ChatGPT’s initiative to fix bugs Concerning the recent cyber-attack on OpenAI ChatGPT, where 100,000 credentials were hijacked and sold on the dark web, the creators of ChatGPT have taken a revolutionary step to sort out the issue. The organization has launched a bug bounty hunting program, inviting over 4,500 enthusiastic ethical hacking hunters to identify […]
What is Penetration Testing? Penetration Testing is the process of evaluating a security system and exploiting vulnerabilities with the help of hacking tools. There is a question that arises every time we refer to penetration testing. ‘Isn’t penetration testing similar to hacking?’ Hackers exploit vulnerabilities in a security system, intending to steal and access sensitive […]
Affected companies British Airways, Boots and the BCC suspect a potential cyber-attack by the Russian cybercriminals, Clops. The personal data of thousands of staff members of these companies might have been compromised due to a vulnerability exploited through MOVEit. The attack was said to be orchestrated by Russian hackers to extort money from the companies. […]
Delicate password system In the widespread digital landscape, passwords are not enough anymore. According to Verizon’s recent ‘Data Breach and Investigation Report’, 61% of the companies breached last year were by using stolen credentials. Passwords seem to make no sense anymore because the bots can crack passwords in 12 minutes and attempt 100 million combinations […]
Moving target defence (MTD), a cybersecurity tactic can protect the critical system in the air defences.
What is moving target defence (MTD)? Moving target defence is the concept of change across multiple systems or servers to confuse the attack actor and reduce their window opportunity to proceed with the cyberattack they began with. This process enables the chance to probe and make attack efforts hard. How is the MTD used in […]