Application Security
The Rise of Autonomous GPT-4 Bots: Revolutionizing Cybersecurity with AI-Driven Exploits
TheCISO -
In a demonstration of artificial intelligence capabilities, researchers have successfully infiltrated over half of their test websites using autonomous teams of GPT-4 bots. These...
Millenium RAT: Malware Sold on Github
Millenium-RAT, a sophisticated Remote Access Tool (RAT) for Windows systems is now available for purchase on GitHub. This sophisticated Remote Access Tool, or RAT,...
Google’s Passwordless Revolution: Passkey Login Security as Default
TheCISO -
In a groundbreaking move set to commence on January 16, 2024, Google is poised to redefine its online services by adopting passkey login security...
Microsoft Patches Zero-Day Vulnerabilities And Addresses Issues With Signed Drivers Being Used Maliciously
On this recent Patch Tuesday, Microsoft released a significant number of security patches for July 2023. With more than 100 vulnerabilities addressed, including four...
Nessus Plugin Vulnerability May ALlow Attackers Escalate The Privileges
Nessus is a powerful vulnerability scanning tool developed by Tenable. With its comprehensive range of plugins, it provides organizations with the ability to assess...
The Internet Systems Consortium (ISC) Addressed Three Denial-of-Service (DoS) Vulnerabilities in the DNS Software Suite BIND
The Internet Systems Consortium (ISC) recently announced the release of security updates for the DNS software suite BIND, addressing three critical denial-of-service (DoS) vulnerabilities....
One of the Most Popular Open-Source Systems for Analytics and Visualization, Grafana, Faces Security Flaw
Grafana, a widely used open-source platform for analytics and visualization, has recently been discovered to have a security vulnerability. This system caters to a...
Beware of Malicious Packages: TurkoRat Malware Concealed in npm Repository
Recently, two packages named nodejs-encrypt-agent and nodejs-cookie-proxy-agent were detected on the npm package repository. Shockingly, these packages contained a dangerous information stealer malware known...
Beware of Malicious Loaders: Android Apps Infected with Trojanized Malware
TheCISO -
As the number of mobile phone users is increasing, so is the number of security threats that come along with it. Criminals have found...
Protect Your Network Now: US CISA Adds Veritas Backup Exec Vulnerabilities to Its Exploited Vulnerabilities Catalog
TheCISO -
The Cybersecurity and Infrastructure Security Agency (CISA) in the US has recently updated its Known Exploited Vulnerabilities Catalog to include five new issues that...
Beware of Nexus: A New Android Banking Trojan Targeting Financial Apps
Introduction to Nexus
A newly discovered Android banking trojan called Nexus is causing havoc in the financial industry. Cybersecurity analysts at Cleafy detected the...
New PerlBot Malware Targeting Poorly Managed Linux SSH Servers
AhnLab Security Emergency Response Center (ASEC) has uncovered a new variant of the ShellBot malware, which is also known as PerlBot. This Perl-based DDoS...