Tushar Subhra Dutta
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.
Zenbleed – AMD’s Zen2 Processor Flaw Allows Attackers to Steal Sensitive Data
The CPUs that are based on x86-64 architecture feature XMM registers (128-bit), recently extended to 256-bit (YMM) and 512-bit (ZMM) for greater capacity.Beyond number crunching, the large registers (YMM and ZMM) are employed in various scenarios, including standard C...
WormGPT: Cybercriminals AI Tool Gained Over 5,000 Subscribers in Just a Week
The revolutionary innovations by AI (Artificial Intelligence) include generative AI that has various creative potential, but along with that it also raises serious concerns with malicious tools like WormGPT.Since it's a powerful generative AI-based tool, WormGPT enables attackers to...
Sensitive Information of VirusTotal Users Exposed in Data Leak
Globally, security analysts and IT professionals heavily rely on Virustotal, a vast malware database, to scan files for viruses and malware. Even it also enables users to upload suspicious files or links to assess potential threats effectively.VirusTotal, crucial in...
Hackers Turn Exchange Servers into Malware Command & Control Centers
Turla, also known as Secret Blizzard, KRYPTON, and UAC-0003, is an Advanced Persistent Threat (APT) group that has been associated with Russia's Federal Security Service (FSB).This group has gained fame for its sophisticated and persistent cyber threat activities.The...
Hackers Use “chatgpt5[.]zip” Lure to Trick Users into Downloading Malware
Hackers Use "chatgpt5 zip" to Trick Users into Downloading Malware. Phishing remains a severe cybersecurity threat, deceiving employees with cleverly disguised malicious links and malware attachments, potentially causing company-wide troubles for over a decade.The 2022 FortiGuard Labs report and...
Lazarus APT Group Hijack Windows IIS Servers to Distribute Malware
Threat actors always search for vulnerable devices and networks to gain illicit access and perform malicious activities to accomplish their goals.The APT group, Lazarus, as an initial breach path actively targeting the Microsoft Internet Information Services (IIS) servers.Cybersecurity researchers...