Malicious Windows kernel drivers used in BlackCat ransomware attacks
The ALPHV ransomware group (aka BlackCat) was observed employing signed malicious Windows kernel drivers to evade detection by security software during attacks. The driver seen…
The ALPHV ransomware group (aka BlackCat) was observed employing signed malicious Windows kernel drivers to evade detection by security software during attacks. The driver seen…
Scientists developed a new AI model that automatically maps vulnerabilities to attack patterns using Large Language Models and identifies all relevant attack techniques—scientists from the…
My name is Linus Särud. I’m a Detectify Security Researcher and responsible for incoming support emails. Going forward, we will identify popular subjects from the…
Microsoft is investigating service issues preventing users from accessing their Microsoft 365 accounts and blocking access to installed apps. The company confirmed the issue in…
DarkBERT has been fed approximately 6.1 million pages found on the dark web as part of its large-scale pretraining on texts in English. The emergence…
Jakubowska, who reviewed the document, says that several countries appear to say they would give police access to people’s encrypted messages and communications. Comments from…
Thanks to all of you who participated in the h1-202 CTF! We had a lot of fun building it and it looks like many of…
During the past month, a great deal has happened in the web security landscape, and we have added a ton of new findings to the…
Highly realistic AI-generated images depicting an explosion near the Pentagon that went viral on Twitter caused the stock market to dip briefly earlier today. Tweets…
Tejay Fletcher, the brains of the infamous scam website iSpoof, was given a sentence of 13 years and 4 months in jail after being found…
Lisa Wiswell, a HackerOne advisor and a principal at GRIMM cybersecurity firm, thinks the government needs more help from hackers. Not just with hacking or…
May 22, 2023Ravie LakshmananCryptocurrency / Cloud Security A financially motivated threat actor of Indonesian origin has been observed leveraging Amazon Web Services (AWS) Elastic Compute…