Tag: Cyber attacks
7% of Internet Traffic is Malicious: Cloudflare Report
The latest State of Application Security Report from Cloudflare has revealed some alarming trends in the internet's threat landscape for 2024. According to the...
Uncovering the Hidden Backdoor in Fake AWS Files: A Closer Look
Recently, researchers discovered that two fake AWS packages on the NPM JavaScript repository contained hidden code that backdoored developers' computers when executed. These packages,...
Exploitation of Windows 0-day by Threat Actors for Over a Year
Threat actors have been exploiting a zero-day vulnerability in Windows, targeting users with malware for over a year. This vulnerability affected both Windows 10...
Blast-RADIUS MD5-Based Vulnerability in RADIUS Protocol: A Detailed Overview
The RADIUS protocol, commonly used for network authentication, is currently facing a significant vulnerability known as the Blast-RADIUS MD5-based vulnerability. This vulnerability poses a...
Protect Your Website: How to Safely Use jQuery Packages
Hackers have once again launched a supply chain attack targeting software developers, as cybersecurity researchers from Phylum recently discovered a new campaign distributing malicious...
Is Windows 11’s Built-In Antivirus Sufficient for Everyday Users?
Windows Security in Windows 11 has come a long way in terms of protecting users from cyber threats. With features like Microsoft Defender Antivirus,...
AI companies are vulnerable to cyber attacks: Lessons from OpenAI breach | Tech Security
The recent breach at OpenAI may not have exposed any of your confidential ChatGPT conversations, but it serves as a stark reminder that AI...
OpenAI Faces Major Security Vulnerabilities: A Recap
OpenAI, a company known for its advancements in artificial intelligence, has recently come under fire for a series of security vulnerabilities that have put...
Malware Campaign Targets Cisco Nexus Switches: What You Need to Know
Chinese hackers have been discovered exploiting a zero-day vulnerability in specific Cisco switches to control the devices and install malware. The discovery was made...