IMG 5032

OpenAI Data Breach: Threat Actor Allegedly Claims 20 Million Logins for Sale

2025-02-08

Over 225,000 OpenAI ChatGPT Accounts Compromised in Malware Breach In a significant cybersecurity incident, over 225,000 OpenAI ChatGPT account credentials have been compromised and are now available for purchase on underground markets. The breach, which occurred between January and October 2023, was primarily facilitated through information-stealing malware such as LummaC2,Continue Reading

IMG 4660

Qilin Ransomware: A Growing Cyber Threat

2025-02-03

Cybersecurity Alert: Qilin Ransomware Group Wreaks Havoc on NHS As of February 3, 2025, the Qilin ransomware group continues to pose significant threats to various sectors, with recent developments highlighting their evolving tactics and the substantial impact of their attacks. Financial Impact on Synnovis In June 2024, Qilin targeted Synnovis,Continue Reading

67993c621bafd9f5adad3973 Blog 0day Zyxel

Zyxel Warns of Active Exploitation of Unpatched Vulnerability in CPE Devices

2025-01-30

Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability Zyxel Communications has issued a critical security warning for its Customer Premises Equipment (CPE) devices, which are currently being targeted by cyber attackers exploiting the unpatched CVE-2024-40891 vulnerability. This flaw, identified in multiple Zyxel router and gateway models, isContinue Reading

VMWare

SQL Injection Bug in VMware Avi Load Balancer Puts Enterprise Data at Risk

2025-01-30

Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer Broadcom, the parent company of VMware, has issued an urgent security warning regarding a critical vulnerability in the VMware Avi Load Balancer. The flaw, identified as a high-severity SQL injection vulnerability, poses significant risks to organizations using theContinue Reading

IMG 4498

The Battle for AI Supremacy: China vs. the United States

2025-01-29

Navigating the AI Landscape: US Strategy vs. Chinese Ambition China and the U.S. are locked in a high-stakes tech rivalry, with artificial intelligence (AI) emerging as a critical battleground. China’s advancements in AI, such as its homegrown DeepSeek algorithms and expansive data capabilities, threaten to overshadow American AI leadership. WhileContinue Reading

IMG 4323

Ransomware Attack Targets VMware ESXi via SSH Tunneling : A Growing Threat

2025-01-24

The Stealthy Threat: Ransomware Attackers Use SSH Tunneling to Bypass Security In recent months, cybersecurity experts have observed a surge in ransomware attacks exploiting vulnerabilities in VMware ESXi, a widely used server virtualization platform. These attacks are particularly concerning as they bypass traditional security defenses by using SSH tunneling, aContinue Reading

Download

ICICI Bank Data Breach: Bashe Hacking Group Claims Responsibility

2025-01-24

Mumbai – In a shocking revelation, the Bashe hacking group has claimed responsibility for breaching the systems of ICICI Bank, one of India’s leading financial institutions. The alleged cyberattack has raised serious concerns about the security of sensitive customer data and the potential financial implications of the breach. According toContinue Reading

IMG 4232

Thousands of Users Report ChatGPT Access Issues: Is ChatGPT Down?

2025-01-24

ChatGPT Users Face Frustration as Service Experiences Widespread Issues In recent days, thousands of users across the globe have reported issues accessing ChatGPT, with many unable to connect to the chatbot at all. The widespread problem has left users frustrated and wondering if the service is facing a larger, system-wideContinue Reading

IMG 3826

RBI Unveils Comprehensive Plan to Combat Voice Call and SMS Frauds

2025-01-19

RBI Issues Guidelines to Banks and NBFCs for Preventing Financial Frauds via Voice Calls and SMS The Reserve Bank of India (RBI) has issued comprehensive guidelines to banks and non-banking financial companies (NBFCs) aimed at curbing financial frauds perpetrated through voice calls, SMS, and other communication channels. The move comesContinue Reading