Tag

Information Security

Can AI Granny Contain the Rising Threat of Scam Phone Calls?
Cyber Security
Can AI Granny Contain the Rising Threat of Scam Phone Calls?

The increasing frequency of scam phone calls has become a significant concern, with a majority of Brits wary of being caught in the fraudulent web. Over two-thirds of the population express apprehension about phone fraud, while an alarming one in five has endured weekly attempts. To counter this burgeoning menace, Virgin Media O2 has introduced an innovative solution: an AI-powered

Read More
Ransomware Attackers Target Cloud Services for Data Exfiltration
Cyber Security
Ransomware Attackers Target Cloud Services for Data Exfiltration

In an alarming development, ransomware attackers have increasingly turned to exploiting cloud services, such as Amazon S3 and Microsoft Azure Blob Storage, to facilitate data exfiltration and increase the pressure on their victims for ransom payments. The SentinelLabs report highlights this growing trend, where these popular cloud storage services are being leveraged for compromising IT systems. The Growing Trend This

Read More
Can Fortinet’s Vulnerable Codebase Survive Sophisticated Cyber Threats?
Cyber Security
Can Fortinet’s Vulnerable Codebase Survive Sophisticated Cyber Threats?

In a recent development that has heightened concerns in the cybersecurity community, watchTowr, a prominent attack surface management provider, has identified a new zero-day vulnerability in Fortinet products. Dubbed "FortiJump Higher," this flaw allows a managed FortiGate device to elevate its privileges and gain control over the FortiManager instance, posing significant risks to the security of these systems. The discovery

Read More
Are Your AI Models at Risk of Security Flaws and Data Exfiltration?
Cyber Security
Are Your AI Models at Risk of Security Flaws and Data Exfiltration?

When Palo Alto Networks’ Unit 42 recently discovered two significant security vulnerabilities in Google’s Vertex AI machine learning (ML) platform, it highlighted notable risks. These vulnerabilities have the potential to lead to unauthorized access, privilege escalation, and critical data exfiltration if exploited. Vertex AI, introduced in May 2021, offers a scalable environment for training and deploying custom ML models and

Read More
How Is DEEPDATA Malware Exploiting Fortinet VPN for Credential Theft?
Cyber Security
How Is DEEPDATA Malware Exploiting Fortinet VPN for Credential Theft?

Amid the constantly evolving landscape of cybersecurity threats, a new and troubling development has surfaced involving malware known as DEEPDATA. Deployed by the notable threat actor BrazenBamboo, DEEPDATA takes advantage of a vulnerability in Fortinet’s FortiClient for Windows to steal VPN credentials. This alarming vulnerability was first reported by Volexity in July 2024 and, worryingly, remains unpatched to this day.

Read More
Dubai Hosts Web3 Unleashed Hackathon Showcasing Top Blockchain Talent
Fintech Blockchain
Dubai Hosts Web3 Unleashed Hackathon Showcasing Top Blockchain Talent

On November 20, the bustling city of Dubai will be the stage for the grand finale of MENA’s flagship Web3 hackathon, hosted by Bybit and DMCC Crypto Centre. This event promises to be a pivotal moment for the blockchain and cryptocurrency community, as 15 innovative projects are set to present their cutting-edge Web3 visions. Originally, only ten projects were scheduled

Read More
Critical Flaw in TP-Link Routers: Remote Takeover and DoS Risk
Cyber Security
Critical Flaw in TP-Link Routers: Remote Takeover and DoS Risk

A significant security vulnerability has been discovered in TP-Link VN020-F3v(T) routers with firmware version TT_V6.2.1021. This flaw, identified as CVE-2024-11237, allows attackers to remotely take over the routers, leading to potential Denial of Service (DoS) and Remote Code Execution (RCE) attacks. These attacks can severely impact network functionality and compromise data security by allowing unauthorized access and control over network

Read More
Will NSO Group Face Consequences for Hacking WhatsApp With Pegasus Spyware?
Cyber Security
Will NSO Group Face Consequences for Hacking WhatsApp With Pegasus Spyware?

In the world of cybersecurity, the actions of surveillance technology firms have become a subject of intense scrutiny, particularly as they relate to privacy violations and unauthorized access to digital platforms. One prominent case is that of the NSO Group, an Israeli surveillance technology firm known for its Pegasus spyware, which has faced significant legal challenges following revelations that it

Read More
Is Chinese Linked Cyber-Espionage on Telecoms the Largest Yet?
Cyber Security
Is Chinese Linked Cyber-Espionage on Telecoms the Largest Yet?

A major cyber-espionage campaign linked to Chinese intelligence has infiltrated numerous U.S. and international telecom companies, including T-Mobile, raising alarms about the security of global communications. The attack is being described by U.S. officials as "historic" and "catastrophic," having primarily targeted high-value intelligence figures and lasting for over eight months. The sophisticated hackers exploited vulnerabilities in telecom infrastructure and employed

Read More
Bitcoin Options Expiry on Dec 27, 2024, Could Lead to Market Volatility
Fintech Blockchain
Bitcoin Options Expiry on Dec 27, 2024, Could Lead to Market Volatility

As December 27, 2024, approaches, the cryptocurrency market is bracing for significant upheavals driven by the impending expiration of an enormous $11.8 billion in Bitcoin options. This looming event is generating intense interest among traders and analysts alike, with the high stakes involved prompting widespread speculation about resultant market movements. Bitcoin’s current price, which hovers just above $90,000, reflects an

Read More
Can Meme Culture Drive Cryptocurrency Market Success Through LESTER?
Fintech Blockchain
Can Meme Culture Drive Cryptocurrency Market Success Through LESTER?

In the ever-evolving landscape of cryptocurrencies, a fascinating phenomenon has emerged that blends internet meme culture with digital assets, leading to impressive market success. One of the most recent and notable examples is the Solana Meme Coin Litecoin Mascot, commonly referred to as LESTER. Within just 48 hours of its launch on the Pump.fun platform, LESTER achieved a staggering $120

Read More
Bitcoin Faces Selling Pressure Amid Miner Outflows and Market Factors
Fintech Blockchain
Bitcoin Faces Selling Pressure Amid Miner Outflows and Market Factors

The past three days have been tumultuous for Bitcoin as miners transferred a cumulative total of 45,000 BTC to exchanges, significantly increasing selling pressure on the cryptocurrency’s price. This substantial transfer activity began on November 12, with 24,138 BTC being moved to exchanges, constituting one of the largest single-day outflows this year. The trend continued with 15,840 BTC and 5,500

Read More