image provided by pixabay

Businesses are Harvesting our Biometric Data – Should We Be Worried?

0
In our highly digital age, biometric data is everywhere- from facial recognition on our phones to fingerprints unlocking our laptops. Facial recognition is the most...
image provided by Pixabay

AI Chatbots Pass Certified Ethical Hacking Exams

0
Leading GenAI Chatbots were found to be able to pass a cybersecurity exam, as was discovered by researchers from the University of Missouri and...
image provided by pixabay

Ransomware Attacks are Increasing Hospital Mortality Rates

0
Though blaming the deaths of hospital patients on ransomware attacks might seem far-fetched, this claim has more basis in reality than you might think. A...
image provided by pixabay

Cybercrime Takedown Brings New Violent Cybergangs

0
Global law enforcement operations have made a major crackdown on cybergangs this past year. however, it seems that those groups are coming back with...
image provided by pixabay

Voice Messages – the New Cybercrime Frontier

0
With many reports claiming voice messages are gaining popularity, especially among the younger generation, malicious actors are now trying to use this trend to...
image provided by pixabay

The Cybersecurity Threat Lurking in Plain Sight

0
Research reveals that the internet is filled with millions of clickable links that redirect users to malicious destinations, also nicknamed "hijackable hyperlinks," and they...
image provided by pixabay

Space Cyberthreats – Biggest Risk to Space Operations

0
Researchers from California Polytechnic State University published a report stating that with governments and other space organizations focusing on the dangers of space debris...
image provided by pixabay

How Today’s Hackers Hide Their Malware

0
In the early days of the internet, sending malicious files to an unsuspecting victim was extremely easy, and many online users did not have...
images provided by pixabay

This Software Blocks AI Phishing Scams

0
The past few years have seen cybercriminals using more and more AI-based technology to design and execute scams and cyberattacks. AI chatbots (like Bard...
image provided by pixabay

Fake Error Pop-Up Makes Users Infect Themselves with Malware

0
A new social engineering attack method uses “copy-paste” technique to trick victims – hackers make a forged error message on Chrome with instructions “to...
image provided by pixabay

Can Cyberattacks Be Considered a War Crime?

0
International Criminal Court (ICC) prosecutors are currently investigating alleged Russian cyberattacks on Ukrainian civilian infrastructure as possible war crimes – the first ever confirmation...
image provided by pixabay

Emojis Replace Code in New Cyberattack

0
Instead of typing out full commands, the hackers are maximizing their efficiency when communicating with command and control (C2) servers by using emojis like...
image provided by pixabay

Data Breaches – The New Normal?

0
Despite advancements in technology and increased awareness of cybersecurity threats, companies continue to fall victim to breach attacks. Just this year has seen a...
images provided by pixabay

Severe Ransomware Attack on London Hospitals

0
Several major hospitals in London were victims of an ongoing cyberattack on a third-party lab provider, forcing them to send patients away and cancel...
image provided by pixabay

A Safer Future for AI with Stronger Algorithms

0
AI technology is spreading quickly throughout many different industries, and its integration depends on users’ trust and safety concerns. This matter becomes complicated when...
image provided by pixabay

EU Journalists Criticized Russia – and Got Hacked

0
A new investigation reveals that EU journalists and activists who have been critical of Russia were targeted with NSO’s Pegasus spyware. These cyberattacks reportedly targeted...
image provided by pixabay

The Dangerous World of SMS Phishing Scams

0
New research looks into SMS phishing operations, outlines the techniques used to collect additional data and identifies the actions law enforcement officials can take...
image provided by pixabay

Why Is Health Data Under Such a Cybersecurity Threat?

0
Health technology provider, e-prescription company MediSecure was recently subject to a severe large-scale ransomware attack affecting people's personal and health information, which apparently stemmed...
image provided by pixabay

Bank Data Stealing Malware Is Back Despite Arrests

0
Investigation shows that despite a recent crackdown on the Grandoreiro banking trojan malware, it is back and has been actively targeting 1500 banks globally. The...
image provided by pixabay

Ukraine Malware Blackouts and The Physical Threats of Cyber Warfare

0
Back in 2016, Ukraine experienced the first-ever known malware-caused blackout that affected a fifth of Kyiv's citizens. Six years later, during the early stages...
image provided by pixabay

The FBI Releases Warning of AI Voice Cloning Scams

0
The San Francisco division of the FBI is warning individuals and organizations to be aware of cybercriminals increasingly using artificial intelligence to “conduct sophisticated...
images provided by pixabay

The 2024 Olympics are Preparing for the Coming Cyberthreats

0
The Paris 2024 Olympics is preparing to face an unprecedented challenge in terms of cybersecurity, the main threats being organized crime, activists, and states. Paris...

Latest

image provided by pixabay

Improving Automatic Software Repair

0
FIXCHECK is a new approach to improve patch fix analysis that combines static analysis, randomized testing, and large language models, created by IMDEA Software...