Cyber Security experts have utilized the GPT-3 natural language generation model and its ChatGPT chatbot to showcase how deep learning models can be used to make social engineering attacks, such as phishing or business email […]
A wiper is a type of malware with a single purpose: to erase user data beyond recovery. Wipers are used to destroy computer networks in public or private companies ranging from industrial to government sectors. […]
Fortinet on Monday issued emergency patches for a severe security flaw affecting its FortiOS SSL-VPN product that it said is being actively exploited in the wild. Tracked as CVE-2022-42475 (CVSS score: 9.3), the critical bug […]
Before the COVID-19 pandemic, cybersecurity strategy was primarily focused on securing the network perimeter. But COVID-19 blurred the borders around businesses’ critical applications and data. The network perimeter has been extended to employees' homes, and accessibility needs from anywhere have accelerated the migration to cloud and adoption of other digital technologies.
Pakistani businesses can reap impressive benefits from the Internet of Things (IoT). But more IoT devices and a more complex IoT ecosystem also mean increased security vulnerabilities from edge to cloud.Sadly, many companies still put off adopting […]
The FBI and CISA believe the APT actors are likely exploiting these Fortinet FortiOS vulnerabilities—CVE 2018-13379, CVE-2020-12812, and CVE-2019-5591—to gain access to multiple government, commercial, and technology services networks.
There is a known vulnerability and SolarWinds Orion products (affected versions are 2019.4 through 2020.2.1 HF1) are currently being exploited by malicious actors. This attack tactic permits an attacker to gain access to network traffic […]
A European investigative and cyber security group has uncovered an Indian disinformation network and Fake News Network operating since 2005 to discredit nations in conflict with Delhi, particularly Pakistan. In a detail report named as […]
We value your privacy