Cyber Attack

AI Honeypot: A Game-Changer in Outsmarting Cyber Attackers

The authors propose a novel approach to honeypot creation using Large Language Models. By fine-tuning a pre-trained LLM on a diverse dataset of attacker...

Medusa Ransomware Exploits Fortinet Flaw in Devastating Cyber Attacks

Medusa, a prominent ransomware group, operates on both the surface web and dark web, posting victim information regularly, as their online presence and rapid...

Hackers Employs Multi-Layered Cyber Attacks Using Browser Extensions & Add-ons

The analysis of the protect_distribution.exe file revealed its malicious nature, which is written in C/C++ and disguised as a benign application and employs various...

Threat Actors Hijacking Legitimate Software for Untraceable Cyber Attacks

CAMO demonstrates attackers' increasing use of legitimate IT tools to bypass security controls and conduct malicious activities, which enable adversaries to spread ransomware, scan...

New RansomHub Attack Destroys Kaspersky’s TDSSKiller to Cripple EDR Defenses

RansomHub has employed a novel attack method, leveraging TDSSKiller to disable EDR systems and LaZagne to steal credentials, marking a new tactic for RansomHub,...

Popular

Subscribe

spot_imgspot_img