Due to fresh Kaspersky research, fraudulent use of the InterPlanetary File System appears to have surged recently. Since 2022, fraudsters have leveraged IPFS for email phishing attacks. IPFS is a peer-to-peer network protocol that allows for the creation of…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Qbot: The Ever Expanding Malware Family
Given how widespread malware has become, new “families” of each type are being developed. Qbot, a family of malware that is used to steal data, falls under this category. Qbot’s history As is sometimes the case with malware, Qbot…
Tasmanian Hit by Big Data Breach Confirmed by Minister
The Tasmanian Department of Education, Children, and Young People experienced a cyber attack where hackers targeted and breached the third-party file transfer service GoAnywhere MFT. The breach took place last month and the state government confirmed on March 31…
White House Cybersecurity Strategy warns of “Complex Threat Environment”
There was a national cyber-security strategy published by the White House on March 2. It contains a list of threats to U.S. networks terrestrially and in space related to Russian and Chinese hackers. “Evolving intelligence” suggests many options could…
Rilide Malware: Hackers Use Malicious Browser Extension to Bypass 2FA and Steal Crypto
Trustwave SpiderLabs security researchers have recently discovered a new malicious browser extension, named Rilide, targeting Chromium-based browsers like Google Chrome, Brave, Opera, and Microsoft Edge. The malicious activities include monitoring browsing history, taking screenshots and stealing cryptocurrency through scripts injected…
AI can Crack Your Password in Seconds, Here’s how to Protect Yourself
Along with the benefits of emerging generative AI services come new hazards. PassGAN, a sophisticated solution to password cracking, has just emerged. Using the most recent AI, it was able to hack 51% of passwords in under a minute…
Nexx Garage Door Cyber Vulnerabilities: Risks in Smart Home Security
Smart home devices have become increasingly popular in recent years, promising convenience, efficiency, and security. However, recent cyber security vulnerabilities in the Nexx Garage Door Opener have highlighted the risks of relying too heavily on technology without considering the potential…
MSI Acknowledges Security Breach Following Ransomware Attack Allegations
MSI (short for Micro-Star International), a Taiwanese PC vendor, revealed today that its network had been compromised in a cyberattack in response to claims of a ransomware attack. The Money Message ransomware group earlier this week claimed to have…
eFile.com Hosted Malware on its Website
Malicious code was injected into eFile.com’s server, an online service that assists people with filing tax returns. This resulted in malware being delivered to users’ computers. It was discovered that the software service, which is authorized by the Internal…
APT43: Cyberespionage Group Targets Strategic Intelligence
APT43, also known as Kimsuky or Thallium, recently exposed by the Mandiant researchers, is a cyberespionage threat group supporting the objectives of the North Korean regime. By conducting credential harvesting attacks and successfully compromising its targets using social engineering, ATP43…
Unlocking the Power of Zero Trust Security: 5 Reasons to Adopt the Framework
As cyber threats continue to evolve, traditional security models are becoming less effective in protecting against them. That’s why many organizations are turning to a zero-trust security model to secure their networks, data, and applications. ‘ Zero trust is a…
Microsoft & Fortra Seeks Court Order to Remove a Ransomware Hacking Tool Targeted Hospitals
A number of cybersecurity businesses, including Microsoft, launched a full-scale legal crackdown on one of the primary hacking tools used by malware criminal groups in their operations. Microsoft, Fortra, and the Health Information Sharing and Analysis Center (H-ISAC) announced…
Organizations Struggle with Data Breach Disclosure
A recent survey conducted by cybersecurity firm Bitdefender highlights the ongoing struggle of organizations to handle data breaches and cybersecurity challenges. The survey revealed that a third of organizations have admitted to covering up data breaches, while 42% of IT…
Challenges in Securing Critical Infrastructure: Modern Solutions Required
Critical infrastructure refers to physical and digital assets that are crucial for national security, economy, public health, or safety. It can be government or privately owned and includes not only power plants or electricity but also monetary systems. Cyber attacks…
Genesis Market: The Fall of a Cybercrime Website
Law enforcement agencies worldwide have dealt a blow to the criminal underworld with the takedown of Genesis Market, a notorious website used to buy and sell stolen data, hacking tools, and other illicit goods and services. The investigation involved coordinated…
ThingsBoard: Default Static Key in IoT Platform Gives Attackers Admin Access
The developers of ThingsBoard, an open-source platform used for managing IoT devices for various industry sectors have recently patched a flaw that could apparently enable attackers to acquire administrative access to a server and send requests. The vulnerability, identified as…
ChatGPT: Mayor Announces Legal Action in Response to Fake Bribery Allegations
A mayor from Australia claimed he would file a lawsuit because of the misleading information advanced chatbot ChatGPT presented. Mayor of Hepburn Shire Council Brian Hood claims a tool owned by OpenAI falsely claimed he was jailed for bribery…
FBI Obtained Detailed Database Exposing 59K+ Users of the Cybercrime Genesis Market
In its takedown of Genesis Market, a site famous in the cybercriminal realm for selling access to user accounts, the FBI gathered information on possibly tens of thousands of hackers. Senior FBI and Justice Department officials stated in a…
Sophos Says Nearly Every Company Was Attacked Last Year
Organizations are constantly bombarded with malicious activity, suffering negative impacts. In the State of Ransomware 2022 report, published by Sophos, a global leader in next-generation cybersecurity, a comprehensive overview of the real-world ransomware experiences of consumers has been provided…
Don’t Get Hooked: How Scammers are Reeling in YouTube Users with Authentic Email Phishing
Are you a YouTube user? Beware of a new phishing scam that has been making rounds lately! In recent times, YouTube users have been targeted by a new phishing scam. The scammers use an authentic email address from YouTube, which…
Hackers can Open Smart Garage Doors From Anywhere in the World
According to findings from a security researcher, hackers can remotely tap into a specific brand of smart garage door opener controllers and open them all over the world due to a number of security weaknesses that the firm, Nexx,…
Malicious Attacks Use Log4j Bugs
An increasingly popular form of fraud that utilizes legitimate proxyware services to hijack legitimate ones has been identified by threat actors. Some services allow people to sell Internet bandwidth to third parties to make extra money. According to researchers from…
Google Mandates Easy Account Deletion for Android Apps
Google is implementing a new data policy for Android apps that also includes a setting for account deletion to provide customers with more transparency and control over the data. The measure would compel app developers to provide users with in-app…
Critical Security Flaws Identified in Popular Japanese Word Processing Software
Ichitaro is a widely recognized word processing software in Japan created by JustSystems. Cisco Talos recently discovered four bugs in it that might result in arbitrary code execution. Ichitaro employs the.jtd file extension and the ATOK input method (IME).…
3CX Cyberattack: Cryptocurrency Firms at Risk
Cryptocurrency companies were among the targets of the recent 3CX supply chain attack, according to security researchers. The attack began with the compromise of 3CX, a VoIP provider used by businesses for communication services. Cyber attackers then installed a backdoor…
Chatbot Controversy in Europe: Italy Blocks ChatGPT. What’s next?
Chatbots have become increasingly popular in recent years, thanks to advancements in artificial intelligence (AI) and natural language processing (NLP). These bots can mimic human conversation and are used in a variety of applications, such as customer service and mental…
Data of 3700 Customers Exposed by the Service NSW Bug
It has been confirmed that Greg Wells, Service NSW’s chief executive, said that the personal information of 3,700 customers was left exposed. This incident occurred on March 20 between 1:20 pm and 2:54 pm. Earlier this week, 3700 affected…
Controversial Cybersecurity Practices of ICE
US Immigration and Customs Enforcement (ICE) have come under scrutiny for its questionable tactics in data collection that may have violated the privacy of individuals and organizations. Recently, ICE’s use of custom summons to gather data from schools, clinics, and…
Experts Warn of Advanced Evasion Techniques as Rorschach Ransomware Emerges
Security researchers are concerned about a new ransomware strain that they characterise as a hybrid of the most potent ransomwares currently in use. Researchers from the Israeli cybersecurity company Check Point named the new ransomware “Rorschach” and claimed their…
STYX Marketplace: An Emerging Platform Aiding Financial Crimes
STYX, a new dark web marketplace is turning into a booming hub for purchasing and selling illicit services or stolen data. STYX is a new dark web marketplace that was launched earlier this year, and it seems to be on…
ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access
An ALPHV/BlackCat ransomware affiliate was spotted gaining early access to the target network by abusing three flaws in the Veritas Backup product. The ALPHV ransomware operation first appeared in December 2021, and it is thought to be controlled by…
Cybercrime Unmasked: Insights from “Inside the Halls of a Cybercrime Business”
Exploring the World of Cybercrime: Insights from “Inside the Halls of a Cybercrime Business” The world of cybercrime is shrouded in mystery, with many of us left wondering how these criminals operate and how they remain undetected. However, a recent…
Bank of England Demands Cyber Crackdown After Russia-linked Attacks
The Bank of England has taken steps to prepare financial institutions for the possibility of a major cyber attack by instructing them to enhance their defenses. The Bank is concerned that Russian-linked hackers may attempt to destabilize the financial system,…
Is Italy’s ChatGPT Ban Setting a New Standard for the Rest of Europe?
After Italy became the first Western country to block advanced chatbot ChatGPT on Friday due to a lack of transparency in its data use, Europe is wondering who will follow. Several neighboring countries have already expressed interest in the…
Million-Dollar Ransom Demanded by Ransomware Gang
On the threat landscape in recent years, alarming numbers of ransomware groups sprung up. This is just as mushrooms grow from the ground after a shower. In recent months, an emerging ransomware group called ‘Money Message’ has appeared. This…
Pinduoduo App Malware: A Security Warning
Pinduoduo, a popular Chinese e-commerce app, has come under scrutiny from cybersecurity experts after multiple reports of malware surfaced. According to CNN, a recent analysis found that the app contained a ‘sophisticated and complex’ malware strain that allowed attackers to…
Clearview AI Scraps 30 Billion Images Illicitly, Giving Them to Cops
Clearview’s CEO has recently acknowledged the notorious facial recognition database, used by the law enforcement agencies across the nation, that was apparently built in part using 30 billion photos that were illicitly scraped by the company from Facebook and other…
To Combat Cyber Threats, Cytech Ventures LCC and Wazuh Sign a Crucial Partnership Agreement
Today, almost every industry is plagued by the fear of catastrophic flaws and dangers supported by nation-states. Cyber threats are understandable in their scope and sophistication. The lucrative nature of ransomware, automation, intellectual property theft, and business email breach…
How Web 3.0 is Revolutionizing the Internet: A Technical Comparison with Web 2.0
The internet has come a long way since its inception, and it has undergone several changes. The initial version of the internet, known as Web 1.0, was mostly static and one-way, with users only able to consume content. With the…
Inside the Lazarus Heist: Multi-Billion Dollar Theft in Two Hours
In 2018, a group of men in Maharashtra state of India was tricked into being unwitting participants in a major bank heist. The men, who believed they were being offered small roles in a Bollywood film, were in fact being…
DISH Network: Multiple Lawsuits Filed Against Dish After a Ransomware Attack
A multiple class action class lawsuit has been filed against Dish Network, following a ransomware incident that caused the company’s multi-day “network outage.” The lawsuit, filed across several states, asserts that DISH “overstated” its operating efficiency while operating with inferior…
3CX Supply Chain Attack Compromised Cryptocurrency Companies
Some of the victims of the 3CX supply chain attack had their systems backdoored with Gopuram malware, with threat actors targeting cryptocurrency companies, particularly with this additional malicious payload. In a large-scale supply chain attack, North Korean threat actors…
Role of AI in Revolutionizing Penetration Testing
Penetration testing is a critical component of any cybersecurity program. It involves simulating a real-world attack on an organization’s systems and infrastructure to identify vulnerabilities that can be exploited by hackers. However, traditional penetration testing methods can be time-consuming, labor-intensive,…
German Police Raid FlyHosting, a DDoS-Friendly Hosting Provider
In a report, German authorities have seized Internet servers used by FlyHosting, a dark web company that offers DDoS-for-hire services. On November 20, 2022, FlyHosting posted an advertisement on a cybercrime forum to attract customers. The company stated that…
Dark Web Narco Gangs are a Major Concern for Law Enforcement
The dark web has developed into a centre for criminal activity in recent years, including human trafficking, cybercrime, and drug trafficking. And now, sources claim that Delhi is quickly becoming a hub for dark web syndicates. Multiple criminal organisations…
How Blockchain Technology Will Impact These Top 5 Industries
Blockchain technology is a digital ledger that is revolutionizing the way we conduct transactions, store data, and manage digital assets. It is a distributed, decentralized system that provides transparency, security, and immutability, making it a perfect fit for various industries. …
Latitude Financial Reveals Extent of Cyber Attack: 14 Million Customers Affected
Recently, Latitude Financial, a company listed on the Australian Securities Exchange (ASX), reported that it had suffered a cyber attack. The company stated that the attack was believed to have originated from a major vendor used by the company…
Why Endpoint Resilience Is Important
LastPass, a password management company, made headlines last month when it revealed that one of their DevOps engineers had his personal home computer hacked and infected with keylogging malware, resulting in the exfiltration of corporate data from the vendor’s…
Adaptive Access Technologies: Enhancing Security and Agility in Today’s Business Environment
Adaptive Access Technologies: A Dynamic Approach to Security and Agility Adaptive access technologies are gaining traction in the realm of cybersecurity due to their dynamic and intelligent approach to security that can adapt to the ever-changing threat landscape and provide…
Supply Chain Attack Targets 3CX App: What You Need to Know
A recently discovered supply chain attack has targeted the 3CX desktop app, compromising the security of thousands of users. According to reports, the attackers exploited a 10-year-old Windows bug that had an opt-in fix to gain access to the 3CX…
Ukrainian Police Arrests Suspects Accused of Stealing $4.3M From Victims Across Europe
The Ukrainian police have detained 10 suspects, arresting two for allegedly being involved in a cybercrime group that conducted phishing campaigns and was a part of fraudulent online marketplaces, stealing more than $4.3 million from over 1,000 users across Europe. …
A Microsoft Azure Flaw Could Compromise Bing and Office 365
Microsoft Azure Active Directory (Azure AD) appears vulnerable to a new vulnerability discovered by security researchers. It was discovered that a vulnerability in Bing search results allowed users to alter the results and view users’ private information. This included…
Sundar Pichai Promises the Release of an Upgraded Bard AI Chatbot Soon
Sundar Pichai, CEO of Alphabet and Google, has announced that the company will soon offer more competent AI models in response to criticism of his ChatGPT rival, Bard. According to Pichai, Bard is now competing with “more powerful automobiles”…
These APT Hackers Install Malware by Impersonating Antivirus Scans
To perform espionage, an advanced hacking group known as ‘Winter Vivern’ targets European government organizations and telecommunications service providers. Since this group’s activities align with the interests of the Russian and Belarusian governments, it is presumed to be a…
Cyberwarfare Leaks Reveal Russia’s Sweeping Efforts and Potential Targets
NTC Vulkan is a cybersecurity consultancy firm based in Moscow, which appears to offer ordinary cybersecurity services on the surface. However, a recent leak of confidential documents has revealed that the company’s engineers are also involved in the development of…
SafeMoon: Threat Actors Exploit the “Burn” Bug, Stealing $8.9M From Liquidity Pool
The SafeMoon token liquidity pool lost $8.9 million, after a threat actor took advantage of a recently developed “burn” smart contract function that artificially inflate the token price, enabling the actors to sell SafeMoon at a much higher price. SafeMoon…
The Risks of Automatic Updates: A Closer Look at the Malicious 3CX Update
On March 31, 2023, several companies reported that their 3CX phone systems had suddenly stopped working. Upon investigation, they found that their systems had been compromised by a malicious software update delivered by 3CX’s automatic update system. In this blog,…
Ransomware Threats in 2023: Increasing and Evolving
Cybersecurity threats are increasing every year, and 2023 is no exception. In February 2023, there was a surge in ransomware attacks, with NCC Group reporting a 67% increase in such attacks compared to January. The attacks targeted businesses of all…
Winter Vivern Hackers Exploit Zimbra Flaw to Siphon NATO Emails
Since February 2023, a Russian hacking group known as TA473, also identified as “Winter Vivern,” has been actively stealing the emails of NATO leaders, governments, soldiers, and diplomats by taking advantage of flaws in unpatched Zimbra endpoints. Sentinel Labs…
Protect Yourself from Healthcare Cyber Risks
It has become increasingly apparent in the past few years that technology has played a significant role to assist hospitals and patients in managing their interactions. This is at a time when healthcare systems are stretched to their limits.…
IcedID: A New Era with ‘Lite and Fork’ Malware
Proofpoint, a cybersecurity research firm, recently discovered two new variants of the IcedID malware namely “Lite” and “Forked.” The original IcedID malware has been around since 2017 and is commonly used by cybercriminals, but these new versions were only…
Online Privacy is a Myth; Here’s Why
Although it seems simple in theory, the reality is more nuanced when it comes to privacy. Our experience online has been significantly changed by ongoing technological advancements. Today, we use the internet for more than simply work and study; we…
Fraudsters Are Difficult to Spot, Thanks to AI Chatbots
Researchers at the University of Rochester examined what ChatGPT would write after being asked questions sprinkled with conspiracy theories to determine how the artificial intelligence chatbot would respond. In recent years, researchers have advised companies to avoid chatbots not…
Are Chatbots Making it Difficult to Trace Phishing Emails?
Chatbots are curbing a crucial line of defense against bogus phishing emails by rectifying grammatical and spelling errors, a key attribute to trace fraudulent mails, according to experts. The warning comes as international advisory published from the law enforcement agency…
Trojanized Tor Browser Bundle Drops Malware
Cybersecurity experts are warning about a new threat in the form of trojanized Tor browser installers. The Tor browser is a popular tool used by individuals to browse the internet anonymously. However, cybercriminals have been able to create fake…
The Urgent Need to Address the Critical Bug in IBM’s Aspera Faspex
IBM’s widely used Aspera Faspex has been found to have a critical vulnerability with a 9.8 CVSS rating, which could have serious consequences for organizations using the software. This blog will discuss the vulnerability in detail and the importance of…
Lemon8 Enters US Top Charts With TikTok Parent
The company ByteDance, which owns TikTok’s parent company ByteDance, released Lemon8, a social network app. Lemon8 boasts being one of this week’s top 10 most downloaded apps on the US App Store. Lemon8 was released in Japan in 2020,…
This New AlienFox Toolkit Steals Credentials for 18 Cloud Services
Threat actors can use a new modular toolkit called ‘AlienFox’ to scan for misconfigured servers and steal authentication secrets and credentials for cloud-based email services. The toolkit is sold to cybercriminals through a private Telegram channel, which has become…
Know These Potential Drawbacks Before Joining New Social Media Sites
New social media sites are launched on a regular basis. Many of these social platforms gain popularity and then fade away. This begs the question, are there any disadvantages to joining a new social media site? The most straightforward…
North Korean Hackers Carry Out Phishing Attack on South Korean Government Agency
North Korean hackers recently executed a phishing attack on a South Korean government agency using social engineering tactics, as reported on March 28th, 2023. The perpetrators belonged to a group known as APT Kimsuky, linked to North Korea’s intelligence…
Leading Tech Talent Issues Open Letter Warning About AI’s Danger to Human Existence
Elon Musk, Steve Wozniak, and Tristan Harris of the Center for Humane Technology are among the more than 1,100 signatories to an open letter that was published online Tuesday evening and requests that “all AI labs immediately pause for…
Security Copilot: Microsoft Employes GPT-4 to Improve Security Incident Response
Microsoft has been integrating Copilot AI assistants across its product line as part of its $10 billion investment in OpenAI. The latest one is Microsoft Security Copilot, that aids security teams in their investigation and response to security issues. According…
Clearview: Face Recognition Software Used by US Police
Clearview, a facial recognition company has apparently conducted nearly a million searches, helping US police. Haon Ton, CEO of Clearview has revealed to BBC that the firm now has looked into as much as 30 billion images from various platforms…
iCloud Keychain Data and Passwords are at Risk From MacStealer Malware
Uptycs, a cybersecurity company that discovered the information-stealing malware while searching for threats on the dark web, is warning that Mac computers have been the latest targets of updated info-stealing malware. The iCloud Keychain can easily access cryptocurrency wallets…
US Healthcare Startup Brightline Impacted by Fortra GoAnywhere Assaults
A firm providing virtual mental health services for children is the latest victim of Fortra’s widespread ransomware onslaught, which has spread its effects even further. The American healthcare behemoth Blue Shield of California confirmed that data from one of…
NullMixer Campaign: A Threat to Cybersecurity
A new cybersecurity threat has recently emerged in the form of the NullMixer campaign, which is causing concern among experts. The campaign has been found to distribute new polymorphic loaders, a type of malware that poses a significant threat to…
Pinduoduo Malware Executed a Dangerous 0-day Exploit Against Millions of Android Devices
In accordance with a new report, Pinduoduo, a popular Chinese shopping app, exploited a zero-day vulnerability in the Android operating system to uplift its own privileges, rob personal data from infected endpoints, and install malicious apps. Numerous sources validated…
How to Keep Up With a Shifting Threat Landscape
Cybercrime is a problem that is only escalating and is bad for business, as one might anticipate. Regardless of how you feel about it, it forces your business to take action in order to secure its infrastructure. Current threat…
How Threat Actors are Using IPFS for Email Phishing
InterPlanetary File System (IPFS) is a peer-to-peer distributed file system, that allows users around the world to exchange files. Instead of using file paths for addressing like centralized systems do, IPFS uses unique content identifiers (CID). The file itself stays…
Improper Disposal of IT Equipment Poses Cyber Security Risks
As technology continues to advance at a rapid pace, it is no surprise that electronic waste, or e-waste, has become a growing concern. With many companies constantly upgrading their IT equipment, the amount of electronic waste being produced is on…
Viral KYC Scam in Mumbai Steals Rs 1 Crore from 81 Users
The UPI (Unified Payment Interface) payment system has significantly changed how online payments are made in India. The UPI system allows banking customers to transfer money instantly across bank accounts for all kinds of transactions, including online shopping and…
Research Says, Mobile Phones are Listening to Your Conversations
You’re not alone if you’ve felt paranoid after your phone displayed an advertisement for a random item you just discussed. If you’ve recently been discussing it with a friend, seeing an advertisement for the same product can leave you…
Microsoft Conduct an Emergency Fix for the Notorious ‘Acropalypse’ Bug
Recently, Microsoft has acted quickly in patching up the ‘acropalypse’ bug that was discovered earlier this week. The bug could apparently enable information cropped out of images via the Windows screenshot tools to be recovered. According to BleepingComputer, Microsoft has…
Dallas County: Sold Computers May Have Public’s Personal Details
Dallas County officials are striving to determine the scope of a potentially massive data breach after discovering that personal data remained on thousands of computers sold at auction. The sheriff’s department used some of the computers, which comprised data…
Chinese-Designed Apps Pose Greater Privacy Risks to Americans
As the US Congress considers a ban on the Chinese social media app TikTok over security concerns, millions of Americans continue to download Chinese-designed apps that pose even greater privacy risks. Despite this, there has been no outcry from…
CLOPS Claim to Have Hacked 130 Organizations
It is now reported that the Clop ransomware group – known for its Linux variant recently – has used the zero-day vulnerability of the GoAnywhere MFT file transfer tool that they claim to have hacked into hundreds of organizations…
Upgrading Online Security with Password Managers
Online security has become a major concern for individuals and businesses alike, as cyber-attacks become more sophisticated and prevalent. Passwords play a critical role in protecting online security, but the traditional method of using passwords has become inadequate due to…
Pleading TikTok to “Think of the Children” Misses the Point
In nearly every congress hearing on big tech, be it on privacy, monopoly, or in the case of last week’s TikTok hearing on national security, at least one lawmaker is seen to be concerned about something along with the lines…
GoAnywhere Hack Targets UK Pension Protection Fund
Among the largest asset managers in the United Kingdom, the U.K. Pension Protection Fund, which manages £39 billion in assets, confirmed that the hack against GoAnywhere, the popular file-transferring service, had impacted it. There have been many reports in…
Malvertising Gives Cybercriminals Access to Big Technologies
Malvertising has been a more popular tool employed by cybercriminals in recent years to exploit unsuspecting internet users. When people click on an infected ad, malware is transferred to their computers and mobile devices, which is known as malvertising. Sadly,…
Watch Out for These Common Signs to Identify an Email Phishing Scam
Cybercriminals most frequently use phishing as a method of attack. This communication is a hoax designed to trick the recipient into disclosing private information, sending money, or clicking on a dangerous link. Usually, it is transmitted by email, social…
Microsoft Offers Guidelines on Detecting Outlook Zero-day Exploits
Microsoft has released a detailed guide to assist customers in detecting signs of compromise by exploiting a recently patched Outlook zero-day vulnerability. This privilege escalation security flaw in the Outlook client for Windows, tracked as CVE-2023-23397, enables attackers to…
NCA Infiltrates Cybercrime Market With Fake DDoS Sites
UK’s National Crime Agency (NCA) has recently conducted a sting operation as a part of Operation Power Off, a collaboration of international law enforcement agencies to shut down DDoS (distributed denial of service) infrastructure. In order to sabotage the online…
Users’ Private Info Accidentally Made Public by ChatGPT Bug
After taking ChatGPT offline on Monday, OpenAI has revealed additional information, including the possibility that some users’ financial information may have been compromised. A redis-py bug, which led to a caching problem, caused certain active users to potentially see…
A ChatGPT Bug Exposes Sensitive User Data
OpenAI’s ChatGPT, an artificial intelligence (AI) language model that can produce text that resembles human speech, has a security flaw. The flaw enabled the model to unintentionally expose private user information, endangering the privacy of several users. This event serves…
Schools’ Files Leak Online Days After Ransomware Deadline
Many documents purported to have been stolen from Minneapolis Public Schools, and have now been posted online. In the days following the announcement of the breach, a cyber gang claimed that the district did not meet its deadline to…
A Major Flaw in the AI Testing Framework MLflow can Compromise the Server and Data
MLflow, an open-source framework used by many organizations to manage and record machine-learning tests, has been patched for a critical vulnerability that could enable attackers to extract sensitive information from servers such as SSH keys and AWS credentials. Since MLflow…
GitHub Introduces the AI-powered Copilot X, which Uses OpenAI’s GPT-4 Model
The open-source developer platform GitHub, which is owned by Microsoft, has revealed the debut of Copilot X, the company’s perception of the future of AI-powered software development. GitHub has adopted OpenAI’s new GPT-4 model and added chat and voice…
How to Shield Yourself From Malicious Websites
The sense of wondering if you’ve just infected your phone or computer with a virus is familiar if you’ve ever clicked on a link someone sent you, say in an email or a direct message, only to be sent…
Kimsuky’s Attacks Alerted German and South Korean Agencies
In a joint warning issued by the German and South Korean intelligence agencies, it has been noted that a North Korean hacker group named Kimsuky has been increasing cyber-attack tactics against the South Korean network. With sophisticated phishing campaigns…