There are over 225,000 stolen ChatGPT credentials for sale on the dark web.
Security Audits & Penetration Testing
March 5, 2024
According to new research from Group-IB reveals a concerning trend between January and October 2023. During this period, an alarming number of over 225,000 stolen ChatGPT credentials were traded on illicit online platforms. These compromised credentials were found in logs associated with notorious…
0 Comments4 Minutes
The FBI warns the U.S. healthcare sector of BlackCat ransomware
Security Audits & Penetration Testing
February 28, 2024
In the latest advisory, the U.S. government has alerted the healthcare industry to the escalating threat of BlackCat ransomware (also recognized as ALPHV) attacks. This month, concerns have heightened as the frequency of these cyber strikes has notably increased. According to a new government…
0 Comments6 Minutes
More than 8,000 trusted brand domains were stolen for a huge spam operation.
Security Audits & Penetration Testing
February 26, 2024
Over 13,000 names and more than 8,000 domains that belong to real brands and institutions have been taken over as part of a complex plan to spread spam and make money from clicks. Under the name SubdoMailing, Guardio Labs is keeping an eye on the planned bad behavior that has been going on since at…
0 Comments7 Minutes
Open-Source SSH-Snake Tool Weaponization by Cybercriminals for Network Attacks
Security Audits & Penetration Testing
February 23, 2024
Threat actors have exploited SSH-Snake, a recently released network mapping utility, to conduct malicious operations. “SSH-Snake is a self-modifying worm that begins to spread itself across a network using SSH credentials discovered on a compromised system,” According to Miguel…
0 Comments7 Minutes
Critical ConnectWise ScreenConnect vulnerability exploited by hackers
Security Audits & Penetration Testing
February 22, 2024
VMware strongly advises users to remove the obsolete Enhanced Authentication Plugin (EAP) immediately after discovering a critical security vulnerability. This vulnerability, officially labeled CVE-2024-22245 with a CVSS score of 9.6, is described as an arbitrary authentication relay flaw.…
0 Comments4 Minutes
Cybergang says Canadian oil pipeline operator hit by ransomware
Security Audits & Penetration Testing
February 15, 2024
Trans-Northern Pipeline, a Canadian oil transportation company operating pipelines across three provinces, reportedly faces a cyberattack by the AlphV ransomware group. The development surfaced today through a tweet on the social networking site X by Brett Callow, a security researcher affiliated…
0 Comments4 Minutes
Fake Facebook Ads Spreading ‘Ov3r_Stealer’ to Steal Crypto and Creds
Security Audits & Penetration Testing
February 7, 2024
Threat actors are using fake Facebook job ads to fool victims into installing Ov3r_Stealer, a new Windows-based stealer virus. Trustwave SpiderLabs told The Hacker News that “this malware is designed to steal credentials and crypto wallets and send them to a Telegram channel that the threat…
0 Comments3 Minutes
Commando Cat Cryptojacking Attacks Exposed Docker APIs
Security Audits & Penetration Testing
February 1, 2024
Commando Cat, a clever cryptojacking effort, attacks exposed Docker API endpoints online. “The campaign deploys a benign container generated using the Commando project,” Cado researchers Nate Bill and Matt Muir wrote today. “The attacker escapes this container and runs multiple…
0 Comments4 Minutes
Hiring a Cybersecurity Analyst for Your Team
Security Audits & Penetration Testing
January 18, 2024
Data breaches and cyber attacks are becoming more common in today’s digital world, making protecting your organization’s critical information more crucial than ever. To better protect yourself from ever-changing cyber threats, it is wise to employ the services of a cybersecurity…
0 Comments10 Minutes
Exploring the Stages of Penetration Testing
Tutorials & Webinars,Security Audits & Penetration Testing
September 26, 2023
In the ever-evolving world of cybersecurity, no system can claim to be 100% secure. This is where penetration testing, often referred to as pentesting, comes into play. It serves as a comprehensive process that scans, evaluates, and fortifies all the essential components of an information system…
0 Comments8 Minutes