General Security News
-
Catching the Catphish: Join the Expert Webinar on Combating Credential Phishing
Is your organization constantly under threat from credential phishing? Even with comprehensive security awareness training, many employees still...
-
North Korean Hackers Suspected in New Wave of Malicious npm Packages
The npm package registry has emerged as the target of yet another highly targeted attack campaign that aims to entice developers into downloading...
-
Beware of Fake Chrome Browser Updates that Install Malware
Reports indicate that there seems to be an ongoing campaign that lures victims into installing a Remote Administration Tool called NetSupport...
-
Black Hat USA 2023: Complete AI Briefings Roundup
The 26th annual BLACK HAT USA is taken place at the Mandalay Bay Convention Centre in Las Vegas from August 5 to August 10, 2023. Four days of...
-
Hackers Compromised ChatGPT Model with Indirect Prompt Injection
ChatGPT quickly gathered more than 100 million users just after its release, and the ongoing trend includes newer models like the advanced GPT-4...
-
India Passes New Digital Personal Data Protection Bill (DPDPB), Putting Users' Privacy First
The Indian President Droupadi Murmu on Friday granted assent to the Digital Personal Data Protection Bill (DPDPB) after it was unanimously passed...
-
Multiple Flaws in CyberPower and Dataprobe Products Put Data Centers at Risk
Multiple security vulnerabilities impacting CyberPower's PowerPanel Enterprise Data Center Infrastructure Management (DCIM) platform and...
-
Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping
Multiple security vulnerabilities have been disclosed in AudioCodes desk phones and Zoom's Zero Touch Provisioning (ZTP) that could be potentially...
-
Authorities Taken Down Bulletproof Hosting Provider Lolek
The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and Poland to...
-
New Infostealer Malware Steal Logs & Corporate Access Data
Infostealer malware is becoming extremely popular among cybercriminals, especially in the malware-as-a-service (MaaS) based sector. These kinds of...
-
Researchers Tricked Hackers into Reveal Their Secrets Using Honeypot
In the last three years, hackers unknowingly seeking data or malware deployment have found a seemingly vulnerable virtual machine that is hosted...
-
16 New CODESYS SDK Flaws Expose OT Environments to Remote Attacks
A set of 16 high-severity security flaws have been disclosed in the CODESYS V3 software development kit (SDK) that could result in remote code...