The incorporation of Artificial Intelligence (AI) into educational settings holds the promise of transforming both the learning experience for students and the teaching methods employed by educators. AI algorithms, when integrated into the classroom, have the capability to offer…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Which is Better: VPN or Microsoft Security Service Edge (SSE)?
In the ever-evolving world of artificial intelligence and cybersecurity threats, Microsoft has unveiled Microsoft Global safe Access, also known as Security Service Edge (SSE), serving as a ground-breaking solution for safe remote access. Designed to improve the connectivity between workplaces,…
North Korean Hacking Outfit Lazarus Siphons $1.2M of Bitcoin From Coin Mixer
Lazarus Group, a notorious hacker group from North Korea, reportedly moved almost $1.2 million worth of Bitcoin (BTC) from a coin mixer to a holding wallet. This move, which is the largest transaction they have made in the last…
Connected Tools, Connected Risks: Cybercriminals Use Wrenches as Gateways to Ransomware
Security researchers have discovered that hackers may be able to cause mayhem by hijacking torque wrenches that are connected to Wi-Fi in car factories. According to experts, network-connected wrenches used worldwide are now vulnerable to ransomware hackers, who can…
Hays Research Reveals the Increasing AI Adoption in Scottish Workplaces
Artificial intelligence (AI) tool adoption in Scottish companies has significantly increased, according to a new survey by recruitment firm Hays. The study, which is based on a poll with almost 15,000 replies from professionals and employers—including 886 from Scotland—shows a…
Implementation Flaws Identified in Post-Quantum Encryption Algorithm
Two implementation flaws have been identified in the Kyber key encapsulation mechanism (KEM), an encryption standard intended to safeguard networks from future attacks by quantum computers. Collectively known as “KyberSlash,” these flaws could allow cybercriminals to discover encryption keys. …
This Malware is Assaulting Critical US Infrastructure for Almost a Year
Over the course of the last 11 months, a threat group has actively engaged in a phishing campaign targeting employees across various companies, distributing an open-source trojan program named AsyncRAT. The victims of this campaign notably include companies responsible…
Swatting: Cyber Attacks on Healthcare
In a concerning trend, cybercriminals are using a tactic called “swatting” to target medical institutions via their patients, aiming to coerce hospitals into paying ransoms. Swatting involves making repeated false reports to the police about individuals, leading armed authorities…
Guardians of Finance: loanDepot Confronts Alleged Ransomware Offensive
Among the leading lenders in the United States, loanDepot has confirmed that the cyber incident it announced over the weekend was a ransomware attack that encrypted data. In the United States, LoanDepot is one of the biggest nonbank mortgage…
Myanmar Rebels Take Authority of ‘Pig Butchering’ Scam City Laukkaing
Well known for being a hub for online scams near the border with China, Laukkaing is presently under the authority of a coalition of rebel groups in Myanmar. On Thursday, the Three Brotherhood Alliance, which had conducted a surprise attack…