Artificial Intelligence
Threat Actots Leveraging ChatGPT To Craft Sophisticated Attacks
Adversaries are employing Large Language Models to generate malicious code, delivered via phishing emails, for downloading diverse payloads, including Rhadamanthys, NetSupport, CleanUpLoader, ModiLoader, LokiBot,...
Cyber Attack
Malicious Python Package Attacking macOS Developers To Steal Google Cloud Logins
Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive information, install malware, or...
CVE/vulnerability
North Korean Onyx Sleet Using Group Of Malware And Exploits to Gain Intelligence
Onyx Sleet, a cyber espionage group also known as SILENT CHOLLIMA, Andariel, DarkSeoul, Stonefly, and TDrop2, mainly targets the military, defense sector, and technology...
Cyber Attack
ShadowRoot Ransomware Attacking Organizations With Weaponized PDF Documents
A rudimentary ransomware targets Turkish businesses through phishing emails with ".ru" domain sender addresses. Clicking a PDF attachment's link triggers downloading a malicious executable...
Cyber Attack
Chinese Hackers Using Shared Framework To Create Multi-Platform Malware
Shared frameworks are often prone to hackers' abuses as they have been built into various applications, which offer a range of systems that can...
Cyber Attack
Hackers Registered 500k+ Domains Using Algorithms For Extensive Cyber Attack
Hackers often register new domains for phishing attacks, spreading malware, and other deceitful activities. Such domains are capable of pretending to be trusted entities, which...
Cyber Attack
Beware Of Fake Browser Updates That Installs Malicious BOINC Infrastructre
SocGholish malware, also known as FakeUpdates, has exhibited new behavior since July 4th, 2024, as the infection chain still begins with a compromised website...
Cyber Attack
Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which link to a variety of systems via one breach. Compromising an...