Category: CyberSecurityNews
Media and frequent innovative releases aggressively fuel the rapid industry rise of generative AI (Artificial Intelligence) ChatGPT. But, besides its…
A high-profile cyber attack targeted a prominent company, Kroll. This attack utilized a sophisticated technique known as “SIM swapping,” which allowed…
The popular language learning platform has come under scrutiny as a post on a hacker’s forum offers access to information…
You might discover hundreds of open doors if you scan your website for security vulnerabilities. Our AppSec research across 1400 websites protected…
The internet domains serve as a launchpad for threat actors to launch several cyber attacks. By exploiting the internet domains…
In today’s digital landscape, databases are the fortresses where an organization’s most valuable data assets are stored and managed. However,…
The rapid surge in LLMs (Large language models) across several industries and sectors has raised critical concerns about their safety,…
Some cyberattacks are just more evasive than others. While many attacks can be identified and blocked through a system that…
A vulnerability affecting Apache RocketMQ servers was publicly disclosed in May 2023, allowing remote code execution through a gateway. RocketMQ…
Several Buffer Overflow vulnerabilities have been discovered in Notepad++ that can be exploited by threat actors for malicious purposes. The…
Tor (The Onion Router) has officially introduced a Proof-of-Work (PoW) mechanism to defend from attackers doing Denial of Service attacks….
Threat actors have shifted from using malicious macros to malicious LNK files for initial access. This is due to Microsoft’s…











