With advancing tech, concerns rise over the misuse of large language models like ChatGPT. Recently, an LLM model called “WormGPT” surfaced on underground forums, which is significantly...
In the vast and complex world of cybersecurity, danger often hides in the most unsuspecting corners, stalking stealthily where our guard is least prepared. While the...
Recently, threat actors have been utilizing brute force attacks to compromise exposed MSSQL databases to distribute the FreeWorld ransomware. This attack campaign, dubbed DB#JAMMER, is notable, according...
Recent reports suggest threat actors have used phishing emails to distribute fileless malware. The attachment consists of a .hta (HTML Application) file, which can be used...
SapphireStealer is an open-source information stealer that may be utilized for obtaining sensitive information, such as corporate credentials, which are frequently sold to other threat actors who...
ReversingLabs spotted “VMConnect” in early August, a malicious supply chain campaign with two dozen rogue Python packages on PyPI. It’s been observed that these packages mimicked the following...
Cisco ASA SSL VPN Appliances is a type of network security device that allows remote users to access a private network over the internet securely. These...
Threat actors targeting unpatched Citrix NetScaler systems exposed to the internet are being tracked by Sophos X-Ops. As per research, the recent attacks share a similarity...
The rapid surge in LLMs (Large language models) across several industries and sectors has raised critical concerns about their safety, security, and potential for misuse. In...
Some cyberattacks are just more evasive than others. While many attacks can be identified and blocked through a system that relies on threat signatures, many cannot and easily...
Recent Comments