Home Latest Cybersecurity News

Latest Cybersecurity News

Stay informed with the Latest Cybersecurity News from around the globe. Our blog delivers up-to-the-minute updates on data breaches, ransomware attacks, and emerging threats impacting businesses and individuals.

We cover breaking news, industry trends, and expert insights to help you navigate the ever-changing cybersecurity landscape. From critical vulnerabilities to the latest malware attacks, our detailed analyses and actionable advice ensure you stay one step ahead of cybercriminals.

ChatGPT Down Globally, Services Restored After Hours Of Outage

ChatGPT Down Globally, Services Restored After Hours Of Outage

In a significant disruption, OpenAI's popular AI chatbot, ChatGPT, experienced a global outage on Thursday morning, leaving millions of users unable to access its services for nearly three hours. The outage, which began shortly before...
Dell Power Manager - Code Execution Vulnerability

Dell Power Manager Vulnerability Let Attackers Execute Malicious Code

A critical security vulnerability has been discovered in Dell Power Manager (DPM), a widely used application for managing power settings on Dell systems. The flaw, identified as CVE-2024-49600, allows attackers with low privileges and...
Pegasus Spyware

Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices

Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed "Rainbow Ronin"), showing that spyware targets not only activists and journalists but also professionals and civilians. The...
AWS Security Incident Response

AWS Launched New Security Incident Response Service to Boost Enterprise Security

Amazon Web Services (AWS) unveiled a new service, AWS Security Incident Response, designed to help organizations manage security events efficiently. As cyber threats become increasingly complex, this service offers a comprehensive solution to prepare...
Microsoft Ignite 2024

Microsoft Ignite 2024 live : Highlights From Threat Intelligence to AI Governance

AI transformation starts with security. This theme echoed throughout Microsoft Ignite 2024, with security discussions drawing large crowds and securing top spots in the conference's most-attended sessions. Hundreds of security and IT professionals gathered early...
GitHub Copilot for Azure Simplifies Deployment of ASP.NET Core Web API

GitHub Copilot for Azure Simplifies Deployment of ASP.NET Core Web API

In an era where cloud deployment is becoming a necessity for developers, GitHub Copilot for Azure is transforming how developers approach the process. This innovative tool acts as a virtual pair programmer, providing conversational...
MediaTek Bluetooth Chipset Vulnerabilities

Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users

A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms. MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless phishing attack tactics, which evade major EDR detection. The group, which...
Rockstar 2FA

“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks

Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks. Highly advanced methods are used in these campaigns to trick people...
InputSnatch Side-Channel Attack

InputSnatch – A Side-Channel Attack Allow Attackers Steal The Input Data From LLM Models

In a recent study, cybersecurity researchers have unveiled a new side-channel attack that threatens the privacy of users interacting with large language models (LLMs). The attack, dubbed "InputSnatch," exploits timing differences in cache-sharing mechanisms...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...