8.7 C
Munich
Friday, October 4, 2024

Application Security

The Rise of Autonomous GPT-4 Bots: Revolutionizing Cybersecurity with AI-Driven Exploits

In a demonstration of artificial intelligence capabilities, researchers have successfully infiltrated over half of their test websites using autonomous teams of GPT-4 bots. These...

Millenium RAT: Malware Sold on Github

Millenium-RAT, a sophisticated Remote Access Tool (RAT) for Windows systems is now available for purchase on GitHub. This sophisticated Remote Access Tool, or RAT,...

Google’s Passwordless Revolution: Passkey Login Security as Default

In a groundbreaking move set to commence on January 16, 2024, Google is poised to redefine its online services by adopting passkey login security...

Microsoft Patches Zero-Day Vulnerabilities And Addresses Issues With Signed Drivers Being Used Maliciously

On this recent Patch Tuesday, Microsoft released a significant number of security patches for July 2023. With more than 100 vulnerabilities addressed, including four...

Nessus Plugin Vulnerability May ALlow Attackers Escalate The Privileges

Nessus is a powerful vulnerability scanning tool developed by Tenable. With its comprehensive range of plugins, it provides organizations with the ability to assess...

The Internet Systems Consortium (ISC) Addressed Three Denial-of-Service (DoS) Vulnerabilities in the DNS Software Suite BIND

The Internet Systems Consortium (ISC) recently announced the release of security updates for the DNS software suite BIND, addressing three critical denial-of-service (DoS) vulnerabilities....

One of the Most Popular Open-Source Systems for Analytics and Visualization, Grafana, Faces Security Flaw

Grafana, a widely used open-source platform for analytics and visualization, has recently been discovered to have a security vulnerability. This system caters to a...

Beware of Malicious Packages: TurkoRat Malware Concealed in npm Repository

Recently, two packages named nodejs-encrypt-agent and nodejs-cookie-proxy-agent were detected on the npm package repository. Shockingly, these packages contained a dangerous information stealer malware known...

Beware of Malicious Loaders: Android Apps Infected with Trojanized Malware

As the number of mobile phone users is increasing, so is the number of security threats that come along with it. Criminals have found...

Protect Your Network Now: US CISA Adds Veritas Backup Exec Vulnerabilities to Its Exploited Vulnerabilities Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) in the US has recently updated its Known Exploited Vulnerabilities Catalog to include five new issues that...

Beware of Nexus: A New Android Banking Trojan Targeting Financial Apps

Introduction to Nexus A newly discovered Android banking trojan called Nexus is causing havoc in the financial industry. Cybersecurity analysts at Cleafy detected the...

New PerlBot Malware Targeting Poorly Managed Linux SSH Servers

AhnLab Security Emergency Response Center (ASEC) has uncovered a new variant of the ShellBot malware, which is also known as PerlBot. This Perl-based DDoS...

Latest