Cybersecurity

Draft United Nations Convention Against Cybercrime

This is the definitive text, accompanied by the proposed UNGA resolution and interpretative note, which will be submitted for adoption on Thursday morning. Today’s formal session has been canceled to allow delegations to discuss and find common ground on the remaining areas of disagreement. Delegates need to decide on the final name for the convention. […]

Cybersecurity

FBI urges prioritizing security in software suppliers

The FBI, along with CISA, advises businesses and organizations to choose software suppliers that prioritize security from the development phase. This approach aims to create a safer software landscape. To assist organizations, the FBI and CISA have released the ‘Secure by Demand Guide’. This document outlines how to evaluate software suppliers’ security practices during procurement. […]

Cybersecurity
Google Cloud Infiltration: Cybercriminals Exploit Calendar Events

Google Cloud Infiltration: Cybercriminals Exploit Calendar Events

Google warns of a novel cyber threat using cloud services as attackers repurpose Google Calendar events for command-and-control (C2) operations. The “Google Calendar RAT” exploit, initially shared on GitHub in June, has caught attention in the cybersecurity community, with 15 forks indicating interest, although not yet observed in active deployment. Cybercriminals are increasingly leveraging legitimate […]

Cybersecurity Data Protection Fraud

FCC: New Rules Shield Consumers from SIM Swapping

The Federal Communications Commission (FCC) has implemented robust rules on November 15, 2023, to safeguard consumers against scams targeting their cell phone accounts. The rules specifically combat SIM swapping and port-out fraud, shielding users from scammers attempting to manipulate their personal information and data. Scammers often use SIM swapping to fraudulently transfer a victim’s wireless […]

Cybersecurity Phishing Scam

Massive scam with 100 well known Brands with fake websites

A widespread brand impersonation campaign has been targeting over 100 popular apparel, footwear, and clothing brands since June 2022. The campaign involves approximately 6,000 fake websites across at least 3,000 domains, including inactive ones. Brands such as Nike, Puma, Asics, Vans, Adidas, and many others have been impersonated.The campaign experienced a significant increase in activity […]

AI Cybersecurity Privacy

Risks of Large Language Models such as ChatGPT

Large language models (LLMs), such as ChatGPT, have gained immense popularity and are being rapidly deployed by various organizations.LLMs are trained on large amounts of text-based data and use deep learning to generate human-like text. While LLMs have impressive capabilities, they are not perfect and can make mistakes, hallucinate incorrect facts, and exhibit biases. Concerns […]

Cybersecurity Password Management

Hackers Infect TP-Link Router Firmware to Attack EU Entities

Cybercriminals have employed a sophisticated attack method by infecting TP-Link router firmware to target European Union (EU) entities, as reported by Bleeping Computer.The attackers have compromised the firmware of TP-Link routers, a popular brand used widely across Europe, to gain unauthorized access and launch cyberattacks.The infected firmware allows hackers to control the compromised routers remotely, […]

Cybersecurity Data Breaches Personal data Privacy

Toyota exposed location data of 2.3 million customers for over a decade

Toyota has exposed the location data of 2.3 million customers for over a decade. The information was accessible due to a security breach in their sales module. The data included customers’ names, email addresses, and vehicle identification numbers (VINs). The breach occurred in Japan, but the data of customers from several countries, including the US […]