With our weekly GBHackers news summary, explore and learn about the most recent developments in the cybersecurity field. This practice will allow you to remain...
ANY.RUN now integrates with OpenCTI, a cyber threat intelligence platform that allows automatic enrichment of OpenCTI observations with malware data directly from ANY.RUN analysis. Users...
Hackers have been found utilizing weaponized LNK files to deploy a strain of AutoIt malware, raising alarms across the cybersecurity community.Unpacking the LNK...
Threat actors have been observed hosting phishing documents on legitimate digital document publishing (DDP) sites as part of continuous session harvesting and credential attempts. Since...
A federal jury in Washington, D.C., has convicted Roman Sterlingov, a dual Russian-Swedish national, for operating the notorious darknet cryptocurrency mixer, Bitcoin Fog.This...
The "State of the UAE—Cybersecurity Report 2024," a collaborative effort by the UAE Cyber Security Council and CPX Holding, has released the United Arab...
The Stanford University data breach involved a ransomware attack by the Akira ransomware gang.The breach occurred between May 12, 2023, and September 27,...
In the wake of the LockBit ransomware group's takedown, a shift has occurred within the cybercriminal underworld, leading to a sharp rise in activities...
The Andariel threat group was observed conducting persistent attacks against domestic businesses, specifically installing MeshAgent for remote screen control while conducting the attack.MeshAgent collects...
There are advantages to using standalone AI chatbots over cloud-based alternatives such as OpenAI; however, there are also some security risks.Research shows NextChat, a...