Category: CyberSecurityNews

HackerGPT: A ChatGPT Empowered Penetration Testing Tool
10
Oct
2023

A ChatGPT Empowered Penetration Testing Tool

HackerGPT is a ChatGPT-enabled penetrating testing tool that can help with network hacking, mobile hacking, different hacking tactics, and other…

Snake Keylogger Steals victim Logins, data, Keystrokes etc.
09
Oct
2023

Snake Keylogger Steals victim Logins, data, Keystrokes etc.

Emails are extremely common in today’s digital communication landscape, with billions sent daily for personal, professional, and promotional purposes.  While…

ConnectedIO’s 3G/4G Routers Vulnerability Let Hackers Execute Malicious Code
09
Oct
2023

ConnectedIO’s 3/4G Routers Vulnerability Execute Malicious Code

Critical issues in ConnectedIO’s ER2000 edge routers have been discovered, and an attacker can leverage them to compromise the cloud…

Webwyrm Malware Attacking Over 100,000 Users Across 50 Countries
09
Oct
2023

Webwyrm Malware Attacking 100,000 Users Across 50 Countries

Threat actors are evolving their Tactics, Techniques, and Procedures (TTPs) at an alarming rate.  With technological advancements and increased awareness…

OpenAI Said to be Making its own AI Chips
09
Oct
2023

OpenAI is reportedly developing its Own AI chips

The maker of ChatGPT, OpenAI, is looking at making its own artificial intelligence chips, which are necessary for operating the…

MGM Resorts Refused to Pay Hacker Demand in Cyberattack
09
Oct
2023

MGM Resorts Refused to Pay Hacker Demand in Cyberattack

In recent news, MGM Resorts International took a bold stance in the face of a cyberattack, refusing to give in…

GoldDigger Disguises as Fake Android App To Steal Banking Credentials
09
Oct
2023

GoldDigger Disguises as Fake Android App To Steal Banking Credentials

GoldDigger, a new Android Trojan, imitates a fraudulent Android application and has been discovered to spoof both a Vietnamese government…

Threat Actors Employ Remote Admin Tools to Gain Access over Corporate Networks
09
Oct
2023

Threat Actors Employ Remote Admin Tools to Gain Access

Recently, threat actors have adapted tactics, exploiting the appeal of banned apps in specific regions, making users more susceptible to…

Why choose when you can have both? IT management OR IT security
06
Oct
2023

Why choose when you can have both? IT management OR IT security

Forget about security versus productivity! The tug-of-war between management and security solutions to coexist in a single endpoint is the…

Cisco Emergency Responder Vulnerability Let Remote Attacker Login as Root User
06
Oct
2023

Cisco Emergency Responder Vulnerability Attacks Root User

Cisco was reported with a critical vulnerability that could allow threat actors to log in to the affected devices as…

Zero-Days for Hacking WhatsApp Are Now Worth Millions of Dollars
06
Oct
2023

Zero-Days for Hacking WhatsApp Are Now Worth Millions of Dollars

Securing the devices running iOS and Android operating systems is now costly due to improved defenses.  According to a recent…

Apple Emergency Update for New Zero-Day Used to Hack iPhones
05
Oct
2023

Apple Emergency Update for New Zero-Day Used to Hack iPhones

Apple has discovered a Zero-day vulnerability affecting iOS and iPadOS versions earlier than 17.0.3, which could allow threat actors to…