Weekly Unfoldings: November 18-23, 2024

5 min read
Weekly Unfoldings: November 18-23, 2024

Stay informed with our weekly roundup of top 10 key happenings in tech, cyber and geopolitics. Discover the most significant developments, trends and breakthroughs shaping the industry, all in one concise update. The card image tiles are designed for easy recognition of the category to which the news belongs.

💡
The links provided in this content direct to third-party websites. We do not control or endorse the content on these external sites, and therefore cannot guarantee the accuracy, completeness, or reliability of the information they provide. We are not affiliated with these sites, and any opinions or claims made on them are solely those of the respective site owners. Users are encouraged to verify the information independently before relying on it.
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
Lucknow Socialite Dupes Women of Rs 2 Crore Through High-Profile Kitty Party Scam

A woman in Lucknow allegedly swindled Rs 2 crore from 10 women through a fraudulent kitty party scheme, falsely claiming her husband was an IAS officer. Identified as Rashmi Singh, she gained trust through lavish displays and promised high returns. The scam surfaced during a police complaint investigation, leading to an FIR and ongoing inquiries.

Read more
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
Russia-Linked Hacker Group TAG-110 Hits 60+ Targets Across Asia and Europe in Espionage Blitz

A Russia-linked cyberespionage group, TAG-110, has been tied to over 60 incidents targeting Asia and Europe since 2021. Known for deploying malware like HatVibe and CherrySpy, the group focuses on government, education, and human rights sectors. Their activities align with Russian geopolitical interests, supporting military and strategic goals in Central Asia, according to Recorded Future.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware

The Mysterious Elephant threat actor, also known as APT-K-47, has updated its Asyncshell malware in a Hajj-themed spear-phishing campaign. Targeting Pakistani entities, the group used CHM files to deploy malware, executing commands and establishing remote access. Recent iterations improve C2 communications, exploit WinRAR (CVE-2023-38831), and feature decoy documents from Pakistan Ministry of Religious Affairs website.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

Over 2,000 Palo Alto Networks devices have been compromised, exploiting CVE-2024-0012 and CVE-2024-9474 flaws. Attackers leverage these for privilege escalation, malware deployment, and command execution. Most affected are in the U.S. and India. Exploitation surged after a PoC release, with malware like Sliver implants and crypto miners reported. Users should apply fixes and restrict management interface access.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
An anti-deepfake declaration may have been written by AI

A federal lawsuit challenging Minnesota’s “Use of Deep Fake Technology to Influence an Election” law has raised concerns over AI role in legal affidavits. Attorneys claim Jeff Hancock’s submission supporting the law contains fabricated citations, likely hallucinated by AI tools like ChatGPT. The disputed sources include non-existent studies, casting doubt on the affidavit’s credibility and prompting questions about AI-generated legal evidence.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
Apple Pay, Cash App, and other digital wallets will be regulated more like banks now

The US Consumer Financial Protection Bureau (CFPB) will now supervise major digital payment providers, including Apple Pay, Google Wallet, and PayPal, under new rules. Targeting services with over 50 million transactions annually, the rule enforces compliance with federal laws on privacy, fraud, and account security through proactive examinations. It aims to enhance oversight as digital payments become essential.

Read more
6f7520b7-ef3f-48cf-ace3-3b442c0e516c.png
How smart grids are changing energy management

Smart grids transform electricity management by integrating AI, IoT, and automation to improve efficiency, sustainability, and reliability. These advanced systems balance energy from sources like solar and wind, provide real-time consumption data, and offer self-healing capabilities to minimize outages. Despite challenges like high costs and cybersecurity concerns, smart grids enable cleaner energy, reduce waste, and empower consumers to optimize their usage.

Read more
6f7520b7-ef3f-48cf-ace3-3b442c0e516c.png
Figure 02: A leap forward in humanoid robotics

AI robotics company Figure has announced advancements in its Figure 02 humanoid robots, boasting a 400% speed increase and seven-fold improvement in success rates. Now capable of executing 1,000 autonomous tasks daily, these robots target commercial and domestic use. Figure aims to scale production for widespread deployment, actively recruiting engineers to refine capabilities and prepare for mass-market adoption.

Read more
769adb45-eb2d-4bf7-bfb1-733a5fbaec96.png
Germany at a Crossroads: Coalition Breakdown Portends Sweeping Change in 2025

Germany faces political and economic uncertainty after Finance Minister Christian Lindner’s leaked policy proposal, challenging welfare models and climate policies. His stance on fiscal austerity and corporate tax cuts has fractured the coalition, prompting early elections. The shift may affect Germany’s welfare system and climate transition, raising concerns over economic stability and public services. Upcoming elections will be crucial.

Read more
769adb45-eb2d-4bf7-bfb1-733a5fbaec96.png
Ukraine’s IT Army Has Lessons for Taiwan

Taiwan must learn from Ukraine’s IT Army in preparing for a potential conflict with China. By developing a decentralized volunteer force and creating legal frameworks to protect participants, Taiwan can build a strong cyber defense. Drawing from Ukraine successful cyber operations, Taiwan should focus on recruiting and training volunteers, identifying vulnerabilities, and setting up secure communication channels to conduct cyber warfare efficiently.

Read more

Want to write a blog?

Unfold your thoughts and let your ideas take flight in the limitless realm of cyberspace. Whether you're a seasoned writer or just starting, our platform offers you the space to share your voice, connect with a creative community and explore new perspectives. Join us and make your mark!

Follow us on social media

Cyber Unfolded Light Logo
Copyright © 2024 CYUN. All rights reserved.