SIEM as a Service
DNS Tunnel Keylogger – An Offesnsive Post-Exploitation Tool For Pentesters

DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters

A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to transmit keystrokes through firewalls, potentially evading detection covertly. The tool, DNS-Tunnel-Keylogger, was designed for...
Microsoft Air-Gapped GPT-4

Microsoft Unveils Air-Gapped GPT-4 for U.S. Intelligence Agencies

Microsoft has announced the deployment of an air-gapped GPT-4 AI model specifically designed for the US Intelligence Community. This initiative represents a significant milestone in utilizing generative AI technologies in secure government environments. This ensures...
AI powered Deepfake Detector to Combact Deepfakes Threats

AI Powered Deepfake Detector to Combact Deepfakes Threats

McAfee has introduced a significant upgrade to its AI-powered deepfake detection technology. This enhancement, developed in collaboration with Intel, aims to provide a robust defense against the escalating threat of deepfake scams and misinformation....
Empty S3 Bucket

A Costly Mistake: How an Empty S3 Bucket Led to a Massive AWS Bill

AWS Customer Faces Massive Bill Due to Open-Source Tool Misconfiguration. In a startling incident, an AWS customer faced a staggering $1,300 bill for S3 usage, despite creating a single, empty bucket for testing purposes. The...
Gemini 1.5 Pro – Powered With Automated Malware Analysis To Detect Zero-Day

Gemini 1.5 Pro – Powered With Automated Malware Analysis To Detect Zero-Day

Google has introduced Gemini 1.5 Pro for malware analysis, an advanced AI tool capable of processing up to 1 million tokens. This tool revolutionizes automated malware analysis and marks a significant leap forward in...
AI-Based Brute-Forcing Attack Outperforming Probabilistic Model

AI-Based Brute-Forcing Attack Outperforming Probabilistic Model

Web Vulnerability Assessment and Penetration Testing (Web VAPT) aims to identify vulnerabilities in web apps. However, current wordlist-based methods are ineffective since directory brute-forcing attacks can establish reachable directories. Offensive AI is the integration of AI...
NSA CISA AI Security Guidelines

NSA, CISA Released Guidance And Best Practices To Secure The AI

In an era where artificial intelligence (AI) systems are becoming increasingly integral to our daily lives, the National Security Agency’s Artificial Intelligence Security Center (NSA AISC) has taken a significant step forward in enhancing...
Cypago Announces New Automation Support for AI Security and Governance

Cypago Announces New Automation Support for AI Security and Governance

Cyber GRC software company Cypago has announced a new automation solution for artificial intelligence (AI) governance, risk management and compliance. This includes implementation of NIST AI RMF and ISO/IEC 42001, the newest AI security...
Microsoft Adds 5 New AI Tools to be Added with Azure AI

Microsoft Adds 5 New AI Tools to be Added with Azure AI

Microsoft has unveiled a suite of new tools within its Azure AI Studio. These innovations are designed to address the growing concerns around prompt injection attacks, content reliability, and overall system safety, marking a...
OpenAI Releases GPT-4o, Faster Model & Free For All ChatGPT Users

OpenAI Releases GPT-4o, Faster Model & Free For All ChatGPT Users

OpenAI, which is the leading artificial intelligence research lab, recently announced its latest breakthrough in AI technology called GPT-4o. This newest and most advanced model represents a significant leap forward in the realm of generative...
SIEM as a Service

Recent Posts

Salt Typhoon

RedMike Hackers Exploited 1000+ Cisco Devices to Gain Admin Access 

Researchers observed a sophisticated cyber-espionage campaign led by the Chinese state-sponsored group known as "Salt Typhoon," also referred to as "RedMike."  Between December 2024 and...