Cloud Security Domestic Abuse Victims Exposed in Cloud Misconfiguration by CybrGPT August 10, 2025 by CybrGPT August 10, 2025
Security Hackers abuse leaked Shellter red team tool to deploy infostealers by CybrGPT July 8, 2025 by CybrGPT July 8, 2025
Security Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks by CybrGPT June 25, 2025 by CybrGPT June 25, 2025
Security Police arrests 20 suspects for distributing child sexual abuse content by CybrGPT June 6, 2025 by CybrGPT June 6, 2025
Security Threat actors abuse Google Apps Script in evasive phishing attacks by CybrGPT May 29, 2025 by CybrGPT May 29, 2025
Malware RDP Abuse Present in 90% of Ransomware Breaches by CybrGPT May 25, 2025 by CybrGPT May 25, 2025
Security Malicious PyPI packages abuse Gmail, websockets to hijack systems by CybrGPT May 1, 2025 by CybrGPT May 1, 2025
Security Hackers abuse IPv6 networking feature to hijack software updates by CybrGPT May 1, 2025 by CybrGPT May 1, 2025
Security Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts by CybrGPT April 25, 2025 by CybrGPT April 25, 2025
Scams How fraudsters abuse Google Forms to spread scams by CybrGPT April 24, 2025 by CybrGPT April 24, 2025