Category: CyberSecurityNews

How Hackers Abusing ChatGPT For Their Cybercriminal Activities
29
Aug
2023

How Hackers Abusing ChatGPT For Their Cybercriminal Activities

Media and frequent innovative releases aggressively fuel the rapid industry rise of generative AI (Artificial Intelligence) ChatGPT.  But, besides its…

Kroll Experiences Data Breach After Employee Is Hacked Via SIM-Swap Attack
29
Aug
2023

Employee Hacked Via SIM Swap Attack

A high-profile cyber attack targeted a prominent company, Kroll. This attack utilized a sophisticated technique known as “SIM swapping,” which allowed…

DuoLingo Users
29
Aug
2023

Over 2.6 Million DuoLingo Users’ Info Exposed in a Hacker’s Forum

The popular language learning platform has come under scrutiny as a post on a hacker’s forum offers access to information…

what is it? Your Defense Against Exploits &Threats
29
Aug
2023

what is it? Your Defense Against Exploits &Threats

You might discover hundreds of open doors if you scan your website for security vulnerabilities. Our AppSec research across 1400 websites protected…

Researchers Uncover New technique to Detect Malicious Websites
29
Aug
2023

Researchers Uncover New technique to Detect Malicious Websites

The internet domains serve as a launchpad for threat actors to launch several cyber attacks. By exploiting the internet domains…

Top 10 Best Practices for Cybersecurity Professionals to Securing Your Database
29
Aug
2023

Top 10 Best Practices for Securing Your Database

In today’s digital landscape, databases are the fortresses where an organization’s most valuable data assets are stored and managed. However,…

Threats & Vulnerabilities in AI Models
29
Aug
2023

Threats & Vulnerabilities in AI Models

The rapid surge in LLMs (Large language models) across several industries and sectors has raised critical concerns about their safety,…

4 Cyber Attacks that Frequently Evade Detection and How to Address Them
29
Aug
2023

4 Cyber Attacks that Frequently Evade Detection

Some cyberattacks are just more evasive than others. While many attacks can be identified and blocked through a system that…

DreamBus Botnet RocketMQ Servers
29
Aug
2023

DreamBus Botnet Exploiting execution Flaw in RocketMQ servers

A vulnerability affecting Apache RocketMQ servers was publicly disclosed in May 2023, allowing remote code execution through a gateway. RocketMQ…

Multiple Notepad++ Flaw Let Attackers Arbitrary Code on Vulnerable Installations
29
Aug
2023

Multiple Notepad++ Flaws Let Attackers Execute Arbitrary Code

Several Buffer Overflow vulnerabilities have been discovered in Notepad++ that can be exploited by threat actors for malicious purposes. The…

Tor Announces Proof-of-Work Defense to Defend Against DoS Attacks
29
Aug
2023

Tor Announces Proof-of-Work to Defend Against DoS Attacks

Tor (The Onion Router) has officially introduced a Proof-of-Work (PoW) mechanism to defend from attackers doing Denial of Service attacks….

Hackers Use Weaponized LNK Files to Exploit Microsoft Connection 03Manager Profile
26
Aug
2023

Hackers Use Weaponized LNK Files

Threat actors have shifted from using malicious macros to malicious LNK files for initial access. This is due to Microsoft’s…