Threats
Human Rights Watch: ‘Photos of children being used to train AI tools’
According to Human Rights Watch personal photos of Australian children are being used to create powerful artificial intelligence (AI) tools. Even worse: parents aren’t aware of it and haven’t consented.
Read more about Human Rights Watch: ‘Photos of children being used to train AI tools’
LockBit claims responsibility for cyber attack on Croatian hospital
Ransomware gang LockBit claims it’s the mastermind behind the cyber attack on the University Hospital Centre in Zagreb, also known as KBC Zagreb.
Read more about LockBit claims responsibility for cyber attack on Croatian hospital
Photos of 500K members of UK health club Total Fitness leaked due to unprotected database
Cybersecurity researcher Jeremiah Fowler discovered a non-password protected database belonging to Total Fitness, containing 474,651 pictures of members.
Read more about Photos of 500K members of UK health club Total Fitness leaked due to unprotected database
Researchers discover fake Chrome errors, tricking users into running malicious PowerShell scripts
Security researchers working for cybersecurity firm Proofpoint, have identified a new social engineering technique to trick Google Chrome users to run PowerShell scripts and install malware.
Read more about Researchers discover fake Chrome errors, tricking users into running malicious PowerShell scripts
ASUS releases patches for several router models
Taiwanese manufacturer ASUS has released an update for seven different router models, containing a critical vulnerability that lets attackers bypass authentication.
Read more about ASUS releases patches for several router models
NHS calls for blood donation after cyberattack on British hospitals
The National Health Service (NHS) is struggling to match patients’ blood after numerous London hospitals have been hit by a ransomware attack. To speed up the process, the healthcare system is appealing to people to donate O-type blood, the universal donor.
Read more about NHS calls for blood donation after cyberattack on British hospitals
Zero-day exploit used to hack high-profile TikTok accounts
Last week, attackers compromised numerous official TikTok accounts of high-profile brands and celebrities, such as CNN, Sony and Paris Hilton.
Read more about Zero-day exploit used to hack high-profile TikTok accounts
Check Point sends out security reminder to fix unauthorized access to VPNs
Cybersecurity firm Check Point urges customers to install a bug fix for a vulnerability in its own VPN solution that’s been actively exploited by hackers.
Read more about Check Point sends out security reminder to fix unauthorized access to VPNs
Israeli intelligence agencies allegedly spying on ICC
For almost a decade, Israel has led a secret ‘war’ against the International Criminal Court (ICC). Intelligence agencies reportedly surveilled, hacked, pressured, smeared and threatened senior ICC staff in an effort to derail the court’s inquiries.
Read more about Israeli intelligence agencies allegedly spying on ICC
Check Point: ‘More hackers using VPN environments as entry point for cyberattacks’
Over the past few months, cybersecurity company Check Point has observed an increased interest of malicious groups misusing its remote access VPN devices as an entry point and attack vector into enterprises.
Read more about Check Point: ‘More hackers using VPN environments as entry point for cyberattacks’
Most US websites unprotected against bot attacks
While bot attacks are surging, the latest industry report shows that most US websites are vulnerable to simple bot attacks.
Read more about Most US websites unprotected against bot attacks
Scammers lurk on LinkedIn
Scammers are looking for their victims and other job sites, posing as recruiters for well-known companies, the Federal Trade Commission (FTC) warned.
Read more about Scammers lurk on LinkedIn
UK banks lagging behind on email security, study finds
More than half of banking institutions in the UK are slacking on cybersecurity, leaving staff and customers wide open to phishing attacks, analyst Proofpoint has warned.
Read more about UK banks lagging behind on email security, study finds
Security analyst issues payroll fraud warning
Hijacked employee email addresses can be used by criminals to impersonate workers and trick companies into paying them their salaries instead, a security analyst warns.
Read more about Security analyst issues payroll fraud warning
Engineering workstations deemed riskiest in critical infrastructure facilities
While hackers target most operational technology (OT) and industrial control system (ICS) devices, some receive more attention than others.
Read more about Engineering workstations deemed riskiest in critical infrastructure facilities
Bad to the cyber-bone: analyst warns of malicious bots flooding internet
Malicious programs that mimic human computer use for cybercriminal purposes, known as “bad bots,” are becoming more sophisticated, a study says.
Read more about Bad to the cyber-bone: analyst warns of malicious bots flooding internet
New threat actor on the cyber-scene in Ukraine, says analyst
A previously unidentified partisan group is believed to be using new malware programs to phish for details of targets in disputed Russian-held areas of Ukraine.
Read more about New threat actor on the cyber-scene in Ukraine, says analyst
Phishing scam caught using hijacked student accounts
Malicious hackers are taking over student email accounts and using these as a cover for social engineering scams aimed at tricking staff at other businesses into handing over sensitive data, a report has found.
Read more about Phishing scam caught using hijacked student accounts
Cookies from youtube.com – better not
Image source – pandasecurity.com Have you ever visited an online shopping website after a long time and saw your cart...
Read more about Cookies from youtube.com – better not
Why using Torrents can trap your computer into a botnet
As of 2020, there are 7.7 million IoT devices on the Internet. Most of these devices are not protected by...
Read more about Why using Torrents can trap your computer into a botnet