A new vulnerability, CVE-2023-5528, has been discovered with Kubernetes. This vulnerability is associated with a command injection vulnerability that leads to remote code execution...
The RA World ransomware, previously known as the RA Group, has been a significant threat to organizations worldwide since its emergence in April 2023....
The operators of DarkGate successfully leveraged a patched Windows Defender SmartScreen vulnerability, identified as CVE-2024-21412, as a zero-day attack to disseminate the complex and ever-evolving DarkGate malware.The...
Threat actors can exploit ChatGPT's ecosystem for several illicit purposes, such as crafting prompts to generate malicious code, phishing lures, and disinformation content.Even threat...
Organizations have many tools when investigating cyber threats, but two stand out: Threat Intelligence Platforms (TIPs) and sandboxes.Each solution provides distinct advantages, yet...
Microsoft Copilot for security was a generative AI solution that can help security and IT professionals handle their security operations much more efficiently.This...
Threat actors use malicious PyPI packages to infiltrate systems and execute various attacks like data exfiltration, ransomware deployment, or system compromise. By masquerading as legitimate...
In the wake of the LockBit ransomware group's takedown, a shift has occurred within the cybercriminal underworld, leading to a sharp rise in activities...
There are advantages to using standalone AI chatbots over cloud-based alternatives such as OpenAI; however, there are also some security risks.Research shows NextChat, a...
An infostealer disguised as the Adobe Reader installation has been observed. The file is disseminated in PDF format and prompts users to download and run...