The multiple attacks on Internet Archive

At present, cybersecurity incidents are increasing day by day. In an unprecedented series of events, the Internet Archive, the famous Wayback Machine, faced multiple significant cyber attacks recently. These incidents have spread through the digital preservation community and raised critical questions regarding the security measures of our collective online heritage. The First Data Breach: The …

Malicious AI-powered Cyber Threats: WormGPT

Artificial intelligence (AI) as we know it is growing in use at an exponential rate. Specifically, within the cybersecurity field, the rise of such AI technology simultaneously presents extraordinary opportunities and intimidating challenges. While AI can identify and exploit vulnerabilities easily, it introduces significant risks if it does not deploy its own set of security …

Cybercriminals attacked and stole records from BBC pension database

A security breach at the BBC Pension Scheme’s cloud-based service compromised the personal data of around 25,000 members in the last week of May 2024. Read more to know the details. BBC has suffered a major data breach, exposing the personal information of approximately 25,000 current and former employees. The broadcaster has one of the …

The Fortinet Data Breach: A Deep Dive into the Recent Cybersecurity Incident

Cybersecurity breaches are becoming increasingly common in a world where there is a significant increase in digital infrastructure. Fortinet, a key player that provides cybersecurity solutions, recently faced a security breach. This breach, which took place over a few months, has gained significant attention in the cybersecurity community. What Happened? Early in September 2024, Fortinet …

Understanding Cryptographic Attacks: Working, Prevention, Real-World Impacts, Strongest and Weakest Algorithm to Specific Attack – Teaching Aide

Meet our Team members: An Introduction to our Project : In today’s digital age, cryptography plays a vital role in securing communication, protecting sensitive data, and ensuring the integrity of information. However, as cryptographic techniques evolve, so too do the methods used by attackers to undermine them. This Teaching Aide will help you to understand …

Magento and Adobe Commerce Stores Are Victims of the CosmicSting Attack.

Introduction Cybersecurity researchers have discovered evidence of a large-scale attack targeting Adobe Commerce and Magento online retailers. Roughly 5% of these online marketplaces have been compromised by the so-called “CosmicSting” security holes. With a CVSS [Common Vulnerability Scoring System (CVSS) ] severity rating of 9.8, CVE-2024-34102 is one of the most serious vulnerabilities that have …

Ransomware Attack on University Medical Center (UMC)

Introduction: At present, the healthcare system has become one of the most popular targets for cybercriminals. Cyberattacks on hospitals as well as on medical centers have increased drastically in recent years. On 26 September 2024, the University Medical Centre (UMC) Health System in Lubbock, Texas, was hit by a serious ransomware attack. This attack affected …

Breaking The Cryptosystem of Auto Keyless Entry, Canada Auto Thefts Surge.

Imagine a sunny day setting in a coffee shop, peacefully sipping your Frappuccino drink, then someone next to you hijacks your car key fob without even touching it or talking to you. A recent statistic by the Insurance Bureau of Canada (IBC) shows that auto theft insurance claims spiked to $1.5 billion in 2023 [3]. …

An Attack on Two-Factor Authentication

Passwords have become ubiquitous in our lives as the main tool of account authentication, but relying solely on passwords is not very secure. With so many websites we use daily requiring accounts and passwords, many individuals reuse passwords or use very weak ones, like password123 [1]. If a password is reused on multiple sites, and …

RegreSSHion: Remote Code Execution in OpenSSH

On July 1st, 2024, the security firm Qualys published their discovery of a vulnerability within the OpenSSH daemon that allowed for unauthenticated, network-exploitable, remote code execution [1]. As a ubiquitous means of secure access to remote servers, the vulnerability allowed for attackers to gain unfettered, superuser access to a majority of servers running Linux, which …