Tuesday, March 19, 2024
Ooops... Error 404
Sorry, but the page you are looking for doesn't exist.
You can go to the HOMEPAGE

OUR LATEST POSTS

Hackers Exploiting Microsoft Office Templates to Execute Malicious Code

0
In a cyberattack campaign dubbed "PhantomBlu," hundreds of employees across various US-based organizations were targeted with phishing emails masquerading as messages from an accounting...

How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?

0
The database includes indicators of compromise (IOCs) and relationships between different artifacts observed within an analysis session. In October 2022, ANY.RUN launched TI Threat...

CryptoWire Ransomware Attacking Abuses Schedule Task To maintain Persistence

0
AhnLab security researchers detected a resurgence of CryptoWire, a ransomware strain originally prevalent in 2018, built with the AutoIt scripting language, which primarily spreads...

E-Root Admin Sentenced to 42 Months in Prison for Selling 350,000 Credentials

0
Tampa, FL – In a significant crackdown on cybercrime, Sandu Boris Diaconu, a 31-year-old Moldovan national, has been sentenced to 42 months in federal...

WhiteSnake Stealer Checks for Mutex & VM Function Before Execution

0
A new variant of the WhiteSnake Stealer, a formidable malware that has been updated to be more elusive and efficient in its malicious endeavors.One...

Researchers Hacked AI Assistants Using ASCII Art

0
Large language models (LLMs) are vulnerable to attacks, leveraging their inability to recognize prompts conveyed through ASCII art. ASCII art is a form of visual...