DECEMBER 9, 2022
NewsSecurity

Check Point and Microsoft unveil collaboration on AI-driven security measures

Check Point and Microsoft have teamed up to enhance Infinity AI Copilot with Microsoft Azure OpenAI Service, aiming to automate security tasks, improve incident response, and strengthen cybersecurity effectiveness in today's digit...

Security

Is microphone snooping employed by apps and websites for targeted ad recommendations?

Explore the mysteries behind ad recommendations on platforms like Facebook, Instagram, and Kenyan news websites. Unravel the workings of algorithms, data collection, and machine learning that create personalized ad experiences bas...

Security

Security experts caution that hackers are taking advantage of vulnerabilities in ConnectWise to deploy LockBit ransomware

Security experts warn of active exploitation of high-risk vulnerabilities in ConnectWise's ScreenConnect, a popular remote access tool. The flaws (CVE-2024-1709 and CVE-2024-1708) are being used by hackers to deploy LockBit ransom...

Security

FTC Prohibits Antivirus Giant Avast from Selling User Browsing Data to Advertisers.

The FTC bans Avast from selling users' web browsing data to advertisers, settling charges with a $16.5 million payment for redress. Avast's antivirus products, once touted for online tracking prevention, were found to compromise c...

Security

What factors contribute to the substantial profits of ransomware groups?

Explore the lucrative world of ransomware in 2023. Discover how hackers doubled their known payments, surpassing $1 billion. Uncover high-profile incidents like the MOVEit campaign by the Clop ransomware gang, where a never-before...

Security

Major technology companies voluntarily commit to combating election-related deepfakes

Tech giants, including Microsoft, Meta, Google, Amazon, and IBM, pledge to combat election-related deepfakes by adopting a voluntary accord at the Munich Security Conference. The accord involves detecting and labeling misleading p...

Security

“TheTruthSpy” Stalkerware Victims Uncovered by Hackers: Is Your Android Device Compromised?

TheTruthSpy, stalkerware, Android devices, security flaw, hacking groups, SiegedSec, ByteMeCrew, data breach, spyware lookup tool, consumer-grade spyware, Android spyware, security vulnerability, IMEI numbers, advertising IDs, sur...

SecurityStartups

Bugcrowd has secured $102 million for its ‘bug bounty’ security platform, engaging with a network of over 500,000 hackers.

Bugcrowd, a leading cybersecurity platform, secures $102 million in an equity round led by General Catalyst. The platform connects organizations like OpenAI and the U.S. government with a vast network of over 500,000 skilled hacke...

InsightsNewsSecurity

Political motivations drive internet restrictions in Africa, with Asia facing the highest number of such restrictions

As of 2023, internet restrictions persist globally, with Africa experiencing 17 cases, notably in Senegal. Governments employ shutdowns to censor public conversations, limiting freedom of speech. In total, 330 million Africans wer...

InsightsSecurity

Blocking WhatsApp Spam Messages Possible Without Opening the App

WhatsApp introduces a new feature enhancing user privacy and security. Users can now block spam messages from unknown contacts directly from the lock screen without opening them. This update simplifies the process of dealing with ...

InsightsSecurity

“URGENT: M-Pesa Unregistered Users Face Deadline for Fund Withdrawal – Act Now!”

Safaricom implements a groundbreaking telecom directive, ceasing unregistered mobile money transactions via M-Pesa from February 5, 2024. The move aligns with Kenya's regulations, urging users to redeem SMS vouchers by February 13...

InsightsSecurity

AI’s Symphony in Cybersecurity and the Dark Ballet of Cybercrime

“Unleashing Titans: The Dance of AI in Cybersecurity and Cybercrime’s Dark Symphony” In the vast arena of cyberspace, AI has emerged not just as a game-changer but as a transformative force that juggles the scale...

InsightsSecurity

“To Pay or Not to Pay: Navigating the Ransomware Decision”

“Cracking the Code: The Ransomware Riddle and Tips for Outsmarting Cyber Crooks” As the ominous shadow of ransomware attacks continues to loom over businesses, a pressing question echoes in the minds of leaders: To pay...

InsightsSecurity

Keep children safe from cyberthreats

In the dynamic and ever-evolving landscape of the digital realm, children are stepping into the online world at an increasingly tender age, armed with smartphones and tablets as their passports to a virtual universe. However, with...

InsightsSecurity

“Beware: AndroxGh0st Botnet Strikes! Feds Issue Alert as Cyber Threat Targets AWS, Azure, and Office 365 Credentials.”

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a warning about the AndroxGh0st malware, which is being employed by threat actors to build a dangerous botn...

InsightsSecurity

Crypto Crime Coup: 29-Year-Old Ukrainian Mastermind Nabbed in Epic Takedown for Exploiting Cloud Services in Cryptojacking Spree!

“Ukrainian Wunderkind’s Crypto Crime Spree Unveiled: 29-Year-Old Whizkid Nabs $2 Million in Epic Cloud Heist! Europol and Cyber Police Join Forces for Showdown in Mykolaiv” “In a blockbuster arrest, a 29-ye...

InsightsSecurity

A malware strain is employing a Google MultiLogin exploit to retain access even after a password reset.

Malware is exploiting an undocumented Google OAuth endpoint called MultiLogin, allowing attackers to maintain access to Google services even after a password reset. The exploit, revealed by a threat actor named PRISMA and incorpor...

NewsSecurity

Google has settled a $5 billion privacy lawsuit related to tracking users in ‘Incognito Mode.’

Google has agreed to settle a lawsuit filed in June 2020, accusing the company of misleading users about privacy when using the “incognito” or “private” mode in web browsers. The class-action lawsuit sought...

InsightsSecurity

Iranian hackers are employing a tool called MuddyC2Go in espionage attacks on telecom networks across Africa.

The Iranian nation-state actor, MuddyWater, has been using a new command-and-control (C2) framework called MuddyC2Go in cyber espionage attacks on the telecommunications sector in Egypt, Sudan, and Tanzania. The activity, also tra...

InsightsSecurity

Fake Microsoft Word documents are being used to distribute dangerous Nim-based malware

A recent phishing campaign is employing decoy Microsoft Word documents to deliver a backdoor written in the Nim programming language. Nim-based malware is less common, putting security experts at a disadvantage due to their unfami...





whatApp channel


wingu store
wingu store