that he pay back a debt…
Threat of Fake Signal and Telegram Apps: Protecting Your Privacy and Security
In today’s digital age, the use of messaging apps has become an integral part of our daily lives. Apps like Signal and Telegram have gained immense popularity due to their focus on privacy and security. However, with the rise in…
3 Vital Cybersecurity Threats for Employees
Cybersecurity is no longer just the IT department’s job in today’s digitally connected society. Protecting confidential firm information is the responsibility of every employee, from the CEO to the newest intern. Cybercriminals are growing more skilled, and their methods are…
Chinese Chipmaker Accelerates Tool Replacement Amidst Sanctions
To counter U.S. sanctions that have slowed sales of semiconductors in China, a top executive at Huawei said Friday that the country’s semiconductor industry will be “reborn” following U.S. sanctions. In reaction to Washington’s tech export restrictions on China,…
VMConnect Supply Chain Attack Persists
During the initial weeks of August, the ReversingLabs research team uncovered a malicious supply chain operation, code-named “VMConnect.” This nefarious campaign involved the distribution of approximately twenty-four malevolent Python packages through the Python Package Index (PyPI), a widely used…
UN Reports: Hundreds of Thousands Coerced into Working in Online Scams
A latest UN investigation reports that hundreds of thousands of people have been trafficked to Southeast Asia to operate online scams. Apparently, at least 12,000 individuals from Myanmar and another 100,000 Cambodian nationals have been coerced into working on these…
Why Sharing Boarding Pass Pictures on Social Media Is a Privacy Risk, Warns Expert
Individuals flying for the first time are aware that an airline boarding pass includes certain details about a traveler, such as their name, flight number, and seat assignment. However, what might not be common knowledge is that these tickets,…
Why Next-Generation Firewalls are Essential for Modern Network Security
Firewalls have long been considered the first line of defense in network security. They monitor and control incoming and outgoing network traffic based on predetermined security rules. However, as technology evolves and cyber threats become more sophisticated, traditional firewalls are…