Cyber Attack

Git Project Security Vulnerabilities Let Attackers Execute Arbitrary CodeGit Project Security Vulnerabilities Let Attackers Execute Arbitrary Code

Git Project Security Vulnerabilities Let Attackers Execute Arbitrary Code

A fresh set of Git releases was made available to fix several security flaws. It gives attackers the ability to…

2 years ago
New Phishing Attacks Using ChatGPT to Develop Sophisticated CampaignsNew Phishing Attacks Using ChatGPT to Develop Sophisticated Campaigns

New Phishing Attacks Using ChatGPT to Develop Sophisticated Campaigns

Phishing has been one of the greatest threats to organizations, growing year after year. Phishing attacks have contributed to 90%…

2 years ago
ChatGPT Can be Tricked To Write Malware When You Act as a Developer ModeChatGPT Can be Tricked To Write Malware When You Act as a Developer Mode

ChatGPT Can be Tricked To Write Malware When You Act as a Developer Mode

Japanese cybersecurity experts warn that ChatGPT can be deceived by users who input a prompt to mimic developer mode, leading…

2 years ago
Accidental ‘write’ Permissions In Alibaba PostgreSQL Let Attackers Access Sensitive DataAccidental ‘write’ Permissions In Alibaba PostgreSQL Let Attackers Access Sensitive Data

Accidental ‘write’ Permissions In Alibaba PostgreSQL Let Attackers Access Sensitive Data

Two new critical flaws have been found in Alibaba Cloud’s popular services, ApsaraDB and AnalyticDB. Both of them were in…

2 years ago
AuKill – A Malware That Kills EDR Clients To Attack Windows SystemsAuKill – A Malware That Kills EDR Clients To Attack Windows Systems

AuKill – A Malware That Kills EDR Clients To Attack Windows Systems

A new hacking tool, AuKill, disables Endpoint Detection & Response (EDR) software for threat actors to launch BYOD attacks by…

2 years ago
ICICI Bank Data Leak – Millions of Customers’ Sensitive Data ExposedICICI Bank Data Leak – Millions of Customers’ Sensitive Data Exposed

ICICI Bank Data Leak – Millions of Customers’ Sensitive Data Exposed

Researchers have recently found that the ICICI Bank systems misconfiguration caused data leakage, exposing more than 3.6 million customers' sensitive…

2 years ago
Russian APT28 Group Exploiting Vulnerabilities in Cisco RoutersRussian APT28 Group Exploiting Vulnerabilities in Cisco Routers

Russian APT28 Group Exploiting Vulnerabilities in Cisco Routers

A recent report from CISA (US Cybersecurity and Infrastructure Security Agency)  revealed that the APT 28 group was responsible for…

2 years ago
Ex-Conti and FIN7 Hackers Team Up To Develop Domino Backdoor MalwareEx-Conti and FIN7 Hackers Team Up To Develop Domino Backdoor Malware

Ex-Conti and FIN7 Hackers Team Up To Develop Domino Backdoor Malware

The X-Force team at IBM has recently found a new malware family known as "Domino," made by ITG14, aka FIN7,…

2 years ago
ChatGPT Account Takeover Bug Allows Hackers To Gain User’s Online AccountChatGPT Account Takeover Bug Allows Hackers To Gain User’s Online Account

ChatGPT Account Takeover Bug Allows Hackers To Gain User’s Online Account

An independent security analyst and bug hunter, Nagli (@naglinagli), recently uncovered a critical security vulnerability in ChatGPT that allow attackers…

2 years ago
Used Routers Fully Loaded With Corporate Secrets for Just $100Used Routers Fully Loaded With Corporate Secrets for Just $100

Used Routers Fully Loaded With Corporate Secrets for Just $100

Researchers at ESET found that hardware on resale in the market consisted of highly confidential information such as IPsec or…

2 years ago