ProKYC is a recently revealed artificial intelligence (AI)-powered deep fake tool that nefarious actors can use to circumvent high-level Know Your Customer (KYC) protocols on cryptocurrency exchanges, presenting as a very sophisticated method to circumvent high-level KYC protocols. A…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Apple’s Latest iPhone Update: Bad News for Millions of Google Users
If the latest reports are correct, Apple consumers have just over a fortnight to wait until the launch of iOS 18.1 and the belated arrival of Apple Intelligence, the flagship feature in the latest iOS release. Until then the…
How F5 BIG-IP Cookies Are Being Exploited for Network Snooping: A CISA Warning
US Government’s Cybersecurity and Infrastructure Security Agency released a warning regarding cyberattackers use of unencrypted cookies managed by the F5 BIG-IP Local Traffic Manager, by which they gather information about private networks. In this manner, these attackers identify the…
OpenAI’s Disruption of Foreign Influence Campaigns Using AI
Over the past year, OpenAI has successfully disrupted over 20 operations by foreign actors attempting to misuse its AI technologies, such as ChatGPT, to influence global political sentiments and interfere with elections, including in the U.S. These actors utilized…
Biometric Data Theft and Cyberterrorism Are The Major Future Threats
Cyberterrorism, biometric data poisoning, and metaverse crimes are the most serious digital threats that humans are expected to face in the future, a senior Dubai official said. Major Tarek Belhoul, head of Dubai Police’s virtual assets crime branch, stated,…
Blockchain Innovation Drives Payroll and Employee Data Security in HR
In HR, blockchain technology is still in its infancy when it comes to gaining acceptance among the people. Despite this, it stands to be a great boon for the future of work as well. The APQC report indicates that…
AsyncRAT Malware Exploits Bitbucket to Launch Multi-Stage Attack
G DATA Security Lab has discovered a sophisticated malware operation that used Bitbucket, a popular code hosting platform, to propagate AsyncRAT, a well-known remote access trojan. According to the study, the attackers employed a multi-stage assault strategy, exploiting Bitbucket…
Awaken Likho Targets Russian Agencies with MeshCentral Remote Access Tool
Awaken Likho, also referred to as Core Werewolf or PseudoGamaredon, is a cyber threat group targeting Russian government agencies and industrial entities. Since June 2024, a new campaign has been observed, where attackers have shifted from using UltraVNC to…
Millions of Android Devices at Risk, New Chip Bug Exploited in Targeted Attacks
Overview of the Exploit Hackers recently leveraged a serious security weakness, said to be a “zero-day,” that exists within the Qualcomm chipsets used in many popular Android devices. Qualcomm confirmed that at the time they were first exploited by…
The Role of End-to-End Encryption in Modern Cybersecurity
It is a type of messaging that is protected from everyone, including the messaging service itself, because of end-to-end encryption (E2EE). Using E2EE, a message cannot be decrypted until the sender and the recipient can see it in the…