Home CyberSecurity Research

CyberSecurity Research

Exclusive! Scientists Developed an AI Model that Automatically Links Vulnerabilities With Cyber Attacks

Exclusive! Scientists Developed an AI Model that Automatically Links Vulnerabilities With Cyber Attacks

Scientists developed a new AI model that automatically maps vulnerabilities to attack patterns using Large Language Models and identifies all relevant attack techniques—scientists from the Pacific Northwest National Laboratory report to Cyber Security News. Imagine...
Hackers Use 'URL Obfuscation'

Hackers Using New ‘URL Obfuscation’ Technique to Deliver Malware Silently

Mandiant researchers recently identified "URL Schema Obfuscation" as an adversary technique that conceals the final URL destination by manipulating the URL schema during the distribution of various malware families. The method has the potential to...
IT Security Analyst Pleaded Guilty

IT Security Analyst Pleaded Guilty for Attacking his Own Company

The insider threat has been a significant concern for organizations in terms of security. Though they do not happen very often, it is still a major threat to the business.  Ashley Liles, a 28-year-old IT...
Cynomi Study Reveals Number of MSPs Providing Virtual CISO Services Will Grow Fivefold By Next Year

Cynomi Study Reveals Number of MSPs Providing Virtual CISO Services Will Grow Fivefold By...

Cynomi, the leading AI-powered virtual Chief Information Security Officer (vCISO) platform vendor for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs) and consulting firms, has published the results of its first annual report,...
Users Monitoring Best Practices

Top 10 Privileged Users Monitoring Best Practices – 2023

Privileged users typically hold crucial positions within organizations. They usually have elevated access, authority, and permission levels in the organization's IT systems, networks, applications, and critical data. That’s why they may pose risks to...
10 Best ZTNA Solutions (Zero Trust Network Access) in 2024

10 Best ZTNA Solutions (Zero Trust Network Access) in 2024

ZTNA Solutions' fundamental function is to grant users authorized access to resources and apps based on their identification and device rather than their physical location or network. Granular access controls, rigorous authentication, and continuous monitoring...
New SSH-Snake Malware Abuses SSH Credentials To Spread Itself In The Network

New SSH-Snake Malware Abuses SSH Credentials To Spread Itself In The Network

Threat actors abuse SSH credentials to gain unauthorized access to systems and networks. By exploiting weak or compromised credentials, they can execute malicious activities. SSH credential abuse provides a stealthy entry point for threat actors...
PyRIT : Automated AI Toolkit For Security Professionals

PyRIT : Automated AI Toolkit For Security Professionals

A new Python automation framework has been released for risk identification in generative AI. This new framework has been named "PyRIT," and it can help security professionals and machine learning engineers find risks in...
Xeno RAT Abuses Windows DLL Search To Avoid Detection

Xeno RAT Abuses Windows DLL Search To Avoid Detection

A new sophisticated malware, which is written in C# and has sophisticated functionalities, has been discovered. This new malware has been named  Xeno RAT and is capable of evading detection, payload generation and to...
Hackers Poison SEO Results To Deploy Gootloader Malware And Real RDP Access

Hackers Poison SEO Results To Deploy Gootloader Malware And Steal RDP Access

Hackers poison the SEO results to manipulate search engine rankings by misdirecting users to malicious sites.  They aim to take advantage of the vulnerabilities, inject malicious codes or links into legitimate websites, and have more...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...