OSINT Platform to SOC & MDR Teams for Malware Analysis
ANY.RUN now integrates with OpenCTI, a cyber threat intelligence platform that allows automatic enrichment of OpenCTI observations with malware data...
Read more →ANY.RUN now integrates with OpenCTI, a cyber threat intelligence platform that allows automatic enrichment of OpenCTI observations with malware data...
Read more →The cybersecurity landscape has been shaken by the discovery that a single piece of malware, known as RedLine, has stolen...
Read more →Google has announced an upgrade to its Safe Browsing technology to provide Chrome users with real-time protection against phishing, malware,...
Read more →The operators of DarkGate successfully leveraged a patched Windows Defender SmartScreen vulnerability, identified as CVE-2024-21412, as a zero-day attack to disseminate the complex...
Read more →Hackers have been found utilizing weaponized LNK files to deploy a strain of AutoIt malware, raising alarms across the cybersecurity...
Read more →Organizations have many tools when investigating cyber threats, but two stand out: Threat Intelligence Platforms (TIPs) and sandboxes. Each solution...
Read more →Threat actors have been observed hosting phishing documents on legitimate digital document publishing (DDP) sites as part of continuous session...
Read more →Microsoft Copilot for security was a generative AI solution that can help security and IT professionals handle their security operations...
Read more →A federal jury in Washington, D.C., has convicted Roman Sterlingov, a dual Russian-Swedish national, for operating the notorious darknet cryptocurrency...
Read more →The “State of the UAE—Cybersecurity Report 2024,” a collaborative effort by the UAE Cyber Security Council and CPX Holding, has...
Read more →Hackers target these platforms due to their hosting of valuable resources and data. For financial gain or some other bad...
Read more →Fortinet has disclosed a critical vulnerability in its FortiOS and FortiProxy captive portal systems, potentially allowing attackers to execute arbitrary...
Read more →