Security Hackers abuse IPv6 networking feature to hijack software updates by CybrGPT May 1, 2025 by CybrGPT May 1, 2025
Security Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts by CybrGPT April 25, 2025 by CybrGPT April 25, 2025
Scams How fraudsters abuse Google Forms to spread scams by CybrGPT April 24, 2025 by CybrGPT April 24, 2025
Ransomware Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery by CybrGPT April 22, 2025 by CybrGPT April 22, 2025
Security Phishers abuse Google OAuth to spoof Google in DKIM replay attack by CybrGPT April 22, 2025 by CybrGPT April 22, 2025
Cloud Security Threat Actors Abuse Trust in Cloud Collaboration Platforms by CybrGPT March 26, 2025 by CybrGPT March 26, 2025
Vulnerabilities Tomcat PUT to active abuse as Apache deals with critical RCE flaw by CybrGPT March 18, 2025 by CybrGPT March 18, 2025
Security GitVenom attacks abuse hundreds of GitHub repos to steal crypto by CybrGPT February 26, 2025 by CybrGPT February 26, 2025
Security Chinese hackers abuse Microsoft APP-v tool to evade antivirus by CybrGPT February 18, 2025 by CybrGPT February 18, 2025
Security Google says hackers abuse Gemini AI to empower their attacks by CybrGPT February 1, 2025 by CybrGPT February 1, 2025