Hackers Released New Black Hat AI Tools XXXGPT and Wolf GPT
The rapid growth in generative AI tech is dramatically changing the complete threat scenario since threat actors actively exploit this tech for several illicit purposes.…
The rapid growth in generative AI tech is dramatically changing the complete threat scenario since threat actors actively exploit this tech for several illicit purposes.…
Shareholders of HUB Cyber Security Ltd. has filed a class action against the company, alleging misleading statements related to its recent merger with Mount Rainier…
Splunk has discovered a vulnerability that allows unauthenticated log injection, which could enable malicious actors to run harmful code on the system. Splunk SOAR (Security…
According to reports, a new Android malware is circulating under the guise of a fake chat application that is being distributed through WhatsApp. This malware…
Aug 02, 2023THNRansoware / Cyber Crime Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat actors, including cybercrime…
Akira ransomware group added U.S.-based software company Parathon to its victim list. The hackers claimed to have 560 GB of data of employee data and…
Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing sensitive information about an organization.…
High-profile ransomware attacks on corporations like Kaseya, Colonial Pipeline, and MOVEit may lead to the misconception that only large organizations are targeted. However, the fact…
Google introduced eight new top-level domains at the beginning of May, such as .dad, .phd, .prof, .esq, .foo, .zip, .mov, and .nexus. Over time, the…
The Italian organizations, including tax agencies, were targeted by a new malware downloader delivering banking Trojan. The new loader malware is presently undergoing active development,…
Microsoft has issued an alert on the OneNote spoofing vulnerability, patched previously. According to the latest update from Microsoft, the possibility of exploitation still exists.…
US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security…