Security Threat actors abuse Google Apps Script in evasive phishing attacks by CybrGPT May 29, 2025 by CybrGPT May 29, 2025
Malware RDP Abuse Present in 90% of Ransomware Breaches by CybrGPT May 25, 2025 by CybrGPT May 25, 2025
Security Malicious PyPI packages abuse Gmail, websockets to hijack systems by CybrGPT May 1, 2025 by CybrGPT May 1, 2025
Security Hackers abuse IPv6 networking feature to hijack software updates by CybrGPT May 1, 2025 by CybrGPT May 1, 2025
Security Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts by CybrGPT April 25, 2025 by CybrGPT April 25, 2025
Scams How fraudsters abuse Google Forms to spread scams by CybrGPT April 24, 2025 by CybrGPT April 24, 2025
Ransomware Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery by CybrGPT April 22, 2025 by CybrGPT April 22, 2025
Security Phishers abuse Google OAuth to spoof Google in DKIM replay attack by CybrGPT April 22, 2025 by CybrGPT April 22, 2025
Cloud Security Threat Actors Abuse Trust in Cloud Collaboration Platforms by CybrGPT March 26, 2025 by CybrGPT March 26, 2025
Vulnerabilities Tomcat PUT to active abuse as Apache deals with critical RCE flaw by CybrGPT March 18, 2025 by CybrGPT March 18, 2025