GPT-4 for health? Recently, OpenAI and WHOOP collaborated to launch a GPT-4-powered, individualized health and fitness coach. A multitude of questions about health and fitness can be answered by WHOOP Coach. It can answer queries such as “What was my…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Three Ways Jio’s BharatGPT Will Give It an Edge Over ChatGPT
In an era where artificial intelligence (AI) is transforming industries worldwide, India’s own Reliance Jio is rising to the challenge with the launch of BharatGPT. BharatGPT, a visionary leap into the future of AI, is likely to be a…
User-Friendly Update: Clear Your Chrome History on Android with Ease
As part of its commitment to keeping users happy, Google Chrome prioritizes providing a great experience – one of the latest examples of this is a new shortcut that makes it easier to clear browsing data on Android. Chrome…
Cyber Intruders Disrupt Operations at Beirut International Airport
Over the weekend, the Flight Information Display Screens at Beirut’s international airport fell victim to a hacking incident that not only showcased politically motivated messages but also temporarily disrupted baggage inspection, according to local media reports. The hackers…
What are the Privacy Measures Offered by Character AI?
In the era where virtual communication has played a tremendous part in people’s lives, it has also raised concerns regarding its corresponding privacy and data security. When it comes to AI-based platforms like Character AI, or generative AI, privacy concerns…
Hackers Find a Way to Gain Password-Free Access to Google Accounts
Cybercriminals find new ways to access Google accounts Cybersecurity researchers have found a way for hackers to access the Google accounts of victims without using the victims’ passwords. According to a research, hackers are already actively testing a potentially harmful…
Automotive Industry Under Ransomware Attacks: Proactive Measures
Ransomware has become a highly profitable industry, with major players like Conti Ransomware and Evil Corp leading the way. Although these entities are not publicly traded and do not report earnings to regulatory bodies like the SEC, it is…
Integrating the Power of AI and Blockchain for Data Security and Transparency
In an ever-changing digital landscape, providing strong data security and transparency has become critical. This article explores the dynamic interaction of two transformational technologies: artificial intelligence (AI) and blockchain. AI improves data security Artificial intelligence (AI) is critical for…
Character.ai’s AI Chatbots Soar: Celebrities, Therapists, and Entertainment, All in One Platform
Character.ai, a widely recognized platform, allows users to construct chatbots resembling a diverse array of personalities, including the likes of Vladimir Putin, Beyoncé, Super Mario, Harry Potter, and Elon Musk. These chatbots, powered by the same AI technology as…
Digital Battlefield: Syrian Threat Group’s Sinister SilverRAT Emerges
There is a threat group known as “Anonymous Arabic” that released Silver RAT, a remote access Trojan (RAT) that can bypass security software and launch hidden programs quietly on the computer system. Cyfirma claims that the developers maintain a…
Embracing the Virtual: The Rise and Role of vCISOs in Modern Businesses
In recent years, the task of safeguarding businesses against cyber threats and ensuring compliance with security standards has become increasingly challenging. Unlike larger corporations that typically employ Chief Information Security Officers (CISOs) for handling such issues, smaller businesses often…
Cancer Hospital Suffers Ransomware Attack, Hackers Threaten to Swat Patients
Harm patients if the medical facilities don’t pay Extortionists are now threatening to harm hospital patients if the medical facilities don’t pay the thieves’ ransom demands. They do this by reporting bomb threats or other fictitious reports to the police,…
Anthropic Pledges to Not Use Private Data to Train Its AI
Anthropic, a leading generative AI startup, has announced that it would not employ its clients’ data to train its Large Language Model (LLM) and will step in to safeguard clients facing copyright claims. Anthropic, which was established by former…
Web3: Championing Digital Freedom and Safeguarding Liberty in the Modern Era
In an era defined by technological progress shaping our daily lives, Web3 emerges as a beacon of hope and promise, akin to early American pioneers like Thomas Jefferson who established governance systems to safeguard public liberty. Going beyond mere…
Here’s How To Steer Clear Of QR Code Hacking
QR codes, present for years and widely embraced during COVID-19, offer great benefits. Yet, cybercriminals exploit them, creating malicious QR codes to unlawfully access your personal and financial data. These tampered codes pose a threat, potentially leading to unauthorised…
Privacy at Stake: Meta’s AI-Enabled Ray-Ban Garners’ Mixed Reactions
There is a high chance that Meta is launching a new version of Ray-Ban glasses with embedded artificial intelligence assistant capabilities to revolutionize wearable technology. As a result of this innovation, users will have the ability to process audio…
Orrick Data Breach: Law Firm Dealing with Data Breaches Hit by One
An international law firm assists businesses impacted by security events has experienced a cyberattack, where it compromised the sensitive health information of hundreds of thousands of data breach victims. Orrick, Herrington & Sutcliffe, the San Francisco-based company revealed last week…
North Korean Actors Behind $600M in Crypto Thefts: TRM Labs
North Korean Hackers According to a TRM Labs analysis, hackers with ties to North Korea were responsible for one-third of all cryptocurrency exploits and thefts last year, taking away about $600 million in cash. The blockchain analytics company claimed on…
Cybercriminals Exploit X Gold Badge, Selling Compromised Accounts on Dark Web
A recent report highlights the illicit activities of cybercriminals exploiting the “Gold” verification badge on X (formerly Twitter). Following Elon Musk’s acquisition of X in 2022, a paid verification system was introduced, allowing regular users to purchase blue ticks. Additionally,…
Security Issue in Banking Applications?
Recently, we tested a mobile application of a BFSI platform, which allowed the organization’s employees to view and interact with new customer leads. The mobile app had a password-based authentication system, with the username being the mobile number of the…