Threat Actots Leveraging ChatGPT To Craft Sophisticated Attacks
Adversaries are employing Large Language Models to generate malicious code, delivered via phishing emails, for downloading diverse payloads, including Rhadamanthys,...
Read more →Adversaries are employing Large Language Models to generate malicious code, delivered via phishing emails, for downloading diverse payloads, including Rhadamanthys,...
Read more →A large-scale cyberattack orchestrated by Ukrainian intelligence led to disruptions in the Russian banking sector. According to a source from...
Read more →Cisco has issued patches for multiple products affected by a critical vulnerability in the RADIUS protocol. The vulnerability, identified as...
Read more →A critical local privilege escalation vulnerability has been discovered in RaspAP, an open-source project designed to transform Raspberry Pi devices...
Read more →Onyx Sleet, a cyber espionage group also known as SILENT CHOLLIMA, Andariel, DarkSeoul, Stonefly, and TDrop2, mainly targets the military,...
Read more →A malicious campaign emerged on June 21, 2024, distributing a JavaScript file hosted on grupotefex.com, which executes an MSI installer,...
Read more →Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive...
Read more →Hackers often attack secure boot during the boot process to execute unauthorized code, which gives them the ability to bypass...
Read more →The French government has investigated a malware attack that compromised approximately 3,000 machines within the country. The attack, part of...
Read more →San Francisco, CA – OpenAI has announced the launch of SearchGPT, a groundbreaking prototype designed to revolutionize how users search...
Read more →Play Ransomware and LockBit Ransomware have reportedly allied to enhance their capabilities in launching cyber attacks. This collaboration, which involves...
Read more →A hacktivist entity known as USDoD has asserted that it has leaked CrowdStrike’s “entire threat actor list” and claims to...
Read more →