Ransomware Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery by CybrGPT April 22, 2025 by CybrGPT April 22, 2025
Security Phishers abuse Google OAuth to spoof Google in DKIM replay attack by CybrGPT April 22, 2025 by CybrGPT April 22, 2025
Cloud Security Threat Actors Abuse Trust in Cloud Collaboration Platforms by CybrGPT March 26, 2025 by CybrGPT March 26, 2025
Vulnerabilities Tomcat PUT to active abuse as Apache deals with critical RCE flaw by CybrGPT March 18, 2025 by CybrGPT March 18, 2025
Security GitVenom attacks abuse hundreds of GitHub repos to steal crypto by CybrGPT February 26, 2025 by CybrGPT February 26, 2025
Security Chinese hackers abuse Microsoft APP-v tool to evade antivirus by CybrGPT February 18, 2025 by CybrGPT February 18, 2025
Security Google says hackers abuse Gemini AI to empower their attacks by CybrGPT February 1, 2025 by CybrGPT February 1, 2025
Malware Nation-State Hackers Abuse Gemini AI Tool by CybrGPT January 29, 2025 by CybrGPT January 29, 2025
Cloud Security LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks by CybrGPT January 20, 2025 by CybrGPT January 20, 2025
Security Star Blizzard hackers abuse WhatsApp to target high-value diplomats by CybrGPT January 20, 2025 by CybrGPT January 20, 2025