A critical security flaw that might allow for unauthenticated remote code execution has been identified and is categorized as CVE-2023-46747 with a 9.8 CVSS score. The...
With advancing tech, concerns rise over the misuse of large language models like ChatGPT. Recently, an LLM model called “WormGPT” surfaced on underground forums, which is significantly...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign aimed to...
According to recent reports, a threat actor has compromised the confidential information of 3,200 Airbus vendors. The exposed data includes sensitive details such as names, phone...
In the Hewlett Packard Enterprise OneView Software, three security flaws have been identified, which might be remotely exploited to allow authentication bypass, disclosure of sensitive information,...
In recent developments, reports have surfaced regarding the Akira ransomware threat actors targeting Cisco VPNs lacking multi-factor authentication (MFA). This vulnerability, tracked as CVE-2023-20269, can potentially allow unauthorized access to...
A group of Researchers unearthed critical code Proton Mail vulnerabilities that could have jeopardized the security of Proton Mail, a renowned privacy-focused webmail service. These vulnerabilities...
Telegram Messenger offers global, cloud-based instant messaging with several features:- Cybersecurity researchers at Securlist recently found several Telegram mods on Google Play in various languages (traditional...
Mobile devices and apps play a growing role in user identification, but password theft, resembling identity theft, invites diverse eavesdropping attacks, including stealthy indirect ones using side-channels....
A Domain Generation Algorithm (DGA) creates numerous domain names, serving as meeting points for malware C&C servers. DGAs help malware evade security measures by generating new,...
Recent Comments