There are over 225,000 stolen ChatGPT credentials for sale on the dark web.

According to new research from Group-IB reveals a concerning trend between January and October 2023. During this period, an alarming number of over 225,000 stolen ChatGPT credentials were traded on illicit online platforms. These compromised credentials were found in logs associated with notorious…


0 Comments4 Minutes

The FBI warns the U.S. healthcare sector of BlackCat ransomware

In the latest advisory, the U.S. government has alerted the healthcare industry to the escalating threat of BlackCat ransomware (also recognized as ALPHV) attacks. This month, concerns have heightened as the frequency of these cyber strikes has notably increased. According to a new government…


0 Comments6 Minutes

More than 8,000 trusted brand domains were stolen for a huge spam operation.

Over 13,000 names and more than 8,000 domains that belong to real brands and institutions have been taken over as part of a complex plan to spread spam and make money from clicks. Under the name SubdoMailing, Guardio Labs is keeping an eye on the planned bad behavior that has been going on since at…


0 Comments7 Minutes

Open-Source SSH-Snake Tool Weaponization by Cybercriminals for Network Attacks

Threat actors have exploited SSH-Snake, a recently released network mapping utility, to conduct malicious operations. “SSH-Snake is a self-modifying worm that begins to spread itself across a network using SSH credentials discovered on a compromised system,” According to Miguel…


0 Comments7 Minutes

Critical ConnectWise ScreenConnect vulnerability exploited by hackers

VMware strongly advises users to remove the obsolete Enhanced Authentication Plugin (EAP) immediately after discovering a critical security vulnerability. This vulnerability, officially labeled CVE-2024-22245 with a CVSS score of 9.6, is described as an arbitrary authentication relay flaw.…


0 Comments4 Minutes

Cybergang says Canadian oil pipeline operator hit by ransomware

Trans-Northern Pipeline, a Canadian oil transportation company operating pipelines across three provinces, reportedly faces a cyberattack by the AlphV ransomware group. The development surfaced today through a tweet on the social networking site X by Brett Callow, a security researcher affiliated…


0 Comments4 Minutes

Fake Facebook Ads Spreading ‘Ov3r_Stealer’ to Steal Crypto and Creds

Threat actors are using fake Facebook job ads to fool victims into installing Ov3r_Stealer, a new Windows-based stealer virus. Trustwave SpiderLabs told The Hacker News that “this malware is designed to steal credentials and crypto wallets and send them to a Telegram channel that the threat…


0 Comments3 Minutes

Commando Cat Cryptojacking Attacks Exposed Docker APIs

Commando Cat, a clever cryptojacking effort, attacks exposed Docker API endpoints online. “The campaign deploys a benign container generated using the Commando project,” Cado researchers Nate Bill and Matt Muir wrote today. “The attacker escapes this container and runs multiple…


0 Comments4 Minutes

Hiring a Cybersecurity Analyst for Your Team

Data breaches and cyber attacks are becoming more common in today’s digital world, making protecting your organization’s critical information more crucial than ever. To better protect yourself from ever-changing cyber threats, it is wise to employ the services of a cybersecurity…


0 Comments10 Minutes

cybersecurity in ontario

Exploring the Stages of Penetration Testing

In the ever-evolving world of cybersecurity, no system can claim to be 100% secure. This is where penetration testing, often referred to as pentesting, comes into play. It serves as a comprehensive process that scans, evaluates, and fortifies all the essential components of an information system…


0 Comments8 Minutes