Threat actors are resorting to employing URLs to send ransomware, as they constantly search for innovative methods to deceive victims and bypass their defenses. They are employing more and more sophisticated tactics to distribute their ransomware is making their actions more dynamic. Threat actors often use different versions of ransomware …
Read More »Original BreachForums Breached, users PII Data sold Online
The stolen database from the compromised website, BreachForums, has resurfaced, and its remnants are now available for purchase under the name “breached_db_person.” The public has been granted access to extremely sensitive information, including the US No Fly List, FBI’s InfraGard, DC Health Link with Members of Congress data, and much …
Read More »New rules to Reveal Cyber Attacks Within 4 Days
Securities and Exchange Commission (SEC) of United States has recently given its approval to groundbreaking regulations. These regulations oblige publicly traded companies to promptly disclose any significant cyberattacks within a maximum of four days of detection. This marks a significant departure from the previous method of disclosing computer breaches. “Whether …
Read More »“TETRA: BURST” Global police, airport radio system and energy vulnerable to hackers
Researchers have discovered that TETRA, a radio technology used by critical infrastructure authorities, port administrations, and police forces, has many serious bugs. These bugs can be exploited by attackers to gain control of the communications. TETRA, the trunked radio system utilized by law enforcement, the military, critical infrastructure, and industrial …
Read More »174% increased of Mallox Ransomware activity
According to a recent report by Palo Alto’s Unit 42 Network, the incidence of Mallox ransomware (also known as TargetCompany, FARGO, or Tohnichi) has skyrocketed by an astonishing 174% in 2023 compared to the previous year. A new variant of ransomware called Xollam has surfaced recently. It is spread through …
Read More »Oracle Patches 32 Critical Flaws
A list of security patches has been released by oracle for more than 130+ products. These products are being used in industries, including banking, communication, enterprise, development and so on. Oracle patched the severity categorically as critical, high, medium, and low and it is based on their CVSS 3.1 score. …
Read More »PwC Data Breach: Information will be on .com Domain: Hackers post
The cyber attack on PricewaterhouseCoopers (PwC) involving MOVEit has escalated, with the Clop ransomware gang now unveiling the publication of the stolen data on a fresh domain with a .com extension. According to the threat actors, this information, reportedly originating from the PWC data breach, is soon to be disclosed …
Read More »CISA Released Free Cloud Security Tools securing Cloud Data
CISA has recently unveiled an invaluable assortment of free tools designed to empower organizations in safeguarding their cloud environments. CISA’s post mentioned that these tools assist incident response analysts and network defenders in managing, recognizing, and discovering threats, vulnerabilities, and anomalies in cloud or hybrid environments. In the course of …
Read More »Risk of giving wrong answers, Chat gpt owners face investigation
The United States has launched an investigation into artificial intelligence firm OpenAI’s risk of misinforming consumers. The Federal Trade Commission (FTC) sent a letter to the Microsoft-backed company. In the letter, he requested to know how ChatGPT is ruining people’s reputation. OpenAI CEO Sam Altman said they will work with …
Read More »Worm GPT for hackers, ‘No Ethical Boundaries or Limitations’
Unveiling WormGPT: A malicious chatbot created by a skilled hacker as a dedicated assistant for cybercriminals. According to SlashNext, an email security provider that tested the chatbot, the developer of WormGPT is offering access to the program for sale in a well-known hacking forum. “Malicious actors are creating their own …
Read More »