Cybersecurity
Hacking the grid: How digital sabotage turns infrastructure into a weapon
Hacking the grid: How digital sabotage turns infrastructure into a weapon The modern power grid’s reliance on internet-connected computers makes it vulnerable to digital sabotage, where hackers can manipulate critical infrastructure without firing a shot. Malware can compromise controller devices, creating a “split reality” where legitimate commands are replaced with malicious instructions, leading to physical […]
๐ป Technology
NASA Develops Blockchain Technology to Enhance Air Travel Safety and Security
NASA Develops Blockchain Technology to Enhance Air Travel Safety and Security NASA has developed a blockchain technology to enhance air travel safety and security by protecting flight data from cyber threats. The system uses a decentralized database approach, where information is shared across a vast network, recording and verifying every change to ensure data accuracy […]
๐ป Technology
Two cybersecurity employees plead guilty to carrying out ransomware attacks
Two cybersecurity employees plead guilty to carrying out ransomware attacks Two former cybersecurity employees, Ryan Goldberg and Kevin Martin, have pleaded guilty to carrying out ransomware attacks. The duo extorted $1.2 million in Bitcoin from a medical device company and targeted several others using ALPHV / BlackCat ransomware. Goldberg, who was a ransomware negotiator, and […]
๐ป Technology
How hackers are using AI and how to protect yourself
How hackers are using AI and how to protect yourself โข Hackers are leveraging artificial intelligence (AI) to enhance their malicious activities, including phishing attacks, malware creation, and social engineering. โข AI-powered tools can analyze vast amounts of data to identify vulnerabilities and predict human behavior, making them more effective at evading detection. โข To […]
๐ป Technology
AI browsers are a cybersecurity time bomb
AI browsers are a cybersecurity time bomb A new generation of AI-powered web browsers has been launched, including ChatGPT Atlas and Microsoft’s Copilot Mode for Edge. These AI browsers can answer questions, summarize pages, and even take actions on your behalf, offering a more convenient and hands-off browsing experience. However, cybersecurity experts warn that this […]
๐ป Technology
Discord customer service data breach leaks user info and scanned photo IDs
Discord customer service data breach leaks user info and scanned photo IDs Discord suffered a data breach involving one of its third-party customer service providers. The unauthorized party gained access to user information, including names, usernames, emails, and credit card numbers (last four digits). Images of government IDs from users who had appealed an age […]
๐ป Technology
How poisoned data can trick AI โ and how to stop it
How poisoned data can trick AI โ and how to stop it Data poisoning refers to the intentional feeding of wrong or misleading data into an automated system, which can lead to dangerous outcomes such as backdoor attacks, data leaks, and espionage. Data poisoning can be used to disrupt critical infrastructure, such as transportation systems, […]
๐ป Technology
Your data privacy is slipping away โ hereโs why, and what you can do about it
Your data privacy is slipping away โ hereโs why, and what you can do about it Despite growing efforts to improve cybersecurity, personal data breaches are accelerating, with companies sending out over 1.3 billion notifications to victims in 2024. The three pillars of solid personal privacy protection are: accessible technical controls (e.g., encryption and multifactor […]
๐ป Technology
How vulnerable is critical infrastructure to cyberattack in the US?
How vulnerable is critical infrastructure to cyberattack in the US? Critical infrastructure in the US, including water, health, and energy systems, is increasingly vulnerable to cyberattacks. A “hybrid” battle between physical and digital attacks is becoming more common, making critical infrastructure a target for both nation-state and non-state actors. The 2021 Colonial Pipeline ransomware attack […]
๐ฐ News
Cyberattacks shake votersโ trust in elections, regardless of party
Cyberattacks shake votersโ trust in elections, regardless of party Cyberattacks are eroding trust in American elections, affecting both Democrats and Republicans, regardless of party affiliation. The digital transformation of voting systems has made them more accessible and efficient, but also more complex and vulnerable to cyber threats. A recent study found that even exposure to […]
๐ฐ News