• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    North Korean Kimsuky Threat Actors Use Malicious QR Codes and Quishing to Target Foreign Policy Experts

    North Korean Kimsuky Threat Actors Use Malicious QR Codes to Target Foreign Policy Experts

    cybersecurity news The Cyber Express

    The Cyber Express Weekly Roundup: Schools, Hacktivists, and National Cyber Overhauls

    DNS Crash

    Global DNS Crash Triggers Reboot Loops Across Cisco Small Business Switches

    Penetration Testing

    What Is Penetration Testing: Tools, Process, and Importance

    PowerPoint and HPE vulnerabilities CVE-2009-0556 and CVE-2025-37164 are the first to be added to CISA's KEV catalog in 2026

    CISA Warns of Attacks on PowerPoint and HPE Vulnerabilities

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Donald_Trump

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    CVE-2026-21858

    New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCE

    Prosura cyberattack

    Australian Insurer Prosura Confirms Cyber Incident, Takes Online Services Offline Amid Investigation

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Donald_Trump

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    North Korean Kimsuky Threat Actors Use Malicious QR Codes and Quishing to Target Foreign Policy Experts

    North Korean Kimsuky Threat Actors Use Malicious QR Codes to Target Foreign Policy Experts

    cybersecurity news The Cyber Express

    The Cyber Express Weekly Roundup: Schools, Hacktivists, and National Cyber Overhauls

    DNS Crash

    Global DNS Crash Triggers Reboot Loops Across Cisco Small Business Switches

    Penetration Testing

    What Is Penetration Testing: Tools, Process, and Importance

    PowerPoint and HPE vulnerabilities CVE-2009-0556 and CVE-2025-37164 are the first to be added to CISA's KEV catalog in 2026

    CISA Warns of Attacks on PowerPoint and HPE Vulnerabilities

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Donald_Trump

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    CVE-2026-21858

    New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCE

    Prosura cyberattack

    Australian Insurer Prosura Confirms Cyber Incident, Takes Online Services Offline Amid Investigation

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Donald_Trump

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Who Has ChatGPT Helped More – Cybercrime or Security?

Ever since its evolution, CHatGPT has helped people on both sides. Cybercriminals too have used the tool with malicious intentions

Editorial by Editorial
November 18, 2023
in Features
0
chatgpt
657
SHARES
3.7k
VIEWS
Share on LinkedInShare on Twitter

ChatGPT made its debut in 2022 on November 30, quickly capturing the spotlight and becoming a versatile multi-faceted tool. It now functions as an instructor, designer, malware coder, and music composer, among other impressive capabilities.

In just over 11 months since its initial release, ChatGPT has gone through multiple evolutionary stages, all geared towards enhancing security. In this article we will delve deep into the transformative journey of ChatGPT and how it is poised to revolutionize cybersecurity.

Charting the Generations: From ChatGPT to GPT-4

The Chat Generative Pre-Trained Transformer, known as ChatGPT, is a large language model chatbot that responds to user prompts. It achieved a remarkable milestone by attracting over 100 million users within just two months of its launch, underscoring its status as a multi-billion-dollar project. ChatGPT, originally one among the many chatbots powered by artificial intelligence, has undergone significant transformations since its initial iteration as GPT-1 in 2018.

In 2019, GPT-2 was introduced, enhancing its text creation capabilities, although concerns about potential misuse by malicious actors arose. The release of GPT-3 in 2020 marked a crucial step forward, enabling better communication with users in multiple languages.

In recent months, the evolution of ChatGPT has seen developers of GPT-4 focusing more on ensuring that the results generated are minimally, if not entirely, free of offensive content.

ChatGPT, EvilGPT, and the Ongoing Battle for Cybersecurity

Just like any other tool employed to advance cyberattacks, threat actors and dark web marketplaces wasted no time capitalizing on the rising popularity of ChatGPT. Users of these dark web platforms, who specialize in selling tools and applications for cyberattacks, began naming their malicious creations after ChatGPT.

report-ad-banner

chatgpt

Dark web post selling EvilGPT (Photo: Falcon Feeds/X)

Notable examples discovered by researchers at The Cyber Express include WormGPT, WolfGPT, and EvilGPT, which were readily available on the dark web forums.

chatgpt

Screenshot: WormGPT Prompt for BEC Email (Source: SlashNext)

These versions, priced at a mere US$10, promised to relieve threat actors from the tedious task of crafting convincing-looking emails essential for Business Email Compromise (BEC) attacks. In BEC attacks, perpetrators manipulate employees into transferring funds or divulging sensitive information.

With the escalating threat to digital infrastructure, the custodians of cyberspace have devised elaborate strategies to counter cyberattacks. In a blog post, the United States of America’s cyber defense agency unequivocally stressed the importance of securing artificial intelligence by design.

Addressing the enigmatic aura surrounding artificial intelligence due to its misuse, a report by the Cybersecurity and Infrastructure Security Agency (CISA) clarified, “Discussions of artificial intelligence (AI) often carry an air of mysticism concerning the inner workings of AI systems. The truth is much simpler: AI is a form of software system.” CISA strongly urged AI system manufacturers to consider security measures as not merely a technical feature but an essential business requirement. They called for AI tools to be inherently secure right out of the box, necessitating minimal configuration or additional costs.

Recognizing that AI, particularly in the cybersecurity sector, is poised for significant growth, CISA issued explicit warnings to software manufacturers. Their guidance covered all aspects of AI implementation, including:

  • AI software design
  • AI software development
  • AI data management
  • AI software deployment
  • AI system integration
  • AI software testing
  • AI vulnerability management
  • AI incident management
  • AI product security
  • AI end-of-life management

ChatGPT: A Double-Edged Sword in Cybersecurity and Cybercrime

Vulnerabilities  providing hackers with access to the ChatGPT category have garnered significant attention. However, when considering the potential for unlimited exploitation of ChatGPT for cyber threats, it becomes evident that the possibilities are virtually boundless, and we have a long journey ahead in addressing these challenges.

Hackers have already made attempts to exploit ChatGPT for malicious cyber activities. It comes as no surprise that numerous organizations, including Bank of America, Deutsche Bank, Goldman Sachs, and Citigroup, have taken precautionary measures to limit the use of ChatGPT.

In response to these concerns, a BlackBerry research report has shed light on the utilization of unified endpoint management platforms to regulate the use of similar tools.

“In this way, they can avoid measures that users may perceive as draconian, such as removing or blocking the use of personal apps on a user’s device, while still ensuring that enterprise security is maintained, by “containerizing” corporate data and keeping it separate and insulated from a device owner’s private data or applications,” it added.

Unwinding the Web of ChatGPT-Involved Cybercrime

  1. SEO Poisoning and malicious Google ads – Cybercriminals spread the Bumblebee malware through malicious download pages which were reflected on Google Ads. People looking for apps like ChatGPT were led to search results with software content containing the Bumblebee malware.
  2. Phishing attempts – Cyble Research and Intelligence Labs (CRIL) found several phishing websites on another fraudulent OpenAI social media page. Researchers also identified phishing websites impersonating ChatGPT to pilfer credit card information.
  3. SMS fraud and Android malware – Cyble also brought to light SMS fraud wherein threat actors used the name and icon of ChatGPT to dupe individuals with billing fraud. Additionally, over 50 fraudulent apps were also found using the ChatGPT icon.

Limitations of ChatGPT

ChatGPT initially served as a straightforward chat tool, but it underwent multiple functional changes, including the addition of security features in response to the growing exploitation of the system. However, despite these security enhancements, malicious actors managed to circumvent the safeguards, using ChatGPT to generate malware and other harmful content.

This highlighted a significant limitation of the technology, showing that while it was sophisticated, it couldn’t truly reason and could easily become confused by complex prompts. Consequently, researchers and developers bore the increasing responsibility of continually testing and fortifying the tool’s security to protect its users.

MicrosoftTeams image 90

Pilfered ChatGPT credentials traced to the dark web (Photo: CheckPoint)

Cybercriminals were discovered using a tool known as an account checker, which facilitated brute force attacks and unauthorized access to accounts. Subsequently, there was another update indicating that hackers were posting stolen ChatGPT account data on the dark web. This resulted in the release of several ChatGPT premium account details on the dark web for further illicit use.

While ChatGPT has gained widespread adoption among students, enthusiastic users, and cybersecurity researchers due to its numerous advantages, it remained banned in Italy due to security concerns. Canada initiated an investigation into ChatGPT’s handling of personal data, while other nations deliberated on regulatory frameworks for its use.

Despite its limitations, cybersecurity researchers recognize ChatGPT’s potential to expedite the completion of mundane tasks that involve vast amounts of data. It can efficiently execute various connected or disconnected tasks once properly programmed, thereby alleviating the workload on human employees. However, concerns have been raised about the possibility of job displacement, as ChatGPT and similar tools could potentially reduce the demand for human labor.

Nevertheless, the misuse and limitations of technology seem unlikely to overshadow the creative and adaptive capabilities of the human mind. While ChatGPT streamlines and accelerates tasks, it remains a servant to humanity, simplifying processes but not assuming full control over them.

ChatGPT Facts and Stats

OpenAI has been clearing the air about ChatGPT since its inception. Based on InstructGPT models, ChatGPT was assured to be formed with humans in the loop. Although the promise about how the language models are trained and are better equipped to answer user prompts remain under scrutiny, several fun facts about ChatGPT stir interest towards it.

While it goes on an ever-evolving spree, lets read certain facts about ChatGPT that fascinate users.

  1. A group of writers accused that OpenAI trained ChatGPT based on their work, unlawfully. John Grisham, one of the writers said to the BBC, “For 30 years, I’ve been sued by everyone else – for slander, defamation, copyright, whatever – so it’s my turn.”
  2. ChatGPT was tested to pass the final exam for the Master of Business Administration program. The test was taken by a professor at the University of Pennsylvania’s Wharton School. And it passed the test.
  3. After creating content for school essays and checking grammar, ChatGPT was in the news for helping someone win a US$59 lottery. The winner claimed that they tricked ChatGPT to generate winning numbers using hypothetical questions.
  4. OpenAI CEO Sam Altman expressed that the hype around GPT-3 was “way too much.” He said that it still has serious weaknesses and makes very silly mistakes.

(Photo: OpenAI)

Enthusiastic ChatGPT users have marveled at OpenAI’s innovative creations. DALL-E, for instance, has the capability to generate images based on textual descriptions, while CLIP can intelligently map images to text. Additionally, Whisper empowers multilingual speech recognition and translation, among other functionalities. The evolution of ChatGPT knows no bounds.

Nevertheless, the versatility and power of ChatGPT pose a risk. Threat actors have discovered ways to exploit its capabilities, and this trend continues to evolve. It is of paramount importance that cybersecurity researchers and professionals invest significant efforts in comprehensively understanding the potential vulnerabilities within ChatGPT. This involves exploring how it could be leveraged to disrupt digital infrastructure.

To counter these threats effectively, it is crucial to employ a range of strategies, including red teaming, blue teaming, and purple teaming. These collaborative efforts ensure that we stay one step ahead of cybercriminals and enable us to harness ChatGPT for productive purposes.

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • More
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: AI CybersecurityAI Tools in CybersecurityChatGPT AI ToolsThe Cyber ExpressThe Cyber Express News
Previous Post

Denmark Faces Unprecedented Cyber Onslaught: 22 Energy Companies Breached

Next Post

NLP-Powered AI: The Future of Cybersecurity Threat Detection

Next Post
NLP platforms for cybersecurity

NLP-Powered AI: The Future of Cybersecurity Threat Detection

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

North Korean Kimsuky Threat Actors Use Malicious QR Codes and Quishing to Target Foreign Policy Experts
Cyber News

North Korean Kimsuky Threat Actors Use Malicious QR Codes to Target Foreign Policy Experts

January 9, 2026
cybersecurity news The Cyber Express
Firewall Daily

The Cyber Express Weekly Roundup: Schools, Hacktivists, and National Cyber Overhauls

January 9, 2026
DNS Crash
Firewall Daily

Global DNS Crash Triggers Reboot Loops Across Cisco Small Business Switches

January 9, 2026
Penetration Testing
Firewall Daily

What Is Penetration Testing: Tools, Process, and Importance

January 9, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information