Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Foresiet

Beware: DeepSeek Phishing Scams - How the Cybercriminals Target Users and Crypto Wallets

Cybercrooks are never short of seeking the next greatest opportunity to exploit unsuspecting victims, and it is no coincidence that the increasing interest in the R1 AI chatbot at DeepSeek offered them the best cover. With the emergence of fake DeepSeek websites, fraudulent sites have now been targeting personal information, logins, and even cryptocurrency wallet details from potential victims.

Latest GitLab Vulnerabilities: A Gateway for FOG Ransomware Attacks?

The future cyber threat is not static and appears to exploit vulnerabilities with fresh ransomware gangs and devastate businesses all over the world. One of such infamous gangs, Fog Ransomware, is currently dumping sensitive data of several businesses, recent attacks including GitLab deep. Foresiet security researchers believe that Fogs recently exploited Gitlab Cve perhaps they employed a fresh or unfixed zero-day vulnerability in GitLab.to launch its attacks.

Who Is Winning the War with AI: Bots vs. CAPTCHA?

For years, CAPTCHA has been the mainstay of online security, blocking bots from invading websites. Since its introduction in 2007, CAPTCHA has continued to evolve in its fight against advanced automated threats, and Google's reCAPTCHA has been at the forefront. From being highly human-friendly to highly bot-unfriendly, the game has completely changed with the introduction of AI capabilities. Thus, the sensitivity towards CAPTCHA is at high stakes with respect to its survival in the detection of bots.

CVE-2025-24085: The iOS Zero-Day Exploit Selling on the Dark Web

A newly discovered zero-day vulnerability, CVE-2025-24085 is a use-after-free vulnerability affecting Apple products, including iOS and macOS. It has been addressed in updates such as iOS 18.3 and macOS Sequoia 15.3 has emerged on the dark web and poses a severe security risk to Apple users. The exploit reportedly sells for 0.00254009 BTC ($233.09 USD) and enables attackers to escalate privileges within iOS devices. Researchers confirm that the vulnerability has been actively exploited in the wild.

The Hidden Cybersecurity Threat of Abandoned AWS S3 Buckets: A Supply Chain Nightmare Waiting to Happen

Cloud storage is the backbone of modern IT infrastructure. It offers a relatively easy way to manage data and deploy software. A recent study has revealed crucial yet oft-overlooked vulnerability-abandoned AWS S3 buckets. These unclaimed storage containers are a significant cybersecurity threat, which may result in a SolarWinds-type supply chain attack.

Lumma Stealer in India: How Fake CAPTCHAs and Advanced Evasion Tactics Power a Cybercrime Wave - A Technical Deep Dive

Today's transforming cyber threat landscape is an age of major malice regarding malware. Lumma Stealer remains one of the most fascinating malicious pieces out here. The aim of this blog is to tell you about all recent activities regarding this malware within the year 2025. Thereby, focusing on some practical real-based scenarios, where incidents have unfolded using this malware as a sample analysis, with line-by-line analysis of malware along with dissected code infection patterns.

The Dark Side of AI: How Cybercriminals Exploit Generative AI for Attacks

Artificial Intelligence (AI) has been a game-changer in industries that have further churned into process efficiency and revolutionized cybersecurity. On the flip side, its potential has been weaponized by threat actors. Google's Threat Intelligence Group (GTIG) recently came out with reports which showed that state-sponsored hackers are actively exploiting Google's AI-powered Gemini assistant to strengthen their cyberattacks.

How Threat Intelligence is Transforming Pentesting & Red Teaming

Are You Testing for Compliance or Preparing for Real Attacks? Cybersecurity isn’t just about checking boxes—it’s about staying ahead of threats. Many businesses rely on Penetration Testing (Pentesting) and Red Teaming to identify vulnerabilities. However, these traditional methods often assume that attackers play by the same rules as defenders. Reality has other plans.

DeepSeek-V3: The AI Beast with 671 Billion Parameters - Game Changer or Privacy Nightmare?

Executive Summary DeepSeek is one of the biggest AI-based systems that originated in China, some serious cyberattacks recently disrupted its services, especially affecting new user registrations. It is not yet clear how it has been done. However, based on analysis and experience, people believe it was a Distributed Denial of Service (DDoS) attack against the system, as a DDoS attack simply sends too much traffic to any given system that causes downtime.

Inside the Black Basta Arsenal: A Deep Dive into the Tools Fueling Their 2024 Ransomware Campaigns

Here's a closer look at one such advanced malware employed with tools by Black Basta—to name a few, Zbot, DarkGate, and customer-designed payloads on order as well—and how these latter help in extracting data coupled with sustaining unauthorized access at some distance. Introduction.