On July 25, 2023, cybersecurity researcher of Netenrich uncovered FraudGPT, an AI bot inspired on WormGPT that has appeared in numerous dark web marketplaces and Telegram groups. Unlike its predecessor, FraudGPT is especially built for offensive uses such as spear phishing emails, cracking tools, and carding activities. The person behind the promotion of FraudGPT is known online as "CanadianKingpin." FraudGPT costs $200 per month, with reductions available for six-month and one-year subscriptions. FraudGPT enables writing malicious code, developing undetectable malware, and identifying leaks and vulnerabilities. It has garnered over 3,000 confirmed sales and reviews. The exact large language model (LLM) used to create FraudGPT remains undisclosed. The rise of AI-based cybercrime tools raises concerns, as threat actors exploit technologies like OpenAI ChatGPT to create new adversarial variants, fostering unrestricted cybercriminal activities. This poses significant challenges for organizations attempting to defend against evolving threats. To counter these rapidly evolving threats, organizations are advised to adopt a defense-in-depth strategy and leverage security telemetry for quick analytics. This proactive approach will aid in identifying and thwarting phishing attacks before they escalate into more damaging events like ransomware attacks or data breaches. Vigilance and proactive measures are crucial to protect against potential theft of sensitive information and unauthorized transactions.
Cisco has disclosed a high-severity vulnerability identified as CVE-2026-20188 affecting Cisco Crosswork Network Controller (CNC) and Network Services Orchestrator (NSO) platforms....
Palo Alto Networks has warned customers about a critical security flaw affecting its PAN-OS firewall platform. The vulnerability, identified as CVE-2026-0300, is linked to the User...
In early 2026, Rapid7 observed a sophisticated cyberattack attributed to the Iranian state-sponsored group MuddyWater, masquerading under the Chaos ransomware brand in what appears...