Google has made a significant stride in quantum computing with the announcement of its latest chip, named “Willow.” According to Google, this advanced chip can solve problems in just five minutes that would take the most powerful supercomputers on…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Lynx Ransomware Breach Targets Romania’s Electrica Group
The Romanian National Cybersecurity Directorate (DNSC) has confirmed that the Lynx ransomware gang successfully breached Electrica Group, a leading electricity supplier in Romania. About Electrica Group Electrica Group, initially part of the National Electricity Company (CONEL) in 1998, became…
Mandiant Uncovers QR Code Exploit to Bypass Browser Isolation
Mandiant researchers have discovered an innovative method to circumvent browser isolation technology by leveraging QR codes to establish command-and-control (C2) operations. This finding highlights potential vulnerabilities in existing web browser security measures. Understanding Browser Isolation Browser isolation is a…
Beware of Malicious USB-C Cables: Hidden Cyber Threats
In today’s tech-driven world, charging cables are indispensable. However, recent findings about compromised USB-C cables have highlighted significant risks associated with third-party accessories. Security experts warn that hackers can embed tiny computers within ordinary-looking cables, transforming them into tools…
Artivion Discloses Ransomware Attack, Disrupting Operations
< p style=”text-align: justify;”>Leading cardiac surgery medical device company Artivion has reported a ransomware attack that occurred on November 21, resulting in the encryption of certain systems and unauthorized data access. The incident forced the Atlanta-based company to take…
Deep Packet Inspection (DPI): Balancing Security and Privacy in the Digital Age
Deep Packet Inspection (DPI) is an advanced technology for analyzing internet traffic that goes beyond traditional techniques. Unlike standard firewalls that examine only the headers of data packets, DPI scrutinizes both headers and payloads, providing a comprehensive view of…
Cyber Threat Alert for South Korea from North Korean Hackers
In a recent cyber-espionage campaign targeted at the United States, North Korean state-linked hacker ScarCruft recently exploited a zero-day vulnerability in Internet Explorer to distribute RokRAT malware to targets nationwide. APT37, or RedEyes as it is sometimes called, is…
Forensic Analysis in the eXp Realty Case: Privacy and Evidence Integrity
< p style=”text-align: justify;”>In a recent video hearing for the case Acevedo v. eXp, related to a sexual assault claim, a judge deliberated on whether to grant a protective order that would prevent a forensic examination of eXp founder…
Critical Apple Security Vulnerability CVE-2024-44131 Patched: What You Need to Know
Jamf Threat Labs has identified a critical flaw in Apple’s Transparency, Consent, and Control (TCC) framework, labeled CVE-2024-44131. This vulnerability allows malicious applications to bypass user consent protocols and access sensitive data without user awareness. The issue impacts both…
Can Data Embassies Make AI Safer Across Borders?
The rapid growth of AI has introduced a significant challenge for data-management organizations: the inconsistent nature of data privacy laws across borders. Businesses face complexities when deploying AI internationally, prompting them to explore innovative solutions. Among these, the concept…