Author: Cybernoz

Hacker looking at infected devices
02
Aug
2023

Amazon’s AWS SSM agent can be used as post-exploitation RAT malware

Researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows hackers to use the platform’s System…

Researchers Uncovered a New Flaw in AI Chatbots to Evil
02
Aug
2023

Researchers Uncovered a New Flaw in AI Chatbots to Evil

LLMs are commonly trained on vast internet text data, often containing offensive content. To mitigate this, developers use “alignment” methods…

Care Bears and Open Campus Launch Educational Games on Climate Change
02
Aug
2023

Care Bears and Open Campus Launch Educational Games on Climate Change

London, England, August 2, 2023 – Open Campus, a leading educational technology protocol, has announced an exciting new collaboration with…

Traceable AI combats API abuse with digital fraud prevention capabilities
02
Aug
2023

Traceable AI combats API abuse with digital fraud prevention capabilities

Traceable AI introduced digital fraud prevention capabilities, to deliver protection against fraudulent activities across APIs and digital interfaces. This innovation…

BlueCharlie
02
Aug
2023

Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures

Aug 02, 2023THNCyber Threat / Hacking A Russa-nexus adversary has been linked to 94 new domains, suggesting that the group…

Pig butchers caught using ChatGPT to con victims
02
Aug
2023

Pig butchers caught using ChatGPT to con victims

Romance scammers looking to con people out of their savings appear to be turning to generative AI services such as…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
02
Aug
2023

Cyble Raises $24 Million for AI-Powered Threat Intelligence Platform

Threat intelligence firm Cyble has raised $24 million in a Series B funding round that brings the total invested in…

Salesforce
02
Aug
2023

Hackers exploited Salesforce zero-day in Facebook phishing attack

Hackers exploited a zero-day vulnerability in Salesforce’s email services and SMTP servers to launch a sophisticated phishing campaign targeting valuable…

Hackers Train AI-powered cybercrime Tools to Launch Cyber Attacks
02
Aug
2023

Hackers Train AI-powered cybercrime Tools to Launch Cyber Attacks

There have been several reports recently about cybercriminals using AI-powered tools for malicious purposes which can give a paradise of…

Beware! Hacker-Sold macOS HVNC Tool Allows Complete Takeover
02
Aug
2023

Beware! Hacker-Sold macOS HVNC Tool Allows Complete Takeover

Threat actors targeting macOS have increased lately as there were several cases of macOS information stealer malware found in the…

SSH Remains Most Targeted Service in Cado's Cloud Threat Report
02
Aug
2023

SSH Remains Most Targeted Service in Cado’s Cloud Threat Report

IN SUMMARY Botnet agents dominate the malware landscape, comprising 40.3% of all traffic. SSH remains the most targeted service, representing…

Salesforce and Meta suffer phishing campaign that evades typical detection methods
02
Aug
2023

Salesforce and Meta suffer phishing campaign that evades typical detection methods

The Guardio research team discovered an email phishing campaign exploiting a zero-day vulnerability in Salesforce’s legitimate email services and SMTP…