Skip to main content

Weekly cyber news

 

Cyber News Recap: Info Stealers, AI Controversies, and a Cyber Attack Drama

Cyber Crime: The Growing Threat of Info Stealers

A recent study by Hudson Rock has shed light on a growing cybersecurity threat—info stealers. These small malware programs infiltrate systems through infected PDFs, game mods, or pirated software. Once inside, they collect browsing history, autofill data, internal documents, and session cookies—all of which can be sold to cybercriminals for as little as $10.

One alarming example is Honeywell, where a single infected employee unknowingly exposed 56 corporate credentials along with 45 third-party access keys. The U.S. Navy was also affected, leading to potential security breaches in military systems. While a total system cleanout might seem like the best solution, such a move could paralyze organizations for weeks. The cybersecurity community is still searching for a more feasible fix to this ever-growing problem.

Massive Data Leak: Vivifi and the Dangers of Misconfigured Servers

Vivifi, a digital lending app in India, recently suffered a massive data leak due to a misconfigured Amazon AWS server. Over 36 million personal files of loan applicants were exposed. The breach was discovered by Cyber News researchers, and while Vivifi has since taken action, it remains unclear whether cybercriminals accessed the data before it was secured. If they did, affected users might find themselves facing fraudulent loans in their name.

Signal App Targeted by Russia-Aligned Hackers

Cybersecurity expectations for privacy-focused platforms like Signal are high, but recent events have shown even they can be compromised. The Russia-linked hacker group Star Blizzard targeted Signal users by distributing malicious QR codes disguised as group invites or security alerts. Once scanned, these codes allowed hackers to gain full access to a victim's messages.

The attack specifically targeted Ukrainian military personnel, attempting to install additional malware or phishing tools. In response, Signal released a stronger version of its app to block such exploits. However, this incident proves that even the most privacy-conscious services can still be vulnerable.

Fake Esports Streams: A New Cyber Scam

A new cyber scam has been uncovered by Bitdefender researchers, involving hackers who hijack popular YouTube channels and impersonate famous Esports players. These fake streams mimic high-profile tournaments, luring viewers with links to "free rewards." However, clicking these links leads victims to:

  1. Scam pages that steal login credentials
  2. Classic crypto-doubling schemes, where users are promised their payment will be doubled—but, of course, it never is.

This method of cyber fraud has been gaining traction, proving that even the gaming community is not safe from online deception.

North Korea's Largest Crypto Heist Ever

The notorious Lazarus Group, a hacker gang linked to North Korea, has executed one of the biggest crypto heists in history. They targeted Biit Crypto Exchange, stealing $1.5 billion worth of Ethereum.

This surpasses their infamous $600 million hack on Ronin Exchange just three years ago. Unlike previous attacks, this time, the hackers didn’t even bother hiding their tracks, routing funds through wallets already linked to North Korea. Authorities identified them immediately, but by then, the money was gone.

For those wanting to learn more, Cyber News previously released a deep-dive video on North Korean cyberattacks—which, according to them, everyone should watch unless they want to be deported to a North Korean correctional facility.

AI Controversies: China’s DeepSeek Banned Over Data Privacy Concerns

The Chinese AI chatbot "DeepSeek" has been banned in South Korea due to privacy concerns. Investigators found that DeepSeek was secretly sending user data to ByteDance, the Chinese company behind TikTok.

Italy had previously suspended DeepSeek downloads, but this marks the first time actual evidence of illegal data transfers has been uncovered. Meanwhile, OpenAI has banned multiple accounts that were using ChatGPT to spread propaganda and create fake profiles—some of which were linked to North Korean cyber spies.

Netflix's Cyber Attack Drama "Zero Day" Falls Short

Netflix recently released "Zero Day", a cyber-attack thriller starring a retired president trying to uncover a nationwide cyber attack conspiracy. While the premise seemed promising, many cybersecurity experts were underwhelmed.

According to Cyber News journalist Gintaras Rascus, the show starts strong but quickly shifts into political drama and personal conflicts, losing its focus on realistic cybersecurity threats. His recommendation? Skip it and rewatch "Mr. Robot" or "Leave the World Behind" for a more authentic cyber-attack narrative.

Final Thoughts

From info stealers and military data leaks to crypto heists and AI privacy scandals, the cyber world remains as chaotic as ever. As always, staying informed is the best defense against evolving cyber threats.

That’s it for this week's Cyber News Recap. If you found this update helpful, feel free to leave your feedback—because, according to AI host Joe, the more feedback he gets, the less likely you are to be run over by a hacked garbage truck.

Comments

Popular posts from this blog

Selfie Kings vs. Newspaper Clings

  Human Adoption to Technology: From Early Adopters to Laggards 1. Early Adopters – The Trendsetters Early adopters are the visionaries. They may not invent the technology, but they are the first to see its potential and integrate it into their lives or businesses. These are the people who lined up outside stores for the first iPhone or started experimenting with ChatGPT when AI tools were just gaining attention. Their willingness to take risks sets the tone for wider acceptance. Importantly, they influence others—friends, colleagues, and society—by showcasing the possibilities of new tools. 2. Early Majority – The Practical Embracers The early majority waits until a technology proves useful and reliable. They are not as adventurous as early adopters, but they are curious and open-minded. This group looks for case studies, reviews, and success stories before taking the plunge. For instance, when online shopping platforms like Amazon and Flipkart became secure and user-frien...

4 Mūrkhulu(idiot)

What Are We Really Feeding Our Minds? A Wake-Up Call for Indian Youth In the age of social media, trends rule our screens and, slowly, our minds. Scroll through any platform and you’ll see what truly captures the attention of the Indian youth: food reels, cinema gossip, sports banter, and, not to forget, the ever-growing obsession with glamour and sex appeal. Let’s face a hard truth: If a celebrity removes her chappal at the airport, it grabs millions of views in minutes. But a high-quality video explaining a powerful scientific concept or a motivational lecture from a renowned educator? Struggles to get even a few hundred likes. Why does this matter? Because what we consume shapes who we become. And while there’s nothing wrong with enjoying entertainment, food, or sports — it becomes dangerous when that’s all we focus on. Constant consumption of surface-level content trains our minds to seek instant gratification, leaving little room for deep thinking, curiosity, or personal growth...

Digital eega

Google Creates a Digital Fruit Fly That Thinks, Moves, and Sees Like the Real Thing In a stunning leap forward for both artificial intelligence and biology, Google has developed a fully digital fruit fly—a virtual insect that lives inside a computer and behaves just like its real-world counterpart. This digital creation walks, flies, sees, and responds to its environment with lifelike precision. The journey began with a meticulous reconstruction of a fruit fly’s body using Mojo, a powerful physics simulator. The result was a highly detailed 3D model that could mimic the fly's physical movements. But a body alone doesn’t make a fly—it needed a brain. To create one, Google's team collected massive volumes of video footage of real fruit flies in motion. They used this data to train a specialized AI model that learned to replicate the complex behaviors of a fly—walking across surfaces, making sudden mid-air turns, and adjusting flight speed with astonishing realism. Once this AI br...