New Research Exposes Security Risks in ChatGPT Plugins
Security researchers have uncovered critical security flaws within ChatGPT plugins. By exploiting these flaws, attackers could seize control of an...
Security researchers have uncovered critical security flaws within ChatGPT plugins. By exploiting these flaws, attackers could seize control of an...
Impersonated accounts on X (formerly Twitter) have been blamed for the majority of cryptocurrency phishing attacks last month, with victims...
Over three-quarters of cyber incidents impacted small businesses in 2023, with ransomware having the biggest impact on these firms, according...
A malicious campaign has been observed exploiting the blockchain-based Meson service for illicit gains ahead of the crypto token unlock...
A recent study conducted by Kaspersky Security Assessment experts has revealed the most prevalent vulnerabilities in corporate web applications developed...
The UK will remain “exposed and unprepared” for a potentially catastrophic ransomware attack if it continues to adopt a head-in-the-sand...
Security researchers have uncovered a trend involving the exploitation of 1-day vulnerabilities, including two in Ivanti Connect Secure VPN. The flaws,...
The BianLian threat actor has been observed shifting toward extortion-only activities, according to recent findings by GuidePoint’s Research and Intelligence...
Ransomware losses in the US surged to $59.6m in 2023, a 74% rise on the previous year’s reported figure of...
AI laboratories will be compelled to disclose their development of general-purpose AI as governments look to have more oversight over...
Sensitive Swiss federal government data, including classified documents and log in credentials, were leaked by the Play ransomware group following...
A Chinese national who used to work at Google has been charged with stealing intellectual property from the tech giant...
Cybersecurity researchers have uncovered a new cyber-threat involving fraudulent Skype, Google Meet and Zoom websites aimed at spreading malware. The campaign,...
A sophisticated cyber-espionage campaign by the China-aligned APT group Evasive Panda (also known as BRONZE HIGHLAND and Daggerfly) has been...
A novel phishing campaign leveraged legitimate Dropbox infrastructure and successfully bypassed multifactor authentication (MFA) protocols, new research from Darktrace has...
UnitedHealth Group has published a timeline to restore Change Healthcare’s systems following the BlackCat/ALPHV ransomware attack, which has led to...
The British Library ransomware attack was likely caused by the compromise of third-party credentials coupled with no multifactor authentication (MFA)...
As businesses migrate their services to hybrid and multi-cloud environments, cloud misconfigurations and security flaws are becoming critical points of...
A notorious Russian state-backed APT group has accessed Microsoft source code and internal systems in an ongoing campaign that was...
A nurse practitioner has pleaded guilty to her role in a massive $136m conspiracy to defraud the US government’s Medicare...
Introduction The Local Security Authority Subsystem Service (LSASS) process in Windows systems manages the security policy, writes to the Security...
Published Date: 06/03/2024 Introduction Ransomware attacks often involve encrypting files on a victim's system and leaving ransom notes with instructions...
Published Date: 06/03/2024 Introduction This hunt aims to identify potentially malicious activities involving encoded PowerShell commands. Encoded commands are a...
Welcome back to our weekly cyber security tip. This week, we're shining the spotlight on the increasingly high-tech world of...