5 Malware Analysis Challenges Solved by an Interactive Sandbox
08
Aug
2024

5 Malware Analysis Challenges Solved by an Interactive Sandbox

Malware analysis can be challenging, as it often requires in-depth theoretical knowledge and advanced skills. Tools like an interactive sandbox…

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
08
Aug
2024

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine

Among the other attacks created by Bargury is a demonstration of how a hacker—who, again, must already have hijacked an…

Black Hat USA 2024: Chip Flaw 'GhostWrite' Steal Steal Data from CPU Memory
08
Aug
2024

Chip Flaw ‘GhostWrite’ Steals Data from CPU Memory

Black Hat USA 2024: Critical RISC-V CPU vulnerability discovered. Dubbed GhostWrite; attackers can exploit this flaw to steal sensitive data…

CISA
08
Aug
2024

CISA warns of hackers abusing Cisco Smart Install feature

​On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recommended disabling the legacy Cisco Smart Install (SMI) feature after seeing…

Beware Of Fake WinRar Websites Delivering Ransomware via GitHub
08
Aug
2024

Beware Of Fake WinRar Websites Delivering Ransomware via GitHub

The threat actors often exploit fake websites to trick users into revealing their personal data. Not only that, but these…

0.0.0.0 Day
08
Aug
2024

18-year-old security flaw in Firefox and Chrome exploited in attacks

A vulnerability disclosed 18 years ago, dubbed “0.0.0.0 Day”, allows malicious websites to bypass security in Google Chrome, Mozilla Firefox,…

Researches introduced MaskAnyone Toolkit To Minimize The Privacy Risks
08
Aug
2024

Researches introduced MaskAnyone Toolkit To Minimize The Privacy Risks

Audio-visual data offers invaluable insights into human behavior and communication but raises significant privacy concerns, which proposes MaskAnyone, a toolkit…

University Professors Targeted by North Korean Cyber Espionage Group
08
Aug
2024

University Professors Targeted by North Korean Cyber Espionage Group

Aug 08, 2024Ravie LakshmananCyber Attack / Cyber Espionage The North Korea-linked threat actor known as Kimsuky has been linked to…

macOS Stealer Mimic as screen recorder Attacking Users
08
Aug
2024

macOS Stealer Mimic as screen recorder Attacking Users

A new AMOS Mac stealer variant is circulating, distributed via a fake Loom website hosted on Google Ads, which, potentially…

AWS 'Bucket Monopoly' Flaw Led to Account Takeover
08
Aug
2024

AWS ‘Bucket Monopoly’ Flaw Led to Account Takeover

Black Hat USA 2024 is up and running at full pace as critical AWS vulnerabilities are exposed! Learn how attackers…

Naveen Goud
08
Aug
2024

Meet the ransomware gang that demands $500 million

Recent reports have highlighted a disturbing trend: ransomware gangs are increasingly targeting the healthcare sector, leading to severe consequences such…

Royal ransomware crew puts on a BlackSuit in rebrand
08
Aug
2024

Royal ransomware crew puts on a BlackSuit in rebrand

The cyber criminal ransomware gang that previously operated as Royal has rebranded and relaunched as BlackSuit, and is actively targeting…