Category: CyberSecurityNews

Hackers Released New Black Hat AI Tool Evil-GPT
10
Aug
2023

Hackers Released New Black Hat AI Tool Evil-GPT

The use of generative AI models is booming dramatically since these AI models are rapidly evolving the complete tech scenario….

New Ficker Stealer Malware Attacking Windows systems to Steal Sensitive Data
10
Aug
2023

Ficker Stealer Malware Attacking Windows to Steal Sensitive Data

Ficker Stealer is a type of malware that steals sensitive information from over 40 browsers, including popular ones like Chrome,…

UK Electoral Commission hacked – 40 Million Britons Data Exposed
10
Aug
2023

UK Electoral Commission Hacked – 40 Million Britons Data Exposed

The UK Electoral Commission, entrusted with safeguarding voter information, recently faced a complex breach that triggered a vital public notification. …

What is SSL, and How does it work
10
Aug
2023

What is SSL and Why it is Important?

The protocols SSL (Secure Sockets Layer) and TLS (Transport Layer Security), are used to create secure connections between networked computers….

Android Security Updates: Over 40 Vulnerabilities Including Critical RCE Patched
09
Aug
2023

Over 40 Vulnerabilities Including Critical RCE Patched

Android has released its August Security patches in which more than 40 vulnerabilities have been identified and fixed. Most of…

Microsoft Added GPT-4 and GPT-35-Turbo to businesses Azure AI infrastructure
09
Aug
2023

Microsoft Added GPT-4 and GPT-35-Turbo to Azure AI Infrastructure

Azure announced the global expansion of Azure OpenAI Service, including GPT-4 and GPT-35-Turbo, to its customers across the world. Azure…

Interpol Shut Down Phishing-As-A-Service (PAAS) Platform That Hacked 70,000 Users
09
Aug
2023

Interpol Shut Down Phishing-As-A-Service (PAAS) Platform

Interpol Shut Down Phishing-As-A-Service (PAAS) Platform That Hacked 70,000 Users. Due to phishing-as-a-service (PAAS) platforms, cybercriminals typically have a one-stop…

New Inception Attack Let Attackers steal Sensitive Data from all AMD Zen CPUs
09
Aug
2023

New Inception Attack Let Attackers Steal Sensitive Data

Phantom Speculation and Training in Transient Execution are two novel techniques that have been identified to leak arbitrary information from…

CrowdStrike Debuts New Counter Adversary Operations
09
Aug
2023

CrowdStrike Debuts New Counter Adversary Operations

On August 8, 2023, Crowdstrike announced its new counter operations, “CrowdStrike Falcon Intelligence” and the CrowdStrike® Falcon OverWatch” to detect…

SAP Security Update August
09
Aug
2023

SAP Security Update: 16 Flaws in Multiple SAP Products: Update Now!

SAP has released patches for 16 vulnerabilities with Critical, High, Medium, and Low severities. The CVSS scores for these vulnerabilities…

Top 5 Security Vulnerabilities of 2023: Apache and OpenSSH Are The Most Vulnerable
09
Aug
2023

Top 5 Security Vulnerabilities of 2023

The top 5 security vulnerabilities for 2023 have been revealed by a recent study, with Apache and OpenSSH services being…

Hackers Abuse Cloudflare Tunnels to Gain Stealthy Access
08
Aug
2023

Hackers Abuse Cloudflare Tunnels to Gain Stealthy Access

In the current era of cybersecurity, threat actors are actively adopting creative and new methods to exploit networks. While some…