cyber security

North Korean Kimsuky Hackers Deploy New Tactics and Malicious Scripts in Recent AttacksNorth Korean Kimsuky Hackers Deploy New Tactics and Malicious Scripts in Recent Attacks

North Korean Kimsuky Hackers Deploy New Tactics and Malicious Scripts in Recent Attacks

Security researchers have uncovered a new attack campaign by the North Korean state-sponsored APT group Kimsuky, also known as "Black…

3 weeks ago
Raspberry Robin Unveils 200 Unique Domains Used by Threat ActorsRaspberry Robin Unveils 200 Unique Domains Used by Threat Actors

Raspberry Robin Unveils 200 Unique Domains Used by Threat Actors

In a significant development, cybersecurity firm Silent Push has identified nearly 200 unique command and control (C2) domains associated with…

3 weeks ago
Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver MalwareCybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures…

3 weeks ago
Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%

Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%

The cybersecurity landscape in 2024 witnessed a significant escalation in AI-related threats, with malicious actors increasingly targeting and exploiting large…

3 weeks ago
Banking Malware Infects 248,000 Mobile Users Through Social Engineering TechniquesBanking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from…

3 weeks ago
Researchers Compare Malware Development in Rust vs C and C++Researchers Compare Malware Development in Rust vs C and C++

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in Rust versus traditional C/C++ languages. The…

3 weeks ago
ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell SystemsARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed to interact with SSH services on…

3 weeks ago
New Phishing Campaign Targets Mac Users to Steal Login CredentialsNew Phishing Campaign Targets Mac Users to Steal Login Credentials

New Phishing Campaign Targets Mac Users to Steal Login Credentials

A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from Windows users to Mac users in…

3 weeks ago
CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox EnvironmentCAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment

CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment

CAPE, derived from Cuckoo v1, is a sophisticated malware sandbox designed to execute malicious files in an isolated environment while…

3 weeks ago
Multistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login CredentialsMultistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login Credentials

Multistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login Credentials

SnakeKeylogger, a sophisticated multistage malware, has emerged as a significant threat to both individuals and businesses by targeting sensitive login…

3 weeks ago