AI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread Malware
The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages. The Langchain framework has allowed for...
Microsoft Two-Step Phishing Campaign Attack LinkedIn Users
The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly used for work communication....
Ransomware Protection for SaaS Applications: How Backup Strategies Can Mitigate Cyber Risks
Because of today's predominantly digital ecosystem, ransomware attacks pose a significant threat to organizations. These attacks can significantly affect those leveraging Software as a...
Threat Actors Deliver Malware via YouTube Video Game Cracks
Threat actors target home users with information-stealing malware like Vidar, StealC, and Lumma Stealer, which disguises the malware as pirated software and video game...
AGENT TESLA Malware Steals login Credentials From Chrome & Firefox
Researchers investigated a recent Agent Tesla malware campaign targeting US and Australian organizations, which used phishing emails with fake purchase orders to trick victims...
Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums
A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale on a notorious hacker forum.This exploit, which has not...
Attention all Windows Users! The Microsoft April Security Update Could Break Your VPN
In a recent development that has caught the attention of IT administrators and users alike, Microsoft has acknowledged a significant issue affecting VPN connections...