Tag: computer security
Invicta Malware Delivered Through Fake GoDaddy Refund Invoices
The creator of this Invicta malware is heavily active on social networking sites, using them to advertise their information-stealing malware and its deadly...
What is SaaS Security? – Types, Challenges, Threats & Protection Guide
SaaS (Software-as-a-Service) has become popular for delivering software applications and services over the cloud.While SaaS offers numerous benefits, such as flexibility and scalability, it...
ChatGPT & Bing – Indirect Prompt-Injection Attacks Leads to Data Theft
SYDNEY makes a return, but this time in a different way. Following Microsoft's decision to discontinue its turbulent Bing chatbot's alter ego, devoted followers...
APT Hacker Group Attacking SMBs to Use Their Infrastructure
Proofpoint's security researchers have identified indications of sophisticated threat actors focusing their attention on small and medium-sized enterprises and service providers operating within that...
Wireshark 4.0.6 Released – Fix for 9 vulnerabilities
Wireshark is a free and open-source network packet analyzer used by people worldwide. It has a wide range of uses when it comes to...
Hackers Use Weaponized DOCX File to Deploy Stealthy Malware
CERT-UA has identified and addressed a cyber attack on the government information systems of Ukrainian governmental state bodies.Through investigation, it was discovered that the...
CISA Warns that Hackers Actively Exploiting Samsung Vulnerability
CISA has issued a recent warning regarding a security flaw that impacts Samsung devices, enabling attackers to circumvent Android's address space layout randomization (ASLR)...
Hackers Using AI Tools Like ChatGPT to Deploy Malware
Malicious ad campaigns with themes connected to artificial intelligence (AI) tools like Midjourney and ChatGPT have been seen in Google's search engine, according to...
Hackers Use SIM Swapping Technique to Gain Access to Microsoft Azure Machines
Researchers uncovered a financially motivated threat group known as 'UNC3944' which employs phishing and SIM-swapping techniques to seize control of Microsoft Azure admin accounts. Enabling...
Hackers Modified Cobalt Strike Capabilities to Attack macOS Users
Geacon, a Cobalt Strike implementation written in Golang, is likely to attract the attention of threat actors looking for vulnerable macOS devices.Threat actors have...