ChatGPT Down Globally, Services Restored After Hours Of Outage
In a significant disruption, OpenAI's popular AI chatbot, ChatGPT, experienced a global outage on Thursday morning, leaving millions of users unable to access its...
Dell Power Manager Vulnerability Let Attackers Execute Malicious Code
A critical security vulnerability has been discovered in Dell Power Manager (DPM), a widely used application for managing power settings on Dell systems.
The...
Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices
Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed "Rainbow Ronin"), showing that spyware targets...
AWS Launched New Security Incident Response Service to Boost Enterprise Security
Amazon Web Services (AWS) unveiled a new service, AWS Security Incident Response, designed to help organizations manage security events efficiently.
As cyber threats become...
Microsoft Ignite 2024 live : Highlights From Threat Intelligence to AI Governance
AI transformation starts with security. This theme echoed throughout Microsoft Ignite 2024, with security discussions drawing large crowds and securing top spots in the...
GitHub Copilot for Azure Simplifies Deployment of ASP.NET Core Web API
In an era where cloud deployment is becoming a necessity for developers, GitHub Copilot for Azure is transforming how developers approach the process.
This...
Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users
A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms.
MediaTek leads the market...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks
Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless...
“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks
Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks.
Highly...
InputSnatch – A Side-Channel Attack Allow Attackers Steal The Input Data From LLM Models
In a recent study, cybersecurity researchers have unveiled a new side-channel attack that threatens the privacy of users interacting with large language models (LLMs)....










