Category: CyberSecurityNews

How it Assists Attackers & Security Analysts
26
Jul
2023

How it Assists Attackers & Security Analysts

OpenAI’s ChatGPT, released in November 2022, stunned users with its diverse capabilities, answering questions and crafting custom essays, sparking widespread…

Cryptojacking Attack Patterns Checklist for Administrators
26
Jul
2023

Cryptojacking Attack Patterns Checklist for Administrators

Cloud cryptojacking disguises itself as cloud computing resource abuse, where threat actors exploit legitimate tenants for cryptocurrency mining using their…

Ecommerce Security Threats
26
Jul
2023

Top 7 Ecommerce Security Threats in 2023

The ecommerce industry is on the rise. According to Statista, global e-commerce sales amounted to approximately $5.2 trillion. Moreover, experts…

Thales to Acquired application cybersecurity company Imperva in a .6 billion deal
26
Jul
2023

Thales to Acquired company Imperva in a $3.6 billion deal

Thales has acquired a prominent cybersecurity company situated in the United States, renowned for its proficiency in data and application…

Hackers Mimic Popular VPN Download page to Deliver Malware
26
Jul
2023

Hackers Mimic Popular VPN Download page to Deliver Malware

As per reports, threat actors have been using domestic VPN installation files for distributing SparkRAT malware which leads to MeshAgent…

Apple Fixes Zero-day Vulnerabilities Exploited To Attack iPhones, Macs, and iPads
25
Jul
2023

Apple Fixes Zero-day Vulnerabilities Exploited To Attack iPhones

Apple has issued security patches to address zero-day vulnerabilities that have been exploited in attacks against iPhones, Macs, and iPads…

Atlassian RCE Flaw Let Attacker Execute Arbitrary Code
25
Jul
2023

Atlassian RCE Flaw Let Attacker Execute Arbitrary Code

On July 18th, Atlassian discovered critical and high vulnerabilities through bug bounty programs, third-party library scans, and penetration testing. In…

Multiple Flaws in Encrypted Police and Military Radios
25
Jul
2023

Multiple Flaws in Encrypted Police and Military Radios

Global radios rely on the TETRA (Terrestrial Trunked Radio) standard, but various vulnerabilities and multiple flaws have been uncovered, impacting…

Hackers Actively Exploiting zero-day Flaw in Ivanti Mobile Endpoint Manager Software
25
Jul
2023

Zero-day Flaw in Ivanti Mobile Endpoint Manager Software

Ivanti ‘s mobile device management software EPMM(Endpoint manager mobile), aka Mobile iron core version lower than 11.8.1.0, was impacted by…

Flipper Zero – Now You Install 3rd-Party Apps With The Pentesting Device
25
Jul
2023

Flipper Zero – Now You Install 3rd-Party Apps

The Flipper Zero team has announced the official launch of “Flipper Apps,” a new app store enabling mobile users to…

ChatGPT for Digital Forensic
25
Jul
2023

ChatGPT for Digital Forensic – AI-Powered Investigation Tool

OpenAI’s ChatGPT (GPT-3.5, GPT-4) and other LLMs like BERT, Bard, etc. have sparked widespread debate due to their disruptive applications…

What is DAST ? How It Works to Secure Your App
25
Jul
2023

What is Dynamic Application Security Testing (DAST) ?

Businesses and developers are focusing more on the security of applications in their digital environment as cyber threats and data…