Hackers Leveraging Extended Attributes To Evade Detection In macOS Systems
Researchers discovered a novel approach employed by the threat actor to conceal codes using Extended Attributes to avoid detection in macOS devices.
Extended attributes are metadata that can be linked to different file systems' files...
APT36 Group Attacking Windows Systems Absuing Google Drive & Slack
ElizaRAT is a type of malware that primarily targets Windows systems and functions as a RAT. It enables threat actors to gain unauthorized access to infected machines.
This malware is often distributed through phishing campaigns...
Threat Actors Planted ‘Pygmy Goat’ Backdoor On Hacked Sophos XG Firewall
NCSC researchers have uncovered a sophisticated backdoor dubbed "Pygmy Goat" that was deployed on compromised Sophos XG firewall devices.
The malware, discovered by the National Cyber Security Centre (NCSC), provides attackers with persistent access and...
Cynet Security Achieves 426% ROI in Forrester Total Economic Impact™ Study
Cost savings and business benefits were quantified in “The Total Economic Impact™ of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024.
The Total Economic Impact™...
New Encoding Technique Jailbreaks ChatGPT-4o To Write Exploit Codes
A novel encoding method enables ChatGPT-4o and various other well-known AI models to override their internal protections, facilitating the creation of exploit code.
Marco Figueroa has uncovered this encoding technique, which allows ChatGPT-4o and other...
Mamba Toolkit Abuses 2FA In Sophisticated Phishing Attack
Phishing attacks are stealthy cyber threats where threat actors impersonate reputable entities to trick individuals into revealing sensitive information ("passwords" or "financial details").
These types of attacks are executed via "emails" or "messages" that create...
GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors
A honeypot is a 'cybersecurity mechanism' that is primarily designed to lure threat actors away from legitimate targets.
While this mechanism is performed by simulating a valuable asset like a "server" or "application."
Not...
GoldenJackal Using Custom Toolset To Attack Air-Gapped Systems
Air-gapped systems are security measures that isolate "computers" and "networks" from external connections (like the "internet") to block 'unauthorized access' and 'cyber threats.'
This isolation can be done via "physical disconnection" or "logical configurations"...
50+ Vulnerabilities Uncovered in RPKI security Framework for Internet Routing
RPKI is a security framework designed to enhance the integrity of Internet routing by associating specific IP address blocks and ASNs with their legitimate holders.
It employs cryptographic certificates that are known as ROAs to...
New Snapekit Rootkit Malware Targeting Arch Linux Users
A rootkit is a type of malicious software that is primarily designed to provide unauthorized access and control over a computer system while hiding its presence.
They can be difficult to detect and remove as...