|
By Foresiet
Cybercrooks are never short of seeking the next greatest opportunity to exploit unsuspecting victims, and it is no coincidence that the increasing interest in the R1 AI chatbot at DeepSeek offered them the best cover. With the emergence of fake DeepSeek websites, fraudulent sites have now been targeting personal information, logins, and even cryptocurrency wallet details from potential victims.
|
By Foresiet
The future cyber threat is not static and appears to exploit vulnerabilities with fresh ransomware gangs and devastate businesses all over the world. One of such infamous gangs, Fog Ransomware, is currently dumping sensitive data of several businesses, recent attacks including GitLab deep. Foresiet security researchers believe that Fogs recently exploited Gitlab Cve perhaps they employed a fresh or unfixed zero-day vulnerability in GitLab.to launch its attacks.
|
By Foresiet
For years, CAPTCHA has been the mainstay of online security, blocking bots from invading websites. Since its introduction in 2007, CAPTCHA has continued to evolve in its fight against advanced automated threats, and Google's reCAPTCHA has been at the forefront. From being highly human-friendly to highly bot-unfriendly, the game has completely changed with the introduction of AI capabilities. Thus, the sensitivity towards CAPTCHA is at high stakes with respect to its survival in the detection of bots.
|
By Foresiet
Cloud storage is the backbone of modern IT infrastructure. It offers a relatively easy way to manage data and deploy software. A recent study has revealed crucial yet oft-overlooked vulnerability-abandoned AWS S3 buckets. These unclaimed storage containers are a significant cybersecurity threat, which may result in a SolarWinds-type supply chain attack.
|
By Foresiet
A newly discovered zero-day vulnerability, CVE-2025-24085 is a use-after-free vulnerability affecting Apple products, including iOS and macOS. It has been addressed in updates such as iOS 18.3 and macOS Sequoia 15.3 has emerged on the dark web and poses a severe security risk to Apple users. The exploit reportedly sells for 0.00254009 BTC ($233.09 USD) and enables attackers to escalate privileges within iOS devices. Researchers confirm that the vulnerability has been actively exploited in the wild.
|
By Foresiet
Today's transforming cyber threat landscape is an age of major malice regarding malware. Lumma Stealer remains one of the most fascinating malicious pieces out here. The aim of this blog is to tell you about all recent activities regarding this malware within the year 2025. Thereby, focusing on some practical real-based scenarios, where incidents have unfolded using this malware as a sample analysis, with line-by-line analysis of malware along with dissected code infection patterns.
|
By Foresiet
Artificial Intelligence (AI) has been a game-changer in industries that have further churned into process efficiency and revolutionized cybersecurity. On the flip side, its potential has been weaponized by threat actors. Google's Threat Intelligence Group (GTIG) recently came out with reports which showed that state-sponsored hackers are actively exploiting Google's AI-powered Gemini assistant to strengthen their cyberattacks.
|
By Foresiet
Are You Testing for Compliance or Preparing for Real Attacks? Cybersecurity isn’t just about checking boxes—it’s about staying ahead of threats. Many businesses rely on Penetration Testing (Pentesting) and Red Teaming to identify vulnerabilities. However, these traditional methods often assume that attackers play by the same rules as defenders. Reality has other plans.
|
By Foresiet
Executive Summary DeepSeek is one of the biggest AI-based systems that originated in China, some serious cyberattacks recently disrupted its services, especially affecting new user registrations. It is not yet clear how it has been done. However, based on analysis and experience, people believe it was a Distributed Denial of Service (DDoS) attack against the system, as a DDoS attack simply sends too much traffic to any given system that causes downtime.
|
By Foresiet
Here's a closer look at one such advanced malware employed with tools by Black Basta—to name a few, Zbot, DarkGate, and customer-designed payloads on order as well—and how these latter help in extracting data coupled with sustaining unauthorized access at some distance. Introduction.
|
By Foresiet
Imagine, the system can think exactly like human brain, sense the risk, Forecast, react, Protect and correlate the past incident and recover with Self immunity
- February 2025 (8)
- January 2025 (10)
- December 2024 (2)
- November 2024 (7)
- October 2024 (13)
- September 2024 (20)
- August 2024 (12)
- July 2024 (28)
- June 2024 (25)
- May 2024 (15)
- April 2024 (9)
- March 2024 (7)
- February 2024 (3)
- June 2023 (2)
- May 2023 (1)
- April 2023 (3)
- March 2023 (1)
- February 2023 (1)
- January 2023 (1)
- September 2021 (2)
- May 2021 (1)
- May 2020 (1)
One Click Digital Risk Protection platform to protect from digital external threats, detect and prevent breach epidemic from surface, deep and Dark web.
Foresiet Digiview uses AI powered engine to identify and forecast the risk based on 100+ unique vectors across on-prem and cloud deployment assess your cyber security posture with Industry benchmarking.
- Digital Risk: Measure your third party / supply chain digital Risk and good cyber hygiene.
- Brand Monitoring and self-healing: Protect from Impersonation, Rogue websites, Fake social pages, mobile applications etc.
- Anti-Phishing Shield: Protect employee from targeted Phishing / Impersonation attack using ML/AI engine.
- Attack surface visibility: Discover / monitor external assets including infrastructure, vulnerable asset.
- Threat Intelligence: Stay updated with latest threat advisory from Social, Deep and Dark web.
- Compliance: Automated way to assess third party / vendor compliance and maturity.
Foresiet DigiRisk is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.