ANY.RUN upgraded its malware analysis sandbox with a new, private AI model, which replaces the previous public-only ChatGPT-powered assistant. The new model runs entirely on its infrastructure, allowing paid users
Monthly Archives: October 2024
GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors
A honeypot is a ‘cybersecurity mechanism’ that is primarily designed to lure threat actors away from legitimate targets. While this mechanism is performed by simulating a valuable asset like
Dark Angels Ransomware Attacking Windows And Linux, ESXi Systems
The Dark Angels ransomware group is known for its “sophisticated” and “stealthy” attack strategies that primarily target large corporations for significant ransom payments. This group has gained fame for executing
Hackers Allegedly Claim Star Health Insurance CISO Sold the Data
Hackers have alleged that the Chief Information Security Officer (CISO) of Star Health Insurance, Amarjeet Khanuja, sold them sensitive data of over 31 million customers. The data, including names, birth
Hackers Using Phone Calls to Attack Employee System With Malware
Recently, there has been a rise in hackers using callback phishing. One common form of this attack, known as telephone-oriented attack delivery (TOAD), starts with a phishing email that seems
What is Boot Sector Virus? Types, Symptoms & Preventions
A Boot Sector Virus is a type of malware that targets the boot sector of a computer’s hard drive or any other storage device, such as a USB flash drive.
Microsoft Security Updates: 5 Zero-Days & 118 Vulnerabilities Patched
In its latest Patch Tuesday release, Microsoft addressed 118 vulnerabilities, including five zero-day flaws, two of which attackers are actively exploiting. The updates cover various Microsoft products, including Windows, Office, Azure, .NET, and Visual Studio.
Healthcare’s Grim Cyber Prognosis Requires Security Booster
North Korean APT Hackers Exploiting DMARC Misconfigs For Phishing Attacks
DMARC is an email authentication protocol that helps domain owners protect against unauthorized use like “email spoofing” and “phishing attacks.” By leveraging existing protocols like “SPF” and “DKIM,” DMARC enables
LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windows Servers
LemonDuck malware has evolved from a cryptocurrency mining botnet into a “versatile malware” that is capable of “stealing credentials,” “disabling security measures,” and “propagating through various methods.” It targets both