cyber security

MirrorGuard: Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments

A novel defense strategy, MirrorGuard, has been proposed to enhance the security of large language models (LLMs) against jailbreak attacks.…

3 weeks ago

New ClearFake Variant Uses Fake reCAPTCHA to Deploy Malicious PowerShell Code

A recent variant of the ClearFake malware framework has been identified, leveraging fake reCAPTCHA and Cloudflare Turnstile verifications to deceive…

3 weeks ago

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds

A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which allows hackers…

3 weeks ago

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware,…

3 weeks ago

Bybit Hack: Details of Sophisticated Multi-Stage Attack Uncovered

The Bybit hack, which occurred on February 21, 2025, has been extensively analyzed by multiple cybersecurity teams, including Sygnia. This…

3 weeks ago

Hackers Use DLL Side-Loading to Deploy Malicious Python Code

A recent discovery by Xavier Mertens, a senior handler at the Internet Storm Center, has highlighted a sophisticated attack where…

3 weeks ago

Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data

In a sophisticated phishing campaign uncovered by the BI.ZONE Threat Intelligence team, the Squid Werewolf group, also known as APT37,…

3 weeks ago

DocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide

The cybersecurity landscape has witnessed a new threat with the emergence of the DocSwap malware, which disguises itself as a…

3 weeks ago

Microsoft Warns of StilachiRAT Stealing Remote Desktop Protocol Session Data

Microsoft has recently issued a warning about a novel remote access trojan (RAT) known as StilachiRAT, which poses significant threats…

3 weeks ago

Sophisticated Phishing Attack Leverages Microsoft 365 Infrastructure to Target Users

A highly sophisticated phishing campaign has been uncovered exploiting Microsoft 365's trusted infrastructure to facilitate credential harvesting and account takeover…

3 weeks ago