News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Hostinger Integrates Dark Web Scanning Into Hpanel

Hostinger has integrated a dark web scanning tool directly into its hPanel service, providing users with real-time security recommendations if their data is found on the dark web. The tool, developed by NordStellar, tracks keywords associated with business and employee/client data in dark web forums, search engines, markets, and communities. Hostinger claims that over 50% of its customers have had data previously disclosed on the dark web, and received warnings along with suggestions on how to improve security.

See Also

5 Easy Browser Tweaks That Secure Your Web Surfing Δ1.70

Modern web browsers offer several built-in settings that can significantly enhance data security and privacy while online. Key adjustments, such as enabling two-factor authentication, disabling the saving of sensitive data, and using encrypted DNS requests, can help users safeguard their personal information from potential threats. Additionally, leveraging the Tor network with specific configurations can further anonymize web browsing, although it may come with performance trade-offs.

Zapier Data Breach Raises Concerns Over Customer Information Security. Δ1.69

Zapier, a popular automation tool, has suffered a cyberattack that resulted in the loss of sensitive customer information. The company's Head of Security sent a breach notification letter to affected customers, stating that an unnamed threat actor accessed some customer data "inadvertently copied to the repositories" for debugging purposes. Zapier assures that the incident was isolated and did not affect any databases, infrastructure, or production systems.

DuckDuckGo Embeds AI Search Tool but Keeps Users' Options Δ1.69

DuckDuckGo's recent development of its AI-generated search tool, dubbed DuckDuckAI, marks a significant step forward for the company in enhancing user experience and providing more concise responses to queries. The AI-powered chatbot, now out of beta, will integrate web search within its conversational interface, allowing users to seamlessly switch between the two options. This move aims to provide a more flexible and personalized experience for users, while maintaining DuckDuckGo's commitment to privacy.

India's Angel One Says Assessing Impact After Security Breach Δ1.69

Indian stock broker Angel One has confirmed that some of its Amazon Web Services (AWS) resources were compromised, prompting the company to hire an external forensic partner to investigate the impact. The breach did not affect clients' securities, funds, and credentials, with all client accounts remaining secure. Angel One is taking proactive steps to secure its systems after being notified by a dark-web monitoring partner.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.69

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.68

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

Advanced Cyber Threats on Network Devices Worry Global Internet Security Δ1.68

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

The Dark Side of Chrome Extensions: Hidden Dangers Lurking on Your PC Δ1.68

As recent news reminds us, malicious browser add-ons can start life as legit extensions. Reviewing what you’ve got installed is a smart move. Earlier this month, an alarm sounded—security researchers at GitLab Threat Intelligence discovered a handful of Chrome extensions adding code in order to commit fraud, with at least 3.2 million users affected. But the add-ons didn’t start as malicious. Instead, they launched as legitimate software, only to be later compromised or sold to bad actors.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.68

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

LlamaIndex Launches Cloud Service for Building Unstructured Data Agents Δ1.68

LlamaIndex, a startup developing tools for building 'agents' that can reason over unstructured data, has raised new cash in a funding round to develop its enterprise cloud service. The company's open-source software has racked up millions of downloads on GitHub, allowing developers to create custom agents that can extract information, generate reports and insights, and take specific actions. LlamaIndex provides data connectors and utilities like LlamaParse, which transforms unstructured data into a structured format for AI applications.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.68

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Microsoft Names Cybercriminals Who Created Explicit Deepfakes Δ1.68

Microsoft has identified and named four individuals allegedly responsible for creating and distributing explicit deepfakes using leaked API keys from multiple Microsoft customers. The group, dubbed the “Azure Abuse Enterprise”, is said to have developed malicious tools that allowed threat actors to bypass generative AI guardrails to generate harmful content. This discovery highlights the growing concern of cybercriminals exploiting AI-powered services for nefarious purposes.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.67

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Worried About DeepSeek? Well, Google Gemini Collects Even More of Your Personal Data Δ1.67

Google Gemini stands out as the most data-hungry service, collecting 22 of these data types, including highly sensitive data like precise location, user content, the device's contacts list, browsing history, and more. The analysis also found that 30% of the analyzed chatbots share user data with third parties, potentially leading to targeted advertising or spam calls. DeepSeek, while not the worst offender, collects only 11 unique types of data, including user input like chat history, raising concerns under GDPR rules.

Microsoft Updates Terms on Data Privacy Amid EU Probe Δ1.67

Microsoft is updating its commercial cloud contracts to improve data protection for European Union institutions, following an investigation by the EU's data watchdog that found previous deals failed to meet EU law. The changes aim to increase Microsoft's data protection responsibilities and provide greater transparency for customers. By implementing these new provisions, Microsoft seeks to enhance trust with public sector and enterprise customers in the region.

Crogl, Armed with $30M, Takes the Wraps Off a New AI 'Iron Man Suit' For Security Analysts Δ1.67

Startup Crogl has unveiled an autonomous assistant designed for cybersecurity researchers, aimed at efficiently analyzing thousands of daily network alerts to identify real security incidents. Backed by $30 million in funding, this innovative tool, likened to an “Iron Man suit” by CEO Monzy Merza, has already been tested with major enterprises during a private beta phase. The platform's unique approach, leveraging big data and machine learning, seeks to enhance security analysts' capabilities rather than reducing the number of alerts they face.

Tech Giant Google Discloses Scale of AI-Generated Terrorism Content Complaints Δ1.67

Google has informed Australian authorities it received more than 250 complaints globally over nearly a year that its artificial intelligence software was used to make deepfake terrorism material, highlighting the growing concern about AI-generated harm. The tech giant also reported dozens of user reports warning about its AI program Gemini being used to create child abuse material. The disclosures underscore the need for better guardrails around AI technology to prevent such misuse.

Arkham Launches New Tag to Track Crypto Influencers’ Wallets Δ1.67

Arkham Intelligence has introduced a new tagging system on its platform, allowing users to track cryptocurrency transactions of influential figures in the cryptocurrency space. The "key opinion leader" (KOL) label applies to those with more than 100,000 followers on X and links their associated wallet addresses, currently featuring 950 addresses. This move aims to enhance transparency and accountability among crypto influencers.

Microsoft Discoveries Vulnerable Software Attack. Δ1.67

Microsoft has confirmed that its Windows drivers and software are being exploited by hackers through zero-day attacks, allowing them to escalate privileges and potentially drop ransomware on affected machines. The company patched five flaws in a kernel-level driver for Paragon Partition Manager, which were apparently found in BioNTdrv.sys, a piece of software used by the partition manager. Users are urged to apply updates as soon as possible to secure their systems.

Detecting Deception in Digital Content Δ1.67

SurgeGraph has introduced its AI Detector tool to differentiate between human-written and AI-generated content, providing a clear breakdown of results at no cost. The AI Detector leverages advanced technologies like NLP, deep learning, neural networks, and large language models to assess linguistic patterns with reported accuracy rates of 95%. This innovation has significant implications for the content creation industry, where authenticity and quality are increasingly crucial.

AWS Misconfigurations Reportedly Used to Launch Phishing Attacks Δ1.67

Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.

DeepSeek Represents the Next Wave in the AI Race Δ1.67

DeepSeek has emerged as a significant player in the ongoing AI revolution, positioning itself as an open-source chatbot that competes with established entities like OpenAI. While its efficiency and lower operational costs promise to democratize AI, concerns around data privacy and potential biases in its training data raise critical questions for users and developers alike. As the technology landscape evolves, organizations must balance the rapid adoption of AI tools with the imperative for robust data governance and ethical considerations.

Browser Agent Revolutionizes Web Experience Δ1.66

Browser company Opera has unveiled a new AI agent called Browser Operator that can complete tasks for you on different websites. In a demo video, the company showed the AI agent finding a right pair of socks from Walmart; securing tickets for a football match from the club’s site; and looking up a flight and a hotel for a trip on Booking.com. Opera said that the feature will be available to users through its Feature Drop program soon.

Firm Says AI-Assisted Security Analyzer Found 16 Bugs in OpenRISC CPU Core in Under 60 Seconds Δ1.66

Caspia Technologies has made a significant claim about its CODAx AI-assisted security linter, which has identified 16 security bugs in the OpenRISC CPU core in under 60 seconds. The tool uses a combination of machine learning algorithms and security rules to analyze processor designs for vulnerabilities. The discovery highlights the importance of design security and product assurance in the semiconductor industry.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.66

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.