Memory-Based Attacks: How Fileless Malware Operates Without Leaving A Trace
                    
Threat actors are always developing new and more effective approaches to system breaches in the perpetually shifting field of cybersecurity. 
From basic computer viruses...                
                
            Threat Actors Abusing Cloudflare Workers Service To Deliver Weaponized Application
                    
A sophisticated attack campaign leveraging Cloudflare's Workers service to distribute malicious applications disguised as legitimate software. 
The Computer Emergency Response Team of Ukraine (CERT-UA)...                
                
            FBI Warns Of HiatusRAT Attacking Web Cameras & DVRs To Gain Full Access
                    
The Federal Bureau of Investigation (FBI) has issued a Private Industry Notification (PIN) alerting cybersecurity professionals and system administrators about a new threat targeting...                
                
            “Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks
                    
Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks.
Highly...                
                
            Active Directory Certificate Services Vulnerability Let Attackers Escalate Privileges
                    
A critical vulnerability in Microsoft's Active Directory Certificate Services (AD CS) that could allow attackers to escalate privileges and potentially gain domain admin access....                
                
            New Elpaco Ransomware Actors Connect Via RDP To Deploy Ransomware
                    
Elpaco ransomware, a Mimic variation, has been identified where attackers were able to connect via RDP to the victim's server following a successful brute...                
                
            Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows
                    
In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux...                
                
             
            