Massive Ransomware Attack on SriLanka Wipes Out Data
The Information and Communication Technology Agency (ICTA) has officially confirmed a severe data loss incident that has had a far-reaching impact on all government offices…
The Information and Communication Technology Agency (ICTA) has officially confirmed a severe data loss incident that has had a far-reaching impact on all government offices…
According to recent reports, a threat actor has compromised the confidential information of 3,200 Airbus vendors. The exposed data includes sensitive details such as names,…
A group of Researchers unearthed critical code Proton Mail vulnerabilities that could have jeopardized the security of Proton Mail, a renowned privacy-focused webmail service. These…
Telegram Messenger offers global, cloud-based instant messaging with several features:- Optional end-to-end-encryption Video calling VoIP File sharing Cybersecurity researchers at Securlist recently found several Telegram…
In recent developments, reports have surfaced regarding the Akira ransomware threat actors targeting Cisco VPNs lacking multi-factor authentication (MFA). This vulnerability, tracked as CVE-2023-20269, can…
In the Hewlett Packard Enterprise OneView Software, three security flaws have been identified, which might be remotely exploited to allow authentication bypass, disclosure of sensitive…
Mobile devices and apps play a growing role in user identification, but password theft, resembling identity theft, invites diverse eavesdropping attacks, including stealthy indirect ones…
Large language models (LLMs) and generative AI are rapidly advancing globally, offering great utility but also raising misuse concerns. The rapid modernization of generative AI…
A new threat to Android devices named android[.]pandora has been identified that compromises the devices when pirated video content is installed or during firmware updates.…
A Stored Cross-Site Scripting (Stored XSS) vulnerability was recently discovered in Cacti that allows an authenticated user to poison the data stored in Cacti’s database. Moreover,…
A Domain Generation Algorithm (DGA) creates numerous domain names, serving as meeting points for malware C&C servers. DGAs help malware evade security measures by generating…
LLMs have already shown their exceptional abilities in mimicking human text abilities, but their potential reaches further. They now show promise in planning and open-world…