In a recent prediction by the National Grid, it’s anticipated that the energy consumption of data centres, driven by the surge in artificial intelligence (AI) and quantum computing, will skyrocket six-fold within the next decade. This surge in energy…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Data Breach Alert: 3TB of NHS Scotland Data Held Ransom by Cyber Threat
A ransomware group targeting a small group of patients has published clinical data related to a small number of those patients on the internet that the Dumfries and Galloway Health Board is aware of. In the meantime, three terabytes…
Kiosks in Brookline is Tracking Cell Phone Data
Data is everywhere. It is at your fingertips. It’s all over town, yet your info may be shared around without your knowledge. Brookline put digital signs throughout town, which have gotten people talking since they are collecting individual cell…
Hacker Generates 1 Billion CGT Tokens Valued at $40 Million within Curio Ecosystem
The Curio decentralized finance (DeFi) initiative encountered a breach, with experts from Cyvers Alerts approximating the incurred losses to be around $16 million. The breach appears to have been orchestrated through an exploitation of vulnerabilities within the permissioned access…
Data Highways: Navigating the Privacy Pitfalls of New Automobiles
There is a possibility that these vehicles may be collecting vast amounts of information about their users that can be accessed by advertisers, data brokers, insurance companies and others, and that information could be shared with several companies including…
Unveiling the New Era of Hacking Ethics: Profit Over Principles
Hacking, once a realm of curiosity-driven exploration, has morphed into a complex ecosystem of profit-driven cybercrime. Originating in the 1960s, hacking was fueled by the insatiable curiosity of a brilliant community known as “hackers.” These early pioneers sought to…
Ransomware Strikes Tarrant Appraisal District
Tarrant Appraisal District (TAD) finds itself grappling with a major setback as its website falls prey to a criminal ransomware attack, resulting in a disruption of its essential services. The attack, which was discovered on Thursday, prompted swift action…
Unmasking Cyber Shadows: New Zealand’s Battle Against State-Backed Hackers
Recently, New Zealand accused China of engaging in “malicious cyber activity” targeting its parliament. This accusation sheds light on the growing tensions between nations and the need to safeguard democratic institutions from cyber espionage. In this blog, we delve into…
Facebook Spied on Users’ Snapchat Traffic in a Covert Operation, Documents Reveal
In 2016, Facebook initiated a secret initiative to intercept and decrypt network traffic between Snapchat users and the company’s servers. According to recently revealed court filings, the purpose was to better analyse user behaviour and help Facebook compete with…
‘Tycoon’ Malware Kit Bypasses Microsoft and Google Multifactor Authentication
An emerging phishing kit called “Tycoon 2FA” is gaining widespread use among threat actors, who are employing it to target Microsoft 365 and Gmail email accounts. This kit, discovered by researchers at Sekoia, has been active since at least…