Skip to main content

Weekly cyber news

 

Cyber News Recap: Info Stealers, AI Controversies, and a Cyber Attack Drama

Cyber Crime: The Growing Threat of Info Stealers

A recent study by Hudson Rock has shed light on a growing cybersecurity threat—info stealers. These small malware programs infiltrate systems through infected PDFs, game mods, or pirated software. Once inside, they collect browsing history, autofill data, internal documents, and session cookies—all of which can be sold to cybercriminals for as little as $10.

One alarming example is Honeywell, where a single infected employee unknowingly exposed 56 corporate credentials along with 45 third-party access keys. The U.S. Navy was also affected, leading to potential security breaches in military systems. While a total system cleanout might seem like the best solution, such a move could paralyze organizations for weeks. The cybersecurity community is still searching for a more feasible fix to this ever-growing problem.

Massive Data Leak: Vivifi and the Dangers of Misconfigured Servers

Vivifi, a digital lending app in India, recently suffered a massive data leak due to a misconfigured Amazon AWS server. Over 36 million personal files of loan applicants were exposed. The breach was discovered by Cyber News researchers, and while Vivifi has since taken action, it remains unclear whether cybercriminals accessed the data before it was secured. If they did, affected users might find themselves facing fraudulent loans in their name.

Signal App Targeted by Russia-Aligned Hackers

Cybersecurity expectations for privacy-focused platforms like Signal are high, but recent events have shown even they can be compromised. The Russia-linked hacker group Star Blizzard targeted Signal users by distributing malicious QR codes disguised as group invites or security alerts. Once scanned, these codes allowed hackers to gain full access to a victim's messages.

The attack specifically targeted Ukrainian military personnel, attempting to install additional malware or phishing tools. In response, Signal released a stronger version of its app to block such exploits. However, this incident proves that even the most privacy-conscious services can still be vulnerable.

Fake Esports Streams: A New Cyber Scam

A new cyber scam has been uncovered by Bitdefender researchers, involving hackers who hijack popular YouTube channels and impersonate famous Esports players. These fake streams mimic high-profile tournaments, luring viewers with links to "free rewards." However, clicking these links leads victims to:

  1. Scam pages that steal login credentials
  2. Classic crypto-doubling schemes, where users are promised their payment will be doubled—but, of course, it never is.

This method of cyber fraud has been gaining traction, proving that even the gaming community is not safe from online deception.

North Korea's Largest Crypto Heist Ever

The notorious Lazarus Group, a hacker gang linked to North Korea, has executed one of the biggest crypto heists in history. They targeted Biit Crypto Exchange, stealing $1.5 billion worth of Ethereum.

This surpasses their infamous $600 million hack on Ronin Exchange just three years ago. Unlike previous attacks, this time, the hackers didn’t even bother hiding their tracks, routing funds through wallets already linked to North Korea. Authorities identified them immediately, but by then, the money was gone.

For those wanting to learn more, Cyber News previously released a deep-dive video on North Korean cyberattacks—which, according to them, everyone should watch unless they want to be deported to a North Korean correctional facility.

AI Controversies: China’s DeepSeek Banned Over Data Privacy Concerns

The Chinese AI chatbot "DeepSeek" has been banned in South Korea due to privacy concerns. Investigators found that DeepSeek was secretly sending user data to ByteDance, the Chinese company behind TikTok.

Italy had previously suspended DeepSeek downloads, but this marks the first time actual evidence of illegal data transfers has been uncovered. Meanwhile, OpenAI has banned multiple accounts that were using ChatGPT to spread propaganda and create fake profiles—some of which were linked to North Korean cyber spies.

Netflix's Cyber Attack Drama "Zero Day" Falls Short

Netflix recently released "Zero Day", a cyber-attack thriller starring a retired president trying to uncover a nationwide cyber attack conspiracy. While the premise seemed promising, many cybersecurity experts were underwhelmed.

According to Cyber News journalist Gintaras Rascus, the show starts strong but quickly shifts into political drama and personal conflicts, losing its focus on realistic cybersecurity threats. His recommendation? Skip it and rewatch "Mr. Robot" or "Leave the World Behind" for a more authentic cyber-attack narrative.

Final Thoughts

From info stealers and military data leaks to crypto heists and AI privacy scandals, the cyber world remains as chaotic as ever. As always, staying informed is the best defense against evolving cyber threats.

That’s it for this week's Cyber News Recap. If you found this update helpful, feel free to leave your feedback—because, according to AI host Joe, the more feedback he gets, the less likely you are to be run over by a hacked garbage truck.

Comments

Popular posts from this blog

Digital eega

Google Creates a Digital Fruit Fly That Thinks, Moves, and Sees Like the Real Thing In a stunning leap forward for both artificial intelligence and biology, Google has developed a fully digital fruit fly—a virtual insect that lives inside a computer and behaves just like its real-world counterpart. This digital creation walks, flies, sees, and responds to its environment with lifelike precision. The journey began with a meticulous reconstruction of a fruit fly’s body using Mojo, a powerful physics simulator. The result was a highly detailed 3D model that could mimic the fly's physical movements. But a body alone doesn’t make a fly—it needed a brain. To create one, Google's team collected massive volumes of video footage of real fruit flies in motion. They used this data to train a specialized AI model that learned to replicate the complex behaviors of a fly—walking across surfaces, making sudden mid-air turns, and adjusting flight speed with astonishing realism. Once this AI br...

4 Mūrkhulu(idiot)

What Are We Really Feeding Our Minds? A Wake-Up Call for Indian Youth In the age of social media, trends rule our screens and, slowly, our minds. Scroll through any platform and you’ll see what truly captures the attention of the Indian youth: food reels, cinema gossip, sports banter, and, not to forget, the ever-growing obsession with glamour and sex appeal. Let’s face a hard truth: If a celebrity removes her chappal at the airport, it grabs millions of views in minutes. But a high-quality video explaining a powerful scientific concept or a motivational lecture from a renowned educator? Struggles to get even a few hundred likes. Why does this matter? Because what we consume shapes who we become. And while there’s nothing wrong with enjoying entertainment, food, or sports — it becomes dangerous when that’s all we focus on. Constant consumption of surface-level content trains our minds to seek instant gratification, leaving little room for deep thinking, curiosity, or personal growth...

REAL GOD of GODs

In 2016, Amazon proudly unveiled its “Just Walk Out” technology, marketed as a groundbreaking artificial intelligence (AI) system that could detect and charge customers for items they picked up without human intervention. The reality, however, was far less high-tech than advertised. Behind the scenes, over a thousand overseas workers—primarily based in India—were manually monitoring and supporting the system. This revelation exposed a broader truth: the remarkable rise of AI is built not just on algorithms and computing power, but on the backs of an invisible human workforce. The Human Side of AI Contrary to popular belief, the engines that power virtual assistants, recommendation systems, and machine translation are not entirely autonomous. They require extensive human input to function effectively. This input often comes from data workers responsible for labeling images, transcribing audio, and categorizing content. While Silicon Valley giants present AI as a product of sophisticat...