The authors propose a novel approach to honeypot creation using Large Language Models. By fine-tuning a pre-trained LLM on a diverse dataset of attacker...
Medusa, a prominent ransomware group, operates on both the surface web and dark web, posting victim information regularly, as their online presence and rapid...
The analysis of the protect_distribution.exe file revealed its malicious nature, which is written in C/C++ and disguised as a benign application and employs various...
CAMO demonstrates attackers' increasing use of legitimate IT tools to bypass security controls and conduct malicious activities, which enable adversaries to spread ransomware, scan...
RansomHub has employed a novel attack method, leveraging TDSSKiller to disable EDR systems and LaZagne to steal credentials, marking a new tactic for RansomHub,...