- Details
- The BBC
February 28, 2023 the BBC published that tittok answers three big cybersecuiorty fears about the app. So what are the three cybersecurity concerns about TikTok which keep coming up, and how does the company respond to them?. ..Read More.......
- Details
- The Hacker News
February 27 , 2023 , The Hacker News published that PlugX remote access trojan has been observed masquerading as an open source Windows debugger tool called x64dbg in an attempt to circumvent security protections and gain control of a target system...Read More.......
- Details
- hackernews.com
March 25, 2023 hackernews.com published that OpenAI disclosed that a bug in the Redis open source library was responsible for the exposure of other users' personal information and chat titles in the upstart's ChatGPT service earlier this week, The glitch, which came to light on March 20, 2023, enabled certain users to view brief descriptions of other users' conversations from the chat history sidebar, prompting the company to temporarily shut down the chatbot....Read More.............
- Details
- hackernews.com
March 21, 2023 hackernews.com published that as many as 55 zero-day vulnerabilities were exploited in the wild in 2022, with most of the flaws discovered in software from Microsoft, Google, and Apple.While this figure represents a decrease from the year before, when a staggering 81 zero-days were weaponized, it still represents a significant uptick in recent years of threat actors leveraging unknown security flaws to their advantage...Read More..........
- Details
- thehackernews.com
March 21, 2023 thehackernews.com published that Poorly managed Linux SSH servers are being targeted as part of a new campaign that deploys different variants of a malware called ShellBot."ShellBot, also known as PerlBot, is a DDoS Bot malware developed in Perl and characteristically uses IRC protocol to communicate with the C&C server," AhnLab Security Emergency response Center (ASEC) said in a report. ShellBot is installed on servers that have weak credentials, but only after threat actors make use of scanner malware to identify systems that have SSH port 22 open....Read More.......
- New Samsung Message Guard Protects Mobile Devices Against Zero-Click Exploits
- Twitter Shuts Off Text-Based 2FA for Non-Subscribers
- Red alert warning issued to anybody who uses Gmail or Microsoft Outlook
- LockBit 3.0 Ransomware: Inside the Cyberthreat That's Costing Millions
- Chinese and Russian Hackers Using SILKLOADER Malware to Evade Detection