Private Data: Can we trust Chat GPT and other AIs?
Private data is a significant concern as OpenAI has introduced its latest and most advanced artificial intelligence model, GPT-4o, which powers Chat GPT. This new version can not only solve equations and tell bedtime stories, but it also claims to be capable of…
VMware ESXi at risk: Ransomware attacks
Microsoft researchers have found a critical vulnerability in VMware ESXi hypervisors. Moreover, ransomware operators are using this issue to attack systems. Global risk This vulnerability, CVE-2024-37085, allows threat actors to gain full administrative permissions on domain-joined hypervisors, thereby posing a serious risk…
Differences Between SIEM, SOAR, and XDR: Key Points
Differences in Cybersecurity Firstly, key differences constantly arise in the rapidly evolving cybersecurity landscape. Therefore, organizations need robust tools to detect, respond to, and effectively manage threats. These differences between solutions are crucial for choosing the most suitable one. Main Security Solutions:…
Data leakage: The hidden cost to your business
Data leakage is becoming an increasingly costly problem for businesses, with the average total cost of a breach rising by 10% annually, now reaching almost $4.9 million. This number is even higher in cases involving malicious insider attacks, where costs exceed $5 million.…
Basic authentication disabled by Outlook
Microsoft will disable basic authentication (username + password) on September 16, 2024, as part of its 'Secure Future Initiative'. This change aims to enhance the cybersecurity of personal email accounts by moving away from outdated and vulnerable security measures. The tech giant also…
ESXi systems: New Linux variant of RansomHub attacking
Hackers often attack ESXi systems, as ESXi is widely used in enterprise environments to manage virtualized infrastructure, **therefore** making ESXi a lucrative target. Moreover, threat actors can exploit security flaws in ESXi to deploy ransomware and perform other malicious activities, significantly increasing the…
Security hole, SnailLoad allows spying on online activity
Researchers at Graz University of Technology discovered that they could spy on users’ online activities by monitoring fluctuations in the speed of their Internet connection. This security hole, called SnailLoad, does not require malicious code or intercepting data traffic. SnailLoad is a significant security hole that…