Franco

OPENAI RELEASES “OPERATOR” AN AGENT THAT CAN USE A COMPUTER FOR YOU

Operator is a web application designed to perform simple online tasks within a browser, such as booking concert tickets or placing online grocery orders. The app is powered by a new model called the Computer-Using Agent (CUA), built on OpenAI’s multimodal large language model GPT-4o. Currently available at operator.chatgpt.com for ChatGPT Pro subscribers in the […]

OPENAI RELEASES “OPERATOR” AN AGENT THAT CAN USE A COMPUTER FOR YOU Read More »

FRENCH WOMAN FALLS FOR CYBERCRIMINAL POSING AS BRAD PITT AND LOSES $850K

Anne, a 53-year-old interior decorator, spent a year and a half believing she was in a relationship with actor Brad Pitt. According to TF1’s “Seven to Eight” program, scammers using AI-generated content deceived her into losing nearly a million dollars. The scam began in February 2023 after Anne joined Instagram. She was first approached by

FRENCH WOMAN FALLS FOR CYBERCRIMINAL POSING AS BRAD PITT AND LOSES $850K Read More »

HACKERS STEAL SENSITIVE DATA FROM GREEN BAY PACKERS FANS ON PRO SHOP SITE

   Fans of the Green Bay Packers experienced a breach of personal and sensitive information following a cyberattack on the team’s merchandise website, the Pro Shop. A “malicious code” was injected into the platform, which is operated by a third-party vendor. Green Bay Packers, Inc., the non-profit organization behind the NFL team, disclosed the breach

HACKERS STEAL SENSITIVE DATA FROM GREEN BAY PACKERS FANS ON PRO SHOP SITE Read More »

NEWLY SOPHISTICATED MALWARE CALLED PLAYFULGHOST USES PHISHING AND SEO POISONING IN TROJANIZED VPN INSTALLS

Cybersecurity researchers have identified a new malware variant, PLAYFULGHOST, which possesses a broad range of capabilities for information gathering and system exploitation. Its features include keylogging, screen and audio capture, remote shell access, and file transfer/execution. According to Google’s Managed Defense team, PLAYFULGHOST has functional similarities to Gh0st RAT, a remote administration tool whose source

NEWLY SOPHISTICATED MALWARE CALLED PLAYFULGHOST USES PHISHING AND SEO POISONING IN TROJANIZED VPN INSTALLS Read More »

PYPI PACKAGES VULNERABILITY DISCOVERED CAPTURING KEYSTROKES AND HIJACKING SOCIAL ACCOUNTS

Two malicious packages uploaded to the Python Package Index (PyPI) repository have been identified by cybersecurity researchers as tools for exfiltrating sensitive information from compromised systems, according to Fortinet FortiGuard Labs. The packages, named zebo and cometlogger, were downloaded 118 and 164 times, respectively, before being removed. ClickPy statistics reveal that most downloads originated from

PYPI PACKAGES VULNERABILITY DISCOVERED CAPTURING KEYSTROKES AND HIJACKING SOCIAL ACCOUNTS Read More »

RESEARCH SHOWS WIFI HACKERS CAN NOW BYPASS THE LATEST WPA3 SECURITY STANDARD

The WPA3 security standard enhances the security of Wi-Fi access points by safeguarding passwords against offline dictionary attacks. However, researchers have identified a man-in-the-middle vulnerability that exploits user behavior during reconnection attempts. In this scenario, if a user loses their Wi-Fi connection and is prompted to re-enter their password, they risk exposing their credentials. Researchers

RESEARCH SHOWS WIFI HACKERS CAN NOW BYPASS THE LATEST WPA3 SECURITY STANDARD Read More »

PLAY RANSOMWARE GROUP TAKES OWNERSHIP OF KRISPY KREME ATTACK

  The Play ransomware group has claimed responsibility for a cyberattack on Krispy Kreme and is threatening to leak sensitive company data just days before Christmas. The multinational doughnut and coffeehouse chain confirmed that hackers initially breached its systems on November 29. Three weeks later, on December 21, Play announced it had stolen data from

PLAY RANSOMWARE GROUP TAKES OWNERSHIP OF KRISPY KREME ATTACK Read More »

CYBERCRIMINALS USE “SMS BLASTERS” TO SEND SCAM TEXT MESSAGES

   If you own a cellphone, especially an iPhone, it’s crucial to be aware of a new hacking technique used by cybercriminals. Known as SMS Blaster, this term refers to the illegal use of FBS (fake base stations) and cell-site simulators to broadcast malicious SMS payloads. Attackers commonly use these devices to distribute smishing (SMS

CYBERCRIMINALS USE “SMS BLASTERS” TO SEND SCAM TEXT MESSAGES Read More »

THE INCREASE IN SOPHISTICATED DOCUSIGN IMPERSONATION ATTACKS

     Cybersecurity firm SlashNext has issued a warning about a surge in malicious DocuSign phishing links, with attackers deploying hundreds of new instances daily. These links appear legitimate and are being used to target businesses with fake documentation, such as licensing renewals, compliance demands, and contract modifications. Between November 8 and 14, the number of

THE INCREASE IN SOPHISTICATED DOCUSIGN IMPERSONATION ATTACKS Read More »

FAKE DISCOUNT WEBSITES USED TO STEAL CUSTOMERS DATA AHEAD OF BLACK FRIDAY

A new phishing campaign is targeting e-commerce shoppers in Europe and the United States by deploying fake websites that imitate well-known brands. The goal of the campaign is to steal personal information, including payment details, ahead of the Black Friday shopping season. According to EclecticIQ, the campaign exploits the surge in online shopping during November,

FAKE DISCOUNT WEBSITES USED TO STEAL CUSTOMERS DATA AHEAD OF BLACK FRIDAY Read More »