The Python Package Index (PyPI) has informed users that no modifications are expected with the launch of “Project Archival,” a new method that enables publishers to archive their projects. To assist users in making informed decisions regarding their dependencies,…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
New Phishing Scam Targets Amazon Prime Subscribers
< p style=”text-align: justify;”> A new cyber attack is putting Amazon Prime subscribers at risk. Hackers are sending malicious emails warning users that their Prime membership is about to expire. These emails contain attachments with dangerous links that redirect…
Hackers Disguise as IT Employees: FBI Warns to Disable Local Admin Accounts
Hackers use various ways to steal user data, one recent trend, according to the FBI, shows they have started gaining employment with companies. The agency has pushed out public announcement I-012325-PSA, warning organizations in the U.S. to disable local admin…
New Apple Processor Vulnerabilities: FLOP and SLAP Exploit Speculative Execution
< p style=”text-align: justify;”>Security researchers have uncovered two new vulnerabilities in modern Apple processors, named FLOP and SLAP, which could allow attackers to remotely steal sensitive data through web browsers. Discovered by researchers from the Georgia Institute of Technology…
Cyberattackers Exploit GhostGPT for Low-Cost Malware Development
The landscape of cybersecurity has been greatly transformed by artificial intelligence, which has provided both transformative opportunities as well as emerging challenges. Moreover, AI-powered security tools have made it possible for organizations to detect and respond to threats much…
Cybercriminals Exploit PDFs in Novel Mishing Campaign
In a recently uncovered phishing campaign, threat actors are employing malicious PDF files to target mobile device users in potentially more than fifty nations. Dubbed as the “PDF Mishing Attack,” the effort exposes new vulnerabilities in mobile platforms by…
North Korea’s Lazarus Group Launches Global Supply Chain Attack Targeting Developers
North Korea’s notorious hacking collective, Lazarus Group, has orchestrated a large-scale supply chain attack, compromising hundreds of victims worldwide, according to cybersecurity researchers. The operation, named Phantom Circuit, remains active as of this month. The group injected malicious backdoors…
FDA Warns of Cybersecurity Risks in Contec and Epsimed Patient Monitors
The U.S. Food and Drug Administration (FDA) has issued a safety communication highlighting cybersecurity vulnerabilities in certain patient monitors manufactured by Contec and relabeled by Epsimed. The FDA’s notice, published on Thursday, identifies three critical security flaws that could…
Generative AI in Cybersecurity: A Double-Edged Sword
Generative AI (GenAI) is transforming the cybersecurity landscape, with 52% of CISOs prioritizing innovation using emerging technologies. However, a significant disconnect exists, as only 33% of board members view these technologies as a top priority. This gap underscores the challenge…
The Evolving Role of Multi-Factor Authentication in Cybersecurity
< p style=”text-align: justify;”>In recent years, the cybersecurity landscape has faced an unprecedented wave of threats. State-sponsored cybercriminals and less experienced attackers armed with sophisticated tools from the dark web are relentlessly targeting weak links in global cybersecurity systems.…