Balaji

Balaji

Fujitsu Hacked – Attackers Infected The Company Computers with MalwareFujitsu Hacked – Attackers Infected The Company Computers with Malware

Fujitsu Hacked – Attackers Infected The Company Computers with Malware

Fujitsu Limited announced the discovery of malware on several of its operational computers, raising concerns over the potential leak of…

1 year ago
DarkGPT – A ChatGPT-4 Powered OSINT Tool To Detect Leaked DatabasesDarkGPT – A ChatGPT-4 Powered OSINT Tool To Detect Leaked Databases

DarkGPT – A ChatGPT-4 Powered OSINT Tool To Detect Leaked Databases

DarkGPT, your next-level OSINT (Open Source Intelligence) assistant. In this digital era, the ability to sift through vast amounts of…

1 year ago
Hackers Trick Users to Install Malware Via Weaponized PDFHackers Trick Users to Install Malware Via Weaponized PDF

Hackers Trick Users to Install Malware Via Weaponized PDF

In a sophisticated cyberattack campaign, malicious actors impersonating Colombian government agencies target individuals across Latin America. The attackers are distributing…

1 year ago
ChatGPT-Next-Web SSRF Bug Let Hackers Gain Full Access to HTTP EndpointsChatGPT-Next-Web SSRF Bug Let Hackers Gain Full Access to HTTP Endpoints

ChatGPT-Next-Web SSRF Bug Let Hackers Gain Full Access to HTTP Endpoints

There are advantages to using standalone AI chatbots over cloud-based alternatives such as OpenAI; however, there are also some security…

1 year ago
Magnet-Goblin Hackers Attack Public Services Using 1-Day ExploitsMagnet-Goblin Hackers Attack Public Services Using 1-Day Exploits

Magnet-Goblin Hackers Attack Public Services Using 1-Day Exploits

A new threat actor, Magnet Goblin, emerged by rapidly exploiting recently disclosed vulnerabilities (CVE-2023-46805 & CVE-2023-21887) in Ivanti Connect Secure…

1 year ago
KrustyLoader Backdoor Attack Both Windows & Linux SystemsKrustyLoader Backdoor Attack Both Windows & Linux Systems

KrustyLoader Backdoor Attack Both Windows & Linux Systems

Recent developments within the cybersecurity landscape have included the emergence of KrustyLoader, a sophisticated Rust-based backdoor that has caught the…

1 year ago
BianLian Hackers Hijacked TeamCity Servers To Install GO BackdoorBianLian Hackers Hijacked TeamCity Servers To Install GO Backdoor

BianLian Hackers Hijacked TeamCity Servers To Install GO Backdoor

BianLian attackers exploited a TeamCity vulnerability (CVE-2024-27198 or CVE-2023-42793) to gain initial access and move laterally within the network.  They…

1 year ago
Cybercriminals Hacking Systems with 10+ Legitimate Data-Extraction ToolsCybercriminals Hacking Systems with 10+ Legitimate Data-Extraction Tools

Cybercriminals Hacking Systems with 10+ Legitimate Data-Extraction Tools

In recent months, the cybersecurity landscape has witnessed a significant evolution in ransomware attacks, with perpetrators deploying an increasingly diverse…

1 year ago
GTPDOOR – Previously Unknown Linux Malware Attack Telecom NetworksGTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within the closed GRX network, which connects…

1 year ago
US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsAppUS Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019. The lawsuit claims that NSO took…

1 year ago