Tools for Conducting Malware Traffic Analysis in a Sandbox
A malware sandbox is a versatile solution that offers a variety of tools for studying malicious behavior, including threats’ network traffic. A quick sandbox analysis…
A malware sandbox is a versatile solution that offers a variety of tools for studying malicious behavior, including threats’ network traffic. A quick sandbox analysis…
The June 2024 Patch Tuesday update from Microsoft addressed almost 49 vulnerabilities in its products and 9 vulnerabilities in non-Microsoft products. The update includes a…
The Chrome team has released Chrome 126 to the Windows, Mac, and Linux stable channels. This update, which will roll out over the coming days…
The Cardinal cybercrime group (aka Storm-1811, UNC4393), which operates the Black Basta ransomware, may have been exploiting a recently patched Windows privilege escalation vulnerability as…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a call to action for administrators and security professionals to review six newly released Industrial Control…
VideoLAN, the organization behind the popular VLC Media Player, has disclosed multiple critical vulnerabilities that could allow attackers to execute arbitrary code remotely. These vulnerabilities…
The research team has recently reported a concerning incident involving the popular Stable Diffusion user interface, ComfyUI. This event has sent shockwaves through the AI…
At the beginning of 2024, there were reports of Chinese threat actors targeting FortiGate systems with COATHANGER malware. However, it has been discovered that the…
Threat actors penetrate the networks with the aim of obtaining unauthorized access to personal and corporate details, bank accounts, and organizational resources for purposes of…
A critical zero-click remote code execution (RCE) vulnerability has been discovered in Microsoft Outlook. This vulnerability, designated as CVE-2024-30103, enables attackers to run arbitrary code…
Threat actors use Remote Desktop Protocol (RDP) to gain unauthorized access to computers and networks, fully control systems, extract sensitive data, and implant malware, among…
Threat actors are leveraging cloud storage services like Google Drive, OneDrive, and Dropbox to distribute malware and steal user information by uploading malicious files such…