It has been reported that Apple sent notifications on April 10 to its Indian and 91 other users letting them know they might have been a victim of a possible mercenary spyware attack. As stated in the company’s notification…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Navigating the Complex Landscape of Cyber Threats: Insights from the Sisense Breach and North Korean Tactics
In the intricate tapestry of cybersecurity, recent events have thrust vulnerabilities and threats into the spotlight once again. The breach of data analytics powerhouse Sisense, coupled with the emergence of novel sub-techniques utilized by North Korean threat actors, underscores…
Apple Alerts iPhone Users of ‘Mercenary Attack’ Threat
Apple issued security alerts to individuals in 92 nations on Wednesday, cautioning them that their iPhones had been targeted in a remote spyware attack linked to mercenaries. The company sent out threat notification emails, informing recipients, “Apple has detected…
Iranian Hackers Use New C2 Tool ‘DarkBeatC2’ in Recent Operation
MuddyWater, an Iranian threat actor, has used a novel command-and-control (C2) infrastructure known as DarkBeatC2 in its the most recent attack. This tool joins a list of previously used systems, including SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go. In a recent…
Is Facial Biometrics the Future of Digital Security?
Within the dynamic sphere of digital technology, businesses are continually seeking innovative solutions to streamline operations and step up their security measures. One such innovation that has garnered widespread attention is facial biometrics, a cutting-edge technology encompassing face recognition…
The Silent Flaw: How a 6-Year-Old BMC Vulnerability Went Unnoticed
A six-year-old vulnerability has recently come to light, affecting Intel and Lenovo servers. Let’s delve into the details of this silent flaw and its implications. About vulnerability The vulnerability resides within the Lighttpd web server, a lightweight and efficient open-source…
300 Strikes: Fort Worth’s Battle Against the Medusa Gang
In the wake of a cyberattack on Tarrant County Appraisal District in March, the Medusa ransomware gang has claimed responsibility for the hack and has threatened the public with the threat of leaking 218 GB of the stolen data…
Offensive Security Necessitates a Data-driven Approach for CISOs
There remains a significant disparity in utilisation of resources between defensive and offensive cybersecurity technologies. When comparing the return on investment (ROI) for defensive and offensive investments, security experts discovered that offensive security routinely outperforms defensive security. For example,…
Unmasking the “Golden Top” Cybercrime Syndicate: Zambia’s Battle Against Deception
Zambia has exposed a sophisticated Chinese cybercrime syndicate that preyed on unsuspecting victims across the globe. The operation, which unfolded during a multi-agency raid, led to the apprehension of 77 individuals, including 22 Chinese nationals. This case sheds light on…
AI’s Role in Averting Future Power Outages
Amidst an ever-growing demand for electricity, artificial intelligence (AI) is stepping in to mitigate power disruptions. Aseef Raihan vividly recalls a chilling night in February 2021 in San Antonio, Texas, during winter storm Uri. As temperatures plunged to -19°C,…