Safe Security Introduces SafeGPT: AI-Driven Cyber Risk Cloud Platform

Safe Security has launched a groundbreaking Cyber Risk Cloud of Clouds platform, featuring its AI-driven SafeGPT, aimed at predicting and preventing cyber breaches. Unlike traditional reactive approaches, Safe’s software-as-a-service (SaaS) platform provides organizations with a comprehensive view of enterprise security risk by consolidating data from various sources, such as Crowdstrike, Wiz, AWS, Azure, Google Cloud […]

Exploring Popular Cloud Systems: Revolutionizing the Digital Landscape

Introduction: Cloud computing has become an integral part of modern technology, revolutionizing the way we store, access, and process data. With its immense scalability, flexibility, and cost-efficiency, cloud systems have gained widespread popularity across various industries and consumer markets. In this article, we will delve into the world of popular cloud systems, providing an overview […]

Hackers Target Reddit, Demand $4.5 Million and API Modifications Threatening to Release 80GB of Data

In a recent disclosure, Reddit confirmed falling victim to a targeted phishing scheme in February. The attack resulted in the exposure of internal documents, dashboards, code, contracts, and certain personal information of advertisers, as well as past and present employees. Fortunately, none of the compromised data has been made public so far. However, this may […]

OpenAI CEO Encouraged by Discussions with Global Leaders on Controlling Risks Associated with AI

Sam Altman, the CEO of OpenAI, expressed optimism on Monday regarding the willingness of world leaders to address the potential risks associated with artificial intelligence (AI) technology being developed by his company and others. As part of his ongoing world tour, Altman visited Tel Aviv, a major tech hub, following visits to several European capitals. […]

Government and Military Organizations Persistently Targeted by Dark Pink Hackers

Dark Pink APT hacking group remains highly active, targeting government, military, and education organizations in Indonesia, Brunei, and Vietnam. Their recent attacks show a revamped chain, new persistence mechanisms, and updated data exfiltration tools. Dark Pink splits functionalities and loads implants from memory to evade detection. They utilize spear-phishing emails, DLL side-loading, and private GitHub […]

Ongoing attacks capitalize on critical vulnerability in Zyxel firewalls

Widespread exploitation of a critical command injection vulnerability (CVE-2023-28771) in Zyxel networking devices has been observed, with hackers using it to install malware. The flaw exists in the default configuration of affected firewall and VPN devices, allowing unauthenticated remote code execution through a specially crafted IKEv2 packet to UDP port 500. Zyxel has released patches […]

Disguised as a Windows driver, the Terminator antivirus killer poses a security risk

A threat actor known as Spyboy is promoting a tool called “Terminator” on a Russian hacking forum, claiming it can bypass and terminate various antivirus and security solutions on Windows systems. However, cybersecurity firm CrowdStrike believes it’s a sophisticated Bring Your Own Vulnerable Driver (BYOVD) attack. Terminator is sold for prices ranging from $300 to […]

PowerShell USB Malware Employed by Russian Hackers for Backdoor Deployment

The state-sponsored hacking group known as Gamaredon (also referred to as Armageddon or Shuckworm) from Russia has intensified its targeting of critical organizations in Ukraine’s military and security intelligence sectors. They have employed an updated toolkit and new infection techniques. Previously associated with the FSB, the Russian hackers had been observed using information-stealing malware against […]

Google Enhances Multi-Cloud Networking with Cross-Cloud Interconnect

Google is unveiling new updates to enhance multi-cloud networking with Cross-Cloud Interconnect and Private Service Connect improvements. With Cross-Cloud Interconnect, organizations can establish secure connections between Google Cloud and other public cloud platforms like AWS, Microsoft Azure, and Oracle Cloud Infrastructure. This enables running applications on multiple clouds, hosting SaaS in a multi-cloud environment, and […]