AttackCrypt, an open-source “crypter,” was recently used by cybercriminals to hide malware binaries and avoid antivirus detection. A crypter is...
On Wednesday, an ex-Uber CSO was found guilty of federal charges related to payments he secretly approved to hackers who broke into the ride-hailing company in...
A subfield of forensic science called digital forensics focuses on finding, obtaining, processing, analyzing, and documenting electronically stored data. Digital forensics support is essential for law enforcement investigations...
The North Korean Kimsuky hacking group has been observed employing a new version of its reconnaissance malware, now called ‘ReconShark,’ in a cyberespionage campaign with a...
The Air Force—along with the Pentagon—is also crafting guidance around the safe use of generative artificial intelligence tools and technologies, such as ChatGPT. The Air Force...
The bipartisan proposal directs CISA to provide commercial satellite owners and operators with more resources and recommendations to improve their cyber protections. A bipartisan pair of...
VirusTotal has introduced a Crowdsourced YARA Hub to overcome this hurdle, letting users find and filter existing rules, track a new rule, and export rules to LiveHunt or...
NodeStealer, a newly discovered malware on Meta, was identified by Facebook as stealing browser cookies. Due to this vulnerability, threat actors can obtain illicit entry into...
A recently discovered Android subscription malware called ‘Fleckpe’ has surfaced on Google Play Store. This insidious malware disguises itself as an authentic application and has already...
“Since the beginning of 2023 until the end of April, out of 13,296 new domains created related to ChatGPT or OpenAI, 1 out of every 25...
75% of organizations typically change or update their APIs on a daily or weekly basis, creating a significant challenge for protecting the changing API attack surface, according...
Recent Comments