-
Jun 13, 2023
Greg Brockman, one of the co-founders of OpenAI, created a demo for a TED Talk in which ChatGPT is given the ability to access the Internet and external services. The ChatBot, with access to external reality, consults documents, provides links… read more »
-
Jun 10, 2023
The threat actor known as Asylum Ambuscade has been observed straddling cybercrime and cyber espionage operations since at least early 2020. In a recent analysis by ESET, it was revealed that Asylum Ambuscade is a crimeware group targeting bank customers… read more »
-
Jun 7, 2023
A new ransomware group named Rhysida has emerged in the cyber threat landscape, targeting various organizations between 23 May 2023 and 4 June 2023. This group has already made its presence known by naming and targeting multiple victims, which include… read more »
-
Jun 2, 2023
A previously unknown and highly sophisticated Advanced Persistent Threat (APT) has recently come to light, targeting iOS devices in a long-running mobile campaign called Operation Triangulation. According to cybersecurity firm Kaspersky, the attackers employ zero-click exploits via the iMessage platform… read more »
-
Jun 1, 2023
A recent discovery in the cybersecurity landscape has unveiled a concerning tool known as ‘Terminator’, promoted by a threat actor named Spyboy on a Russian-speaking forum, that claims to have the capability to terminate any antivirus, XDR, and EDR platform.… read more »
-
May 27, 2023
Security researchers from Cisco Talos have recently shared an in-depth analysis of the commercial Android spyware known as Predator, developed by Intellexa (previously Cytrox), an Israeli company. This spyware gained attention when Google’s Threat Analysis Group (TAG) discovered its involvement… read more »
-
May 23, 2023
In a recent report, Trend Micro researchers uncovered a significant incident involving ALPHV/BlackCat ransomware, occured on February 2023. The attackers behind this operation employed a cunning tactic by utilizing signed malicious Windows kernel drivers, which allowed them to evade detection.… read more »
-
May 22, 2023
Most image recognition systems use what is known as Probabilistic Image Recognition, a technique used by computer systems to identify objects or patterns in images based on statistical probabilities. Rather than providing a definitive answer, the system assigns a probability… read more »
-
May 19, 2023
The FIN7 cybercrime group has added the Clop ransomware to its arsenal after a period of inactivity. They are known for previously using ransomware variants like REvil and Maze. According to a series of tweets from the Microsoft Security Intelligence… read more »
-
May 18, 2023
A cybercrime group called Lemon Group is using millions of pre-infected Android smartphones globally to carry out malicious activities, such as stealing and selling SMS messages, social media and online messaging accounts, as well as generating revenue through advertisements and… read more »
-
May 13, 2023
A new version of the Linux malware BPFDoor has been discovered, which is more stealthy and has stronger encryption and reverse shell communications. BPFDoor is a backdoor malware that was first discovered by security researchers about a year ago but… read more »
-
May 11, 2023
The leak of the Babuk ransomware code in September 2021 has led to the development of multiple ransomware families capable of targeting VMware ESXi systems. Several cybercrime groups have used the leaked source code to create new variants, indicating a… read more »
-
May 9, 2023
I am a big fan of to-do lists: having a to-do list always at hand relaxes me :-). But I’m also a big fan of command line interfaces: so on all my Linux boxes I started using a simple modification… read more »
-
May 5, 2023
Researchers from the Technical University of Berlin have discovered an exploit called faultTPM that can bypass security protections like BitLocker by exploiting a hardware bug in the firmware TPM (fTPM) of AMD Ryzen processors based on Zen 2 and 3… read more »
-
May 4, 2023
Check Point Research has discovered a new strain of malware, FluHorse, that is highly effective in infiltrating Android apps. The campaign is currently active in East Asia and has affected over 100,000 users. FluHorse is designed to steal sensitive information… read more »
-
May 4, 2023
According to a research by cybersecurity from Sophos, the APT group Dragon Breath (also known as Golden Eye Dog) is using complex variations of the classic DLL sideloading technique to evade detection. The group uses trojanized versions of Telegram, LetsVPN,… read more »
-
May 2, 2023
A new malware called LOBSHOT is being distributed through Google Ads by impersonating a legitimate remote management software, AnyDesk. The malware, analyzed by cybersecurity experts from Elastic Security Labs. is a remote access trojan that allows threat actors to take… read more »
-
Apr 29, 2023
In March and April 2023, cybersecurity firm TrendMicro discovered a new type of ransomware called Rapture that targets its victims using a minimalistic approach with tools that leave only a minimal footprint behind. This malware was found to have similarities… read more »
-
Apr 29, 2023
A new information stealer for Apple macOS, called Atomic macOS Stealer (AMOS), is being advertised on Telegram for $1,000 per month. According to a recent research from Cyble, the malware can steal various types of information from the victim’s machine,… read more »
-
Apr 26, 2023
Alloy Taurus, a Chinese nation-state group known for attacking telecom companies since at least 2012, has been found to be using a Linux variant of the PingPull backdoor and a new tool called Sword2033, according to cybersecurity company Palo Alto… read more »