A group of AI experts, tech entrepreneurs, and scientists have signed an open letter calling for a pause on the development and testing of AI technologies more powerful than OpenAI’s language model…
Category: English
Microsoft warns of Outlook exploit – VIDEO
Microsoft has warned that Russian APT actors exploited a zero-day vulnerability in Outlook as early as April 2022, and has urged organizations to hunt for signs of compromise. The vulnerability, tracked as…
Proactive VA – Vulnerability Assessment – VIDEO
Vulnerability assessment is a process in which organizations analyze and identify potential security weaknesses and risks in a system, network, or application. Vulnerability assessments are typically conducted manually or with the help…
Notable Hacks and Data Leaks – VIDEO
Several major players have been affected by hacks and data leaks in recent years, such as AT&T Vendor, T-Mobile, JD Sports, MyDeal, Dropbox, Flagstar bank, and eBay. However, some of the most…
What is a PT – Penetration Testing aka Ethical Hacking – VIDEO
Penetration testing is a type of security testing used to identify and exploit weaknesses in a computer system or network. It is an essential part of ensuring the security of any networked…
Android Banking Trojan: Nexus
Italian cybersecurity firm Cleafy has identified an Android banking Trojan, named Nexus, which has already been used by several threat actors to target 450 financial applications and conduct fraud. The malware, which…
Kimsuky Spear-Phishing Gmail Theft
German and South Korean government agencies have issued a joint advisory warning about the Kimsuky threat actor’s spear-phishing attacks using rogue browser extensions to steal users’ Gmail inboxes. Kimsuky, also known as…
ICS Vulnerabilities Found by CISA – VIDEO
The Cybersecurity and Infrastructure Security Agency (CISA) has issued eight advisories highlighting critical vulnerabilities in industrial control systems (ICS) equipment from Delta Electronics and Rockwell Automation. Delta Electronics’ InfraSuite Device Master has…
Hacker group deploys NAPLISTENER Malware – VIDEO
REF2924, a threat group responsible for attacks on entities in South and Southeast Asia, has been observed deploying a previously unseen malware called NAPLISTENER. This malware is programmed in C# and is…
ShellBot Malware Targets Linux Servers
AhnLab Security Emergency response Center (ASEC) has reported that poorly managed Linux SSH servers are being targeted by a new campaign, deploying different variants of a DDoS Bot malware called ShellBot, also…