Tag:
Malware
cyber security
Hackers Exploit New Eye Pyramid Offensive Tool With Python to Launch Cyber Attacks
Security researchers from Intrinsec have published a comprehensive analysis revealing significant overlaps in infrastructure between multiple ransomware operations and the open-source offensive tool,...
Artificial Intelligence
Defending Against Web API Exploitation With Modern Detection Strategies
In today's interconnected digital landscape, APIs serve as the critical building blocks of modern web applications, enabling seamless data exchange and functionality.
However, as...
Artificial Intelligence
How To Integrate MITRE ATT&CK Into Your SOC For Better Threat Visibility
The evolving cybersecurity landscape demands advanced strategies to counter sophisticated threats that outpace traditional security measures.
The MITRE ATT&CK framework emerges as a critical...
CVE/vulnerability
CISA Extend Funding to MITRE to Keep CVE Program Running
The Cybersecurity and Infrastructure Security Agency (CISA) has extended funding to the MITRE Corporation, ensuring the continued operation of the Common Vulnerabilities and Exposures...
CISO
Malicious Macros Return in Sophisticated Phishing Campaigns
The cybersecurity landscape of 2025 is witnessing a troubling resurgence of malicious macros in phishing campaigns.
Despite years of advancements in security measures and...
Cyber Security News
Hackers Exploit Node.js to Spread Malware and Exfiltrate Data
Threat actors are increasingly targeting Node.js—a staple tool for modern web developers—to launch sophisticated malware campaigns aimed at data theft and system compromise.
Microsoft Defender...
cyber security
PasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps
A sophisticated new malware suite targeting macOS, dubbed "PasivRobber," has been discovered by security researchers.
Identified on March 13, 2025, after a suspicious file...
Cyber Security News
Jailbreaking Malicious JScript Loader Reveals Xworm Payload Execution Chain
Cybersecurity researchers have uncovered a sophisticated JScript-to-PowerShell loader delivering XWorm RAT and Rhadamanthys Stealer through a geofenced, multi-stage execution chain.
The attack leverages obfuscation, geolocation checks, and fileless techniques...