Balaji

Balaji

AresLoader Malware Attacking Citrix Users Through Malicious GitLab RepoAresLoader Malware Attacking Citrix Users Through Malicious GitLab Repo

AresLoader Malware Attacking Citrix Users Through Malicious GitLab Repo

Cyble Research and Intelligence Labs (CRIL) has recently detected AresLoader, a novel loader that is found to be disseminating numerous…

2 years ago
Critical VMware Vulnerabilities Let Attackers Execute Arbitrary CodeCritical VMware Vulnerabilities Let Attackers Execute Arbitrary Code

Critical VMware Vulnerabilities Let Attackers Execute Arbitrary Code

VMware Workstation, Workstation Pro, and Fusion have been subjected to several privately reported and fixed flaws. VMware has published a…

2 years ago
What is Single Sign-on (SSO) ? – Solution to Ensure Your Company Data SecurityWhat is Single Sign-on (SSO) ? – Solution to Ensure Your Company Data Security

What is Single Sign-on (SSO) ? – Solution to Ensure Your Company Data Security

Single Sign-on is an authentication process that helps to log in to multiple applications using single login credentials. Security is…

2 years ago
ChatGPT Can be Tricked To Write Malware When You Act as a Developer ModeChatGPT Can be Tricked To Write Malware When You Act as a Developer Mode

ChatGPT Can be Tricked To Write Malware When You Act as a Developer Mode

Japanese cybersecurity experts warn that ChatGPT can be deceived by users who input a prompt to mimic developer mode, leading…

2 years ago
ICICI Bank Data Leak – Millions of Customers’ Sensitive Data ExposedICICI Bank Data Leak – Millions of Customers’ Sensitive Data Exposed

ICICI Bank Data Leak – Millions of Customers’ Sensitive Data Exposed

Researchers have recently found that the ICICI Bank systems misconfiguration caused data leakage, exposing more than 3.6 million customers' sensitive…

2 years ago
Operation DreamJob – New Linux Malware Linked With 3CX Supply-Chain AttackOperation DreamJob – New Linux Malware Linked With 3CX Supply-Chain Attack

Operation DreamJob – New Linux Malware Linked With 3CX Supply-Chain Attack

ESET researchers have recently discovered that Linux users targeted with malware in the new "Operation DreamJob" Lazarus campaign for the…

2 years ago
Russian APT28 Group Exploiting Vulnerabilities in Cisco RoutersRussian APT28 Group Exploiting Vulnerabilities in Cisco Routers

Russian APT28 Group Exploiting Vulnerabilities in Cisco Routers

A recent report from CISA (US Cybersecurity and Infrastructure Security Agency)  revealed that the APT 28 group was responsible for…

2 years ago
New Google Chrome Zero-Day Bug Actively Exploited in Wide – Emergency Update!New Google Chrome Zero-Day Bug Actively Exploited in Wide – Emergency Update!

New Google Chrome Zero-Day Bug Actively Exploited in Wide – Emergency Update!

On April 18, 2023, Google released a new update for Chrome Desktop versions with security updates for actively exploited second…

2 years ago
Ex-Conti and FIN7 Hackers Team Up To Develop Domino Backdoor MalwareEx-Conti and FIN7 Hackers Team Up To Develop Domino Backdoor Malware

Ex-Conti and FIN7 Hackers Team Up To Develop Domino Backdoor Malware

The X-Force team at IBM has recently found a new malware family known as "Domino," made by ITG14, aka FIN7,…

2 years ago
ChatGPT Account Takeover Bug Allows Hackers To Gain User’s Online AccountChatGPT Account Takeover Bug Allows Hackers To Gain User’s Online Account

ChatGPT Account Takeover Bug Allows Hackers To Gain User’s Online Account

An independent security analyst and bug hunter, Nagli (@naglinagli), recently uncovered a critical security vulnerability in ChatGPT that allow attackers…

2 years ago