New AI Tool ‘FraudGPT’ Emerges, Tailored for Sophisticated Attacks

26/07/2023 0 Comments 0 tags

Following the footsteps of WormGPT, threat actors are advertising yet another cybercrime generative artificial intelligence (AI) tool dubbed FraudGPT on various dark web marketplaces and Telegram channels. “This is an AI bot, exclusively

Fenix Cybercrime Group Poses as Tax Authorities to Target Latin American Users

26/07/2023 0 Comments 0 tags

Tax-paying individuals in Mexico and Chile have been targeted by a Mexico-based cybercrime group that goes by the name Fenix to breach targeted networks and steal valuable data. A key hallmark of

The Alarming Rise of Infostealers: How to Detect this Silent Threat

26/07/2023 0 Comments 0 tags

A new study conducted by Uptycs has uncovered a stark increase in the distribution of information stealing (a.k.a. infostealer or stealer) malware. Incidents have more than doubled in Q1 2023,

Rust-based Realst Infostealer Targeting Apple macOS Users’ Cryptocurrency Wallets

26/07/2023 0 Comments 0 tags

A new malware family called Realst has become the latest to target Apple macOS systems, with a third of the samples already designed to infect macOS 14 Sonoma, the upcoming major release

Critical MikroTik RouterOS Vulnerability Exposes Over Half a Million Devices to Hacking

26/07/2023 0 Comments 0 tags

A severe privilege escalation issue impacting MikroTik RouterOS could be weaponized by remote malicious actors to execute arbitrary code and seize full control of vulnerable devices. Cataloged as CVE-2023-30799 (CVSS score: 9.1),

Zenbleed: New Flaw in AMD Zen 2 Processors Puts Encryption Keys and Passwords at Risk

25/07/2023 0 Comments 0 tags

A new security vulnerability has been discovered in AMD’s Zen 2 architecture-based processors that could be exploited to extract sensitive data such as encryption keys and passwords. Discovered by Google

How MDR Helps Solve the Cybersecurity Talent Gap

25/07/2023 0 Comments 0 tags

How do you overcome today’s talent gap in cybersecurity? This is a crucial issue — particularly when you find executive leadership or the board asking pointed questions about your security

TETRA:BURST — 5 New Vulnerabilities Exposed in Widely Used Radio Communication System

25/07/2023 0 Comments 0 tags

A set of five security vulnerabilities have been disclosed in the Terrestrial Trunked Radio (TETRA) standard for radio communication used widely by government entities and critical infrastructure sectors, including what’s

macOS Under Attack: Examining the Growing Threat and User Perspectives

25/07/2023 0 Comments 0 tags

As the number of people using macOS keeps going up, so does the desire of hackers to take advantage of flaws in Apple’s operating system.  What Are the Rising Threats

Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass Technique

25/07/2023 0 Comments 0 tags

The financially motivated threat actors behind the Casbaneiro banking malware family have been observed making use of a User Account Control (UAC) bypass technique to gain full administrative privileges on a machine,