Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets

05/03/2024 0 Comments 0 tags

More than 225,000 logs containing compromised OpenAI ChatGPT credentials were made available for sale on underground markets between January and October 2023, new findings from Group-IB show. These credentials were

Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams

05/03/2024 0 Comments 0 tags

A new DNS threat actor dubbed Savvy Seahorse is leveraging sophisticated techniques to entice targets into fake investment platforms and steal funds. “Savvy Seahorse is a DNS threat actor who convinces victims

What is Exposure Management and How Does it Differ from ASM?

05/03/2024 0 Comments 0 tags

Startups and scales-ups are often cloud-first organizations and rarely have sprawling legacy on-prem environments. Likewise, knowing the agility and flexibility that cloud environments provide, the mid-market is predominantly running in

Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes

05/03/2024 0 Comments 0 tags

The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails with an aim to steal NT LAN Manager (NTLM) hashes. The new attack chain “can be

Critical JetBrains TeamCity On-Premises Flaws Could Lead to Server Takeovers

05/03/2024 0 Comments 0 tags

A new pair of security vulnerabilities have been disclosed in JetBrains TeamCity On-Premises software that could be exploited by a threat actor to take control of affected systems. The flaws,

Over 100 Malicious AI/ML Models Found on Hugging Face Platform

04/03/2024 0 Comments 0 tags

As many as 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered in the Hugging Face platform. These include instances where loading a pickle file leads to code execution, software

From 500 to 5000 Employees – Securing 3rd Party App-Usage in Mid-Market Companies

04/03/2024 0 Comments 0 tags

A company’s lifecycle stage, size, and state have a significant impact on its security needs, policies, and priorities. This is particularly true for modern mid-market companies that are either experiencing

How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations

04/03/2024 0 Comments 0 tags

Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate a massive money laundering scheme. The malicious application, called XHelper, is a “key tool

Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure

04/03/2024 0 Comments 0 tags

U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical infrastructure entities, outlining the various tactics and techniques the threat actors have adopted to deploy the file-encrypting

U.S. Charges Iranian Hacker, Offers $10 Million Reward for Capture

02/03/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Friday unsealed an indictment against an Iranian national for his alleged involvement in a multi-year cyber-enabled campaign designed to compromise U.S. governmental and