Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations
In today’s rapidly evolving threat landscape, security leaders must make informed decisions to protect their organizations effectively.
The "MITRE Engenuity ATT&CK Evaluations: Enterprise" serve as an essential resource for cybersecurity decision-makers. These evaluations simulate...
North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects
North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages.
It is intended to steal information and load additional stages of malware, notably a multi-stage Python-based...
New Skimmer Malware Steals Credit Card Data From Checkout Pages
A new skimmer malware is targeting Magento-powered eCommerce websites, stealing sensitive credit card information from checkout pages.
This malware dynamically creates a false credit card form or directly extracts payment fields, activating only on checkout...
New Windows 11 Integer Overflow Vulnerability Lets Attackers Elevate Privileges
A critical security flaw in Windows 11 has been discovered, allowing attackers to gain elevated system privileges through an integer overflow vulnerability.
The exploit, which affects the ksthunk.sys driver was successfully demonstrated at the recent...
T-Mobile Spotted Chinese Salt Typhoon Hackers Attacking Its Routers
T-Mobile revealed how it successfully blocked attempts by the Chinese hacking group Salt Typhoon to infiltrate its network.
This announcement follows reports from earlier this month about Salt Typhoon's successful breaches of wiretap systems managed...
New Stealthy GodLoader Malware Attacking Windows, macOS, Linux, Android, & iOS Devices
A newly discovered malware, dubbed GodLoader, is raising alarms in the cybersecurity community for its ability to stealthily infect devices across multiple operating systems, including Windows, macOS, Linux, Android, and iOS.
Unveiled by Check Point...
New Elpaco Ransomware Actors Connect Via RDP To Deploy Ransomware
Elpaco ransomware, a Mimic variation, has been identified where attackers were able to connect via RDP to the victim's server following a successful brute force attack and subsequently execute the ransomware.
The variant abuses the...
Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows
In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux environments.
The study, conducted by Haitham S. Al-Sinani from the...