OpenAI Addresses Twin Leaks as Codex Faces Issues and ChatGPT Exposes Data

ChatGPT’s Hidden Outbound Channel Leaks User Data In a significant cybersecurity concern, researchers from Check Point have uncovered a critical vulnerability in OpenAI’s ChatGPT that...

Top 10 Questions CISOs and DPOs Are Asking About DPDP in 2026

The Digital Personal Data Protection (DPDP) Act in India is transitioning from a theoretical framework to a practical guideline for organizations. By the year 2026, the expectation is that businesses will no longer be questioning the essence of the DPDP, instead, they will be...

DeepLoad Malware Exploits ClickFix and WMI Persistence to Harvest Browser Credentials

A new cybersecurity campaign has emerged, employing the ClickFix social engineering tactic to disseminate...

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

 A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting...

OpenAI Addresses Twin Leaks as Codex Faces Issues and ChatGPT Exposes Data

ChatGPT’s Hidden Outbound Channel Leaks User Data In a significant cybersecurity concern, researchers from Check...

Top 10 Questions CISOs and DPOs Are Asking About DPDP in 2026

The Digital Personal Data Protection (DPDP) Act in India is transitioning from a theoretical...

Proton Introduces Encrypted Video Conferencing and Unified Workspace to Compete with Google and Microsoft

Proton Expands into Enterprise Productivity with Launch of Proton Workspace and Proton Meet In a...

Struggling with SAST vs DAST? Discover How AI Can Help in Our Webinar.

Clinton Herget: A Visionary in Application Security Field CTO, Snyk In the rapidly evolving field of...

OpenAI Addresses Twin Leaks as Codex Faces Issues and ChatGPT Exposes Data

ChatGPT’s Hidden Outbound Channel Leaks User Data In a significant cybersecurity concern, researchers from Check Point have uncovered a critical vulnerability in OpenAI’s ChatGPT that...

DeepLoad Malware Exploits ClickFix and WMI Persistence to Harvest Browser Credentials

A new cybersecurity campaign has emerged, employing the ClickFix social engineering tactic to disseminate...

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

 A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting...

DeepLoad Malware Exploits ClickFix and WMI Persistence to Harvest Browser Credentials

A new cybersecurity campaign has emerged, employing the ClickFix social engineering tactic to disseminate...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

OpenAI Addresses Twin Leaks as Codex Faces Issues and ChatGPT Exposes Data

ChatGPT’s Hidden Outbound Channel Leaks User Data In a significant cybersecurity concern, researchers from Check...

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

 A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting...

Proton Introduces Encrypted Video Conferencing and Unified Workspace to Compete with Google and Microsoft

Proton Expands into Enterprise Productivity with Launch of Proton Workspace and Proton Meet In a...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

Malware

Struggling with SAST vs DAST? Discover How AI Can Help in Our Webinar.

Clinton Herget: A Visionary in Application Security Field CTO, Snyk In the rapidly evolving field of software development, Clinton Herget stands out as a key player with a wealth of experience and insight. With nearly two decades dedicated to the craft of building software, he now...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

Russian CTRL Toolkit Delivered Through Malicious LNK Files Hijacks RDP Using FRP Tunnels

Cybersecurity experts have uncovered a sophisticated remote access toolkit, known as the CTRL toolkit,...
spot_img

RISK MANAGEMENTS

Top 10 Questions CISOs and DPOs Are Asking About DPDP in 2026

The Digital Personal Data Protection (DPDP) Act in India is transitioning from a theoretical framework to a practical guideline for organizations. By the year...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

Proton Introduces Encrypted Video Conferencing and Unified Workspace to Compete with Google and Microsoft

Proton Expands into Enterprise Productivity with Launch of Proton Workspace and Proton Meet In a...

Eight Cost-Effective Strategies to Strengthen Your Security Posture

Emphasizing Cybersecurity Fundamentals: A Strategic Approach In an era where cyber threats are increasingly prevalent, organizations are finding renewed emphasis on the basics of cybersecurity to safeguard sensitive information. According to Jeff Foresman, the Vice President of Cybersecurity at Resultant, one of the most compelling...

Fortinet Struck by Another Exploited Cybersecurity Vulnerability

SQL Injection Vulnerability Discovered in FortiClient EMS A significant vulnerability has been unveiled in Fortinet's FortiClient Enterprise Management Server (EMS), identified as a SQL command...

Cyber Architecture

OpenAI Addresses Twin Leaks as Codex Faces Issues and ChatGPT Exposes Data

ChatGPT’s Hidden Outbound Channel Leaks User Data In a significant cybersecurity concern, researchers from Check...

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

 A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting...

Lloyds IT Glitch Exposes Data of Nearly 500,000 Banking Customers

Software Glitch Exposes Personal Data of Nearly 448,000 Lloyds Banking Customers In a significant breach...

Cybercriminals Target Tax Season with Innovative Phishing Strategies

In early 2026, a significant surge in cyber campaigns themed around tax-related activities has...

Iran conducts substantial cyberattack on U.S. company, first since the war began

An Iranian hacker group has recently taken accountability for a cyberattack targeting Stryker, a notable medical technology company based in Michigan. This incident marks a significant escalation, being the first substantial cyber offensive linked to Iran against an American entity since the onset of...

All articles

OpenAI Addresses Twin Leaks as Codex Faces Issues and ChatGPT Exposes Data

ChatGPT’s Hidden Outbound Channel Leaks User Data In a significant cybersecurity concern, researchers from Check...

Top 10 Questions CISOs and DPOs Are Asking About DPDP in 2026

The Digital Personal Data Protection (DPDP) Act in India is transitioning from a theoretical...

DeepLoad Malware Exploits ClickFix and WMI Persistence to Harvest Browser Credentials

A new cybersecurity campaign has emerged, employing the ClickFix social engineering tactic to disseminate...

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

 A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting...

Proton Introduces Encrypted Video Conferencing and Unified Workspace to Compete with Google and Microsoft

Proton Expands into Enterprise Productivity with Launch of Proton Workspace and Proton Meet In a...

Struggling with SAST vs DAST? Discover How AI Can Help in Our Webinar.

Clinton Herget: A Visionary in Application Security Field CTO, Snyk In the rapidly evolving field of...

Employee Data Breaches Reach Highest Level in Seven Years

Surge in Employee Data Breaches Reported in the UK: Analysis Highlights Risks of Hybrid...

Spotify Pursues $300 Million from Anna’s Archive

Spotify and several prominent record labels have initiated legal proceedings to secure a default...

CCTV Crackdown: India Plans to Block Chinese Surveillance Cameras

India is poised for a significant transformation in its surveillance landscape, particularly as the...

Google Unveils Enhanced Ransomware Defense and Recovery Capabilities in Drive

Google Enhances Ransomware Protection for Google Drive Users Globally In a significant move to bolster...

Eight Cost-Effective Strategies to Strengthen Your Security Posture

Emphasizing Cybersecurity Fundamentals: A Strategic Approach In an era where cyber threats are increasingly prevalent,...

Fahndung nach Cyberkriminellen: 130 Firmen betroffen

Investigators Identify Key Suspects in Major Cybercrime Case Targeting German Companies In a significant breakthrough...