Open AI Web cache deception vulnerability
Security researchers found a critical account takeover vulnerability in the OpenAI ChatGPT application that allowed an attacker to take over someone’s account, access their…Read More
Mustang Panda APT Targets Europe with Plugx Malware
Mustang PandaMustang Panda is a China-based cyber espionage threat actor that was first observed in 2017 butmay have been conducting operations since at least…Read More
The Mobile App of Car made hackers remotely open and start cars.
Sam Curry, a cyber security expert, revealed last week on Twitter that he and his team had found a security flaw in a service…Read More
Uber was breached to its core, purportedly by an 18 years old. Here’s what’s known
“ I announce I am a hacker and Uber has suffered a data breach, “intruder says on Slack.Uber employees on Thursday discovered that huge…Read More
Twitter Data Breach
Twitter faces data leaks After an attacker advertises the sale of information containing a phone number. and email addresses of more than 5.4 million…Read More
Detect the Follina MSDT Vulnerability (CVE-2022-30190)
Security researchers found the vulnerability in Microsoft document. In Which attacker can tact victim to open up a malicious word document which results attacker…Read More
Cloud Computing is the easiest gateway to Industry 4.0 for Small Businesses.
Small and Medium Enterprises (SME) are the backbone of any country’s economy. They provide job opportunities and serve as an engine for growth and…Read More
Cloud Security Posture Management (CSPM)
Cloud Security Posture Management (CSPM) is a product category for IT security tools that detect cloud misconfiguration and compliance risks. In addition, an essential…Read More