Apria Healthcare Hacked

Apria Healthcare Hacked – Over 2M Users Data Exposed

0
Apria HealthCare Inc. is a leading home medical equipment and clinical support provider. The company was founded in 1924 and had a net worth...
GuLoader via Google Drive

Fully Encrypted GuLoader Uses Google Drive to Download Payloads

0
Antivirus products continuously advance to combat evolving threats, prompting malware developers to create new bypassing techniques like "packing" and "crypting," GuLoader is a notable...
IT Guy Jailed ddos

Russian IT Guy Jailed for DDoSing Government Websites

0
According to reports from the FSB (Federal Security Service) Department’s Press Service in Rostov Region, Yevgeny Kotikov, an IT specialist, was sentenced to three...
ChatGPT to Deploy Malware

Hackers Using AI Tools Like ChatGPT to Deploy Malware

0
Malicious ad campaigns with themes connected to artificial intelligence (AI) tools like Midjourney and ChatGPT have been seen in Google's search engine, according to...
Reveal(x)

Reveal(x) – New Tool to Defend Against ChatGPT Data Leaks

0
ExtraHop released a new tool called "Reveal(x)" that helps organizations understand their potential risk exposure from employee use of OpenAI ChatGPT by providing visibility...
SIM Swapping Technique

Hackers Use SIM Swapping Technique to Gain Access to Microsoft Azure Machines

0
Researchers uncovered a financially motivated threat group known as 'UNC3944' which employs phishing and SIM-swapping techniques to seize control of Microsoft Azure admin accounts. Enabling...
Cisco Switch Vulnerabilities

Critical Cisco Switch Vulnerabilities Allow Remote Exploitation

0
The web-based user interface of some Cisco Small Business Series Switches contains multiple vulnerabilities, according to a warning from Cisco.Cisco lists four critical remote...
researchers Uncovered QakBot Malware

Researchers Uncovered Notorious QakBot Malware C2 Infrastructure

0
Tam Cymru researchers have recently revealed noteworthy patterns and irregularities from their continuous monitoring of QakBot's command and control infrastructure. The researchers shared high-level insights...
Cobalt Strike Modified to Attack macOS Users

Hackers Modified Cobalt Strike Capabilities to Attack macOS Users

0
Geacon, a Cobalt Strike implementation written in Golang, is likely to attract the attention of threat actors looking for vulnerable macOS devices.Threat actors have...
Lancefly APT Hackers

Lancefly APT Hackers Using Custom Backdoor to Attack Government Orgs

0
The cybersecurity researchers at Symantec Threat Labs recently discovered APT hacking group has been utilizing the specialized 'Merdoor' backdoor malware to conduct precise and...

Complete Free Website Security Check

Website

Recent Posts