Tag: CySecurity News – Latest Information Security and Hacking Incidents

The Role of IoT in Modern Infrastructure

Imagine if someone told you in the early 2000s that entire industries would run almost by themselves, thanks to a network of connected devices. Today, this is no longer science fiction but our reality, thanks to the Internet of Things…

How to Protect Your Online Accounts from Hackers

  Hackers are increasingly targeting individuals to steal cryptocurrency, access bank accounts, or engage in stalking. Although these attacks are relatively rare, it’s crucial to know how to protect yourself if you suspect someone has accessed your email or social…

3 Billion Attacks and Counting: The IDF’s Cyber Resilience

The Battlefield: Cloud Computing Cloud computing has become an integral part of modern military operations. The IDF relies heavily on cloud-based systems from troop management to logistics, communication, and intelligence gathering. These systems allow for flexibility, scalability, and efficient resource…

Are We Ready for the Next Wave of Cyber Threats?

In our increasingly digital world, cybersecurity is a growing concern for everyone— from businesses and governments to everyday individuals. As technology advances, it opens up exciting possibilities and creates new, sophisticated cyber threats. Recent high-profile attacks, like those on Ascension…

New Hacking Method: Akami DNS Data Exfiltration

  When it comes to cybercrime, getting into a system is only half the battle; the real challenge is extracting the stolen data without being detected. Companies often focus on preventing unauthorised access, but they must also ensure that data…

Raman Research Institute’s Breakthrough in Quantum Cybersecurity

  Scientists at the Raman Research Institute have achieved a significant breakthrough in cybersecurity by developing a novel method for generating truly unpredictable random numbers. This development is essential for strengthening encryption in quantum communications, addressing one of the most…

AI Minefield: Risks of Gen AI in Your Personal Sphere

Many customers are captivated by Gen AI, employing new technologies for a variety of personal and corporate purposes.  However, many people ignore the serious privacy implications. Is Generative AI all sunshine and rainbows? Consumer AI products, such as OpenAI’s ChatGPT,…

Phishing Kit FishXProxy Equips Online Criminals for Success

  Phishing campaigns have always been a threat, but a new toolkit called FishXProxy is making it alarmingly easy for even inexperienced cybercriminals to carry out sophisticated scams.  SlashNext Email Security researchers have disclosed exclusive details about FishXProxy, a new…

Microsoft Faces Criticism Over Data Breach Notification Emails

  Microsoft recently began notifying some customers via email about a potential data breach that might have compromised their personal information. However, the company’s approach has faced heavy criticism, with many saying the emails resembled spam or phishing attempts. Cybersecurity…

Debunking Common Myths About VPNs

Virtual Private Networks (VPNs) are important tools for online privacy, but they’re often misunderstood. Here, we clear up the top five myths to help you understand what VPNs can and can’t do for your digital security. Myth 1: All VPNs…

Akira Ransomware: The Need for Rapid Response

Threat actors wielding the Akira ransomware demonstrated unprecedented efficiency in a recent cyber attack that sent shockwaves through the cybersecurity community.  Their lightning-fast data exfiltration took just over two hours, representing a dramatic shift in the average time it takes…

Improved ViperSoftX Malware Distributed Through eBooks

  Researchers have found new advancements in the ViperSoftX info-stealing malware, which was first discovered in 2020. This malware has become more sophisticated, using advanced techniques to avoid detection. One of its new methods is using the Common Language Runtime…

The Impact of AI on Society and Science

  Nowadays, everyone is talking about artificial intelligence (AI). Governments view AI as both an opportunity and a challenge. Industries are excited about AI’s potential to boost productivity, while academia is actively incorporating AI into teaching and research. However, the…

Poland Pushes for Shorter Drug Data Protection in EU

  At a recent EU meeting in Luxembourg, Poland supported a European Commission proposal to shorten the time new drugs are protected by data exclusivity rules. Health Minister Izabela Leszczyna said Poland prefers one year of market protection over longer…

Microsoft’s Breach Notification Emails Wind Up in Spam Folder

  Midnight Blizzard, a Russian nation-state hacker gang, breached Microsoft’s security last year, gaining access to the emails of multiple customers. In late June, Microsoft revealed that more organisations were affected than previously assumed. However, the company’s attempts to notify…

Mobile Encryption Innovation Aids Criminals, Europol Reports

  Europol has proposed solutions to address some of the challenges posed by privacy-enhancing technologies found in Home Routing, which pose a challenge for law enforcement agencies in intercepting communications during criminal investigations as a result of these technologies. There…

DarkMe RAT: Microsoft SmartScreen Vulnerability Explored

In recent months, cybersecurity researchers have detected a surge in the exploitation of a critical vulnerability known as CVE-2024-21412. This vulnerability specifically targets Microsoft SmartScreen, a security feature designed to protect users from malicious websites and downloads.  In this blog…

Double-Scam Alert: How Fraudsters Exploit Scam Victims Twice

The ACCC (Australian Competition and Consumer Commission) has cautioned that scammers are approaching victims with false offers to assist them in recovering from scams.  Scammers and Fake Recovery Offers The National Anti-Scam Centre warns Australians who have had their money…

Here’s How to Change IP Address Without VPN

  The internet is becoming an increasingly important aspect of people’s lives since it allows them to perform an array of activities with minimal effort. However, it is also becoming a more dangerous place, as many hackers harm you by…

Hackers Leak 10 Billion Passwords How Users Should Respond

  Several months ago, security researchers discovered the world’s largest collection of stolen passwords and credentials had been uploaded to an infamous criminal marketplace where cybercriminals would trade such credentials for a considerable amount of money. A hacker known as…

New Golang-Based Botnet ‘Zergeca’ Discovered

  Researchers at QiAnXin XLab have found a new and dangerous botnet called Zergeca. This botnet, written in the Go programming language (Golang), can launch powerful distributed denial-of-service (DDoS) attacks, which can overwhelm and shut down targeted websites or services.…

OpenAI Hack Exposes Hidden Risks in AI’s Data Goldmine

A recent security incident at OpenAI serves as a reminder that AI companies have become prime targets for hackers. Although the breach, which came to light following comments by former OpenAI employee Leopold Aschenbrenner, appears to have been limited to…

FIA Confirms Cyberattack Compromising Email Accounts

  The Fédération Internationale de l’Automobile (FIA), the governing body overseeing Formula 1 and other major motorsports worldwide, recently disclosed a significant cyberattack. This breach resulted from phishing attacks that compromised personal data within two FIA email accounts, exposing vulnerabilities…

Hacker Breaches OpenAI, Steals Sensitive AI Tech Details

  Earlier this year, a hacker successfully breached OpenAI’s internal messaging systems, obtaining sensitive details about the company’s AI technologies. The incident, initially kept under wraps by OpenAI, was not reported to authorities as it was not considered a threat…

Critical npm Account Takeover Vulnerability Sold on Dark Web

  A cybercriminal known as Alderson1337 has emerged on BreachForums, offering a critical exploit targeting npm accounts. This vulnerability poses a significant threat to npm, a crucial package manager for JavaScript managed by npm, Inc., a subsidiary of GitHub. Alderson1337…

Breaking the Silence: The OpenAI Security Breach Unveiled

In April 2023, OpenAI, a leading artificial intelligence research organization, faced a significant security breach. A hacker gained unauthorized access to the company’s internal messaging system, raising concerns about data security, transparency, and the protection of intellectual property.  In this…

Hackers Attack HFS Servers to Install Malware and Mine Monero

  Cybersecurity researchers have identified a wave of attacks targeting outdated versions of the HTTP File Server (HFS) software from Rejetto, aiming to distribute malware and cryptocurrency mining tools. These attacks exploit a critical security flaw known as CVE-2024-23692, which…

YouTube: A Prime Target for Cybercriminals

As one of today’s most popular social media platforms, YouTube frequently attracts cybercriminals who exploit it to run scams and distribute malware. These schemes often involve videos masquerading as tutorials for popular software or ads for cryptocurrency giveaways. In other…

RBI Issues Advisory to Support Cybersecurity in Banks

  Amid escalating cyber threats, the Reserve Bank of India (RBI) has released a comprehensive advisory to all scheduled commercial banks. This advisory, disseminated by the Department of Banking Supervision in Mumbai, stresses upon the paramount importance of robust cybersecurity…

Maintaining Sanity Amidst Unnecessary CVE Reports

Developers strive to maintain robust codebases, but occasionally, they encounter dubious or exaggerated reports that can disrupt their work.  A recent incident involving the popular open-source project “ip” sheds light on the challenges faced by developers when dealing with Common…

New Intel CPU Vulnerability ‘Indirector’ Found

Researchers from the University of California, San Diego, have discovered a new vulnerability in modern Intel processors, specifically the Raptor Lake and Alder Lake generations. This vulnerability, named ‘Indirector,’ can be used to steal sensitive information from the CPU.  The…

CocoaPods Security Alert: Critical Bugs Expose Millions of Apps

A recent security analysis discovered critical vulnerabilities in CocoaPods, the widely used dependency management platform for Apple developers. These vulnerabilities pose significant risks to iOS and macOS apps, potentially allowing attackers to compromise user data and system integrity. Apple CocoaPods…

New Rules for Quantum Encryption Unveiled by Cryptographers

  Cryptographers are making significant strides in the field of quantum encryption, developing new rules that promise to enhance data security in the quantum computing age. As quantum computers advance, they pose a threat to current encryption methods, which rely…

Tech Giants Face Backlash Over AI Privacy Concerns

Microsoft recently faced material backlash over its new AI tool, Recall, leading to a delayed release. Recall, introduced last month as a feature of Microsoft’s new AI companion, captures screen images every few seconds to create a searchable library. This…

The Future of Cybersecurity Jobs in an AI-Driven World

  The Future of Cybersecurity Jobs in an AI-Driven World Artificial Intelligence (AI) is revolutionizing the cybersecurity landscape, enhancing both the capabilities of cyber attackers and defenders. But a pressing question remains: Will AI replace cybersecurity jobs in the future?…

Five Challenges to Adoption of Liquid Cooling in Data Centers

  Data centre liquid cooling systems are becoming increasingly popular due to their greater heat management effectiveness when compared to traditional air cooling methods. However, as technology advances, new security issues emerge, such as cybersecurity and physical risks.  These concerns…

Critical Vulnerabilities Found in Emerson Gas Chromographs Expose Systems

  Multiple critical vulnerabilities have been identified in Emerson gas chromatographs, posing risks such as unauthorized access to sensitive data, denial-of-service conditions, and arbitrary command execution. Gas chromatographs are essential in various industries like chemical, environmental, and healthcare sectors for…