Guru Baran
Guru is an Ex-Security Engineer at Comodo Cybersecurity.
Co-Founder - Cyber Security News & GBHackers On Security.
Poisoned Facebook Ads Deliver Malware Using Fake ChatGPT, Bard & Other AI Services
Cyber criminals have recently started using Facebook to pretend to be well-known generative AI brands like ChatGPT, Google Bard, Midjourney, and Jasper to steal users' personal information.Users on Facebook are deceived into downloading content from fake brand sites and advertisements.These...
Renowned Hacker Kevin Mitnick Died at the Age of 59
In an unfortunate turn of events, the computer hacker from the 1990s, who was involved in high-profile cases of computer data theft and credit card number stealing, passed away due to pancreatic cancer.When he was 16 years old, Mitnick...
Minor Typo Results in the Leak of Millions Sensitive of US Military Emails
Thousands of US military emails were allegedly leaked to Mali, a country in western Africa, due to an unintentional typo error that occurred over a decade. This breach might have put US national security at risk.According to the Financial...
Hackers Exploiting Critical Zero-Day Vulnerability in Citrix NetScaler Products
NetScaler ADC and NetScaler Gateway (previously Citrix ADC and Citrix Gateway) contain multiple discovered vulnerabilities.Citrix ADC is a powerful networking solution that ensures fast, secure, and reliable delivery of applications across networks.While the NetScaler Gateway is a secure...
Sophisticated DDoS Attacks Have Evolved Rapidly; Targeting IT Services
Sophisticated DDoS attacks have become a favored tool for hackers, enabling them to target not only large organizations but also individuals.This means that both businesses, regardless of their size, and private individuals find themselves vulnerable to these malicious...
5 Tips for Reducing Cyber Risks within Your Organization
Global cybercrime damages are estimated to cost up to $10.5 trillion annually by 2025. In today's digital landscape, organizations face many cyber risks that can compromise sensitive data and disrupt operations. Businesses must prioritize cybersecurity measures and implement strategies...