New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets
A new stealthy information stealer malware called Bandit Stealer has caught the attention of cybersecurity researchers for its ability to target numerous web...
ChatGPT CEO May Leave Europe
In response to the future artificial intelligence (AI) restrictions by the European Union, OpenAI CEO Sam Altman stated that the maker of ChatGPT may...
ChatGPT & Bing – Indirect Prompt-Injection Attacks
SYDNEY makes a return, but this time in a different way. Following Microsoft’s decision to discontinue its turbulent Bing chatbot’s alter ego, devoted followers...
GUAC 0.1 Beta: Google’s Breakthrough Framework for Secure Software Supply Chains
May 25, 2023Ravie LakshmananSoftware Security / Supply Chain
Google on Wednesday announced the 0.1 Beta version of GUAC (short for Graph for Understanding Artifact...
Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code
May 25, 2023Ravie LakshmananEndpoint Security / Cyber Threat
The threat actors behind the nascent Buhti ransomware have eschewed their custom payload in favor of...
5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and low latency when...
Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
May 26, 2023Ravie LakshmananData Safety / Cloud Security
A new security flaw has been disclosed in the Google Cloud Platform's (GCP) Cloud SQL service...
Predator Android Spyware: Researchers Uncover New Data Theft Capabilities
Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli company Intellexa (previously...
Webinar with Guest Forrester: Browser Security New Approaches
May 25, 2023The Hacker NewsBrowser Security / Tech
In today's digital landscape, browser security has become an increasingly pressing issue, making it essential for...
APT Hacker Group Attacking SMBs to Use Their Infrastructure
Proofpoint’s security researchers have identified indications of sophisticated threat actors focusing their attention on small and medium-sized enterprises and service providers operating within that...