Home Tags Computer security

Tag: computer security

Fake GoDaddy Refund Invoices

Invicta Malware Delivered Through Fake GoDaddy Refund Invoices

The creator of this Invicta malware is heavily active on social networking sites, using them to advertise their information-stealing malware and its deadly...
SaaS Security

What is SaaS Security? – Types, Challenges, Threats & Protection Guide

SaaS (Software-as-a-Service) has become popular for delivering software applications and services over the cloud.While SaaS offers numerous benefits, such as flexibility and scalability, it...

ChatGPT & Bing – Indirect Prompt-Injection Attacks Leads to Data Theft

SYDNEY makes a return, but this time in a different way. Following Microsoft's decision to discontinue its turbulent Bing chatbot's alter ego, devoted followers...
APT Hacker Group Attacking SMBs

APT Hacker Group Attacking SMBs to Use Their Infrastructure

Proofpoint's security researchers have identified indications of sophisticated threat actors focusing their attention on small and medium-sized enterprises and service providers operating within that...

Wireshark 4.0.6 Released – Fix for 9 vulnerabilities

Wireshark is a free and open-source network packet analyzer used by people worldwide. It has a wide range of uses when it comes to...
Weaponized DOCX File

Hackers Use Weaponized DOCX File to Deploy Stealthy Malware

CERT-UA has identified and addressed a cyber attack on the government information systems of Ukrainian governmental state bodies.Through investigation, it was discovered that the...
Exploiting Samsung Vulnerability

CISA Warns that Hackers Actively Exploiting Samsung Vulnerability

CISA has issued a recent warning regarding a security flaw that impacts Samsung devices, enabling attackers to circumvent Android's address space layout randomization (ASLR)...
ChatGPT to Deploy Malware

Hackers Using AI Tools Like ChatGPT to Deploy Malware

Malicious ad campaigns with themes connected to artificial intelligence (AI) tools like Midjourney and ChatGPT have been seen in Google's search engine, according to...
SIM Swapping Technique

Hackers Use SIM Swapping Technique to Gain Access to Microsoft Azure Machines

Researchers uncovered a financially motivated threat group known as 'UNC3944' which employs phishing and SIM-swapping techniques to seize control of Microsoft Azure admin accounts. Enabling...
Cobalt Strike Modified to Attack macOS Users

Hackers Modified Cobalt Strike Capabilities to Attack macOS Users

Geacon, a Cobalt Strike implementation written in Golang, is likely to attract the attention of threat actors looking for vulnerable macOS devices.Threat actors have...

Complete Free Website Security Check


Recent Posts