“Fake Faces, Real Threats: Understanding Deepfakes in Cybersecurity” 

Deepfake is a rising concern in the world of cyber security as it creates hyper-realistic audio, video which could trick people and even machines to be easily manipulated into thinking it as real and authentic and hence causing several consequences of scams and frauds such as impersonation and spreading misinformation.  By smoothly fusing facts and …

Cybersecurity Transparency: The SEC’s Action Against Ashford Inc.

In January 2025, the U.S. Securities and Exchange Commission (SEC) took a decisive action against Ashford Inc., a Dallas-based asset management firm primarily serving the hospitality industry, for its failure to disclose critical details about a cyberattack that compromised sensitive information of approximately 46,000 hotel guests [3][5]. A copy of the SEC’s January 13, 2025, …

Bootkitty: The First UEFI Bootkit for Linux

In November of 2024, a bootkit.efi hash was uploaded to the Virus Total database by an anonymous source (1), to which researchers at ESET uncovered that this binary pertained to the first of its kind: a UEFI Bootkit written not for Windows, but for Linux (2). Through their analysis, ESET determined that the application, titled …

Millions of location data were hacked from Gravy Analytics

A recent data breach has revealed how popular apps (Tinder, Grindr, Candy Crush etc.) may have unknowingly participated in the harvesting of sensitive location data.[1] The data was collected through the advertising ecosystem and even the app developers might not have been aware of it. This breach, which involved location data company Gravy Analytics, reveals …

Google Ads Heist: Hackers use Google Search Ads to Steal Accounts for Malvertising Scams

Cybercriminals, including those of Portuguese origin operating out of Brazil, Asia-based threat actors using advertiser accounts from Hong Kong, and a threat actor group of Eastern Europeans, are using Google search advertisements to promote phishing sites that steal advertisers’ credentials for the Google Ads platform and utilize it to push out malvertising campaigns. 1 How …

FireScam Android Malware: A New Threat Disguised as Telegram

Introduction Mobile malware remains one of the greatest threats in the world of technology today with many unscrupulous apps bobbing up from time to time. A prime example is the recent FireScam Android app which impersonates the popular messaging platform Telegram. The fraudulent software has been developed to steal sensitive user data and it’s dangerous …

Lazarus Group Exploits Fake LinkedIn Profiles to Target Web3 Developers in Operation 99

The Lazarus Group, a North Korea-linked hacking organization known for high-profile cyberattacks like the WannaCry ransomware, has launched a new operation called Operation 99. This campaign targets software developers in the Web3 and cryptocurrency sectors, aiming to steal sensitive information and deploy malware. According to Ryan Sherstobitoff, Senior Vice President at SecurityScorecard, the attack starts …

Apple Users Could Soon Be Eligible for a Cash Payout: The $95 Million Settlement and the Ongoing Privacy Debate

In January 2025, Apple settled a major class action lawsuit for $95 million over privacy concerns with its Siri virtual assistant. The lawsuit had been brewing for years and was centered around allegations that Siri was secretly collecting data, possibly even eavesdropping. If you’re a regular Siri user on your iPhone or iPad, this news …

Breath of Insecurity: Pacific Pulmonary Medical Group’s Data Breach Exposes Patient Information

In the digital age, a single compromised password can unleash a tornado of privacy risks. On a chilly October morning in 2024, Pacific Pulmonary Medical Group discovered a nightmare scenario that would send chills down every patient’s spine: their sensitive medical data had been exposed, laying bare the fragile digital defences of modern healthcare. This …