It has been only one year and nine months since OpenAI made ChatGPT available to the public, and it has already had a massive impact on our lives. While AI will undoubtedly reshape our world, the exact nature of this…
Tag: EN
Group-IB partners with SecurityHQ to enhance SOC capabilities
Group-IB announced the signing of a global partnership agreement with SecurityHQ, a global independent Managed Security Service Provider (MSSP). With this partnership, SecurityHQ will leverage Group-IB’s Threat Intelligence, Attack Surface Management and Digital Risk Protection to bolster its global Security…
AMD Patched The Newly Disclosed SinkClose CPU Vulnerability
Security researchers have highlighted a new vulnerability, ‘SinkClose,’ affecting AMD CPUs that allow malicious code… AMD Patched The Newly Disclosed SinkClose CPU Vulnerability on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has…
ProtonVPN Opens Up Browser Extension Feature To Free Users
Continuing with its product improvements and feature upgrades to facilitate users, ProtonVPN recently made another… ProtonVPN Opens Up Browser Extension Feature To Free Users on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article…
A week in security (August 12 – August 18)
A list of topics we covered in the week of August 12 to August 18 of 2024 This article has been indexed from Malwarebytes Read the original article: A week in security (August 12 – August 18)
Unicoin Staff Locked Out of G-Suite in Mystery Attack
Employees at crypto firm Unicoin couldn’t access Google services for four days during a recent breach This article has been indexed from www.infosecurity-magazine.com Read the original article: Unicoin Staff Locked Out of G-Suite in Mystery Attack
OpenAI takes action against Iranian disinformation campaigns using ChatGPT: Cyber Security Today for Monday, August 19th, 2024
Cybersecurity Today: OpenAI’s Action Against Iranian Disinformation & Chrome’s New Privacy Features In this episode of Cybersecurity Today, host Jim Love discusses OpenAI’s recent identification and neutralization of chat GPT accounts linked to Iranian disinformation campaigns, Google’s upcoming privacy enhancements…
Epic Games’s Fortnite Returns To Smartphones After Four Years
Epic Games’ Fortnite returns to Android devices and EU iPhones via company’s third-party app store after years of legal wrangling This article has been indexed from Silicon UK Read the original article: Epic Games’s Fortnite Returns To Smartphones After Four…
Explore Talent (August 2024) – 8,929,384 breached accounts
In August 2024, a slew of security vulnerabilities were identified with a conglomerate of online services which included the talent network Explore Talent. A vulnerable API exposed the personal records of 11.4M users of the service of which 8.9M unique…
The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens
In episode 342, we discuss the effectiveness of people-search removal tools like DeleteMe and Reputation Defender, based on a study by Consumer Reports. We also cover how almost every American’s social security number has potentially been stolen by hackers and…
Microsoft Patches Zero-Day Flaw Exploited by North Korea’s Lazarus Group
A newly patched security flaw in Microsoft Windows was exploited as a zero-day by Lazarus Group, a prolific state-sponsored actor affiliated with North Korea. The security vulnerability, tracked as CVE-2024-38193 (CVSS score: 7.8), has been described as a privilege escalation…
Do you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python, (Mon, Aug 19th)
I found a tiny .bat file that looked not suspicious at all: 3650.bat (SHA256:bca5c30a413db21f2f85d7297cf3a9d8cedfd662c77aacee49e821c8b7749290) with a very low VirusTotal score (2/65)[1]. The file is very simple, it invokes a PowerShell: This article has been indexed from SANS Internet Storm Center,…
National Public Data Leaks Social Security Numbers of about 2.7 billion populaces
In the first week of August this year, a hacker released a dataset containing personal information of Americans from the servers of National Public Data, an organization providing background check services to businesses. By the third week of the month,…
Top Paying Countries for Cybersecurity Experts
As the global demand for cybersecurity experts continues to surge, driven by increasing cyber threats and complex digital infrastructures, certain countries stand out for offering exceptional salaries in this field. Here’s a look at some of the top-paying countries for…
Researchers Found a New Technique to Defend Cache Side Channel Attacks
Researchers from the University of Rochester have unveiled a novel technique to defend against cache side-channel attacks, a prevalent threat in modern computing systems. The new method, named RollingCache, promises to enhance the security of shared systems by dynamically altering…
Interoperability in Healthcare: How APIs are Bridging the Gap
Interoperability is the lifeblood of the modern healthcare sector. Effective patient care relies on the ability of disparate healthcare systems, devices, and applications to seamlessly access, exchange, and ultimately use data; without interoperability, this would not be possible. A failure…
Ransomware Gangs Introduce New EDR-Killing Tool
Sophos researchers have uncovered a new tool, EDRKillShifter, that malicious actors are using to target endpoint detection and response (EDR) systems. The discovery came after an unsuccessful ransomware attack in May. The threat actors deployed the tool to disable endpoint…
National Public Data Admits to Breach Leaking Millions of Social Security Numbers
Background check provider National Public Data (NPD) has confirmed a data breach after hackers leaked a stolen database containing millions of Social Security numbers and other sensitive information. The compromised data reportedly includes names, email addresses, phone numbers, Social Security…
Researchers Uncover New Infrastructure Tied to FIN7 Cybercrime Group
Cybersecurity researchers have discovered new infrastructure linked to a financially motivated threat actor known as FIN7. The two clusters of potential FIN7 activity “indicate communications inbound to FIN7 infrastructure from IP addresses assigned to Post Ltd (Russia) and SmartApe (Estonia),…
BeaverTail Malware Attacking Windows Users Via Weaponized Games
Researchers uncovered a new malware campaign dubbed BeaverTail, a North Korean cyber espionage malware family primarily focusing on job seekers. Initially identified as a JavaScript-based info stealer, it has since morphed into a native macOS version that pretends to be…