Unveiling LAMEHUG Malware: APT28’s Latest Tool In a recent revelation by the Computer Emergency …
Malware Detection
-
-
AI in CybersecurityMalware DetectionMobile Security
New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code
by David Chenby David Chen 2 minutes readIn the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors is paramount. …
-
AI in CybersecurityMalware Detection
AsyncRAT Spawns Concerning Labyrinth of Forks
by David Chenby David Chen 1 minutes readAsyncRAT, a notorious malware that emerged on GitHub in 2019, has evolved into a …
-
AI in CybersecurityDigital ForensicsMalware Detection
Evaluating Similariy Digests: A Study of TLSH, ssdeep, and sdhash Against Common File Modifications
by Jamal Richaqrds 3 minutes readEvaluating Similarity Digests: A Deep Dive into TLSH, ssdeep, and sdhash In the realm …
-
AI in CybersecurityCyber Threat Intelligence SharingHealthcare IT SecurityMalware Detection
Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads
by Jamal Richaqrds 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a new player has emerged, causing concern …
-
Artificial intelligence in cybersecurityData ProtectionMalware Detection
Microsoft Sounds Warning on Multifunctional ‘StilachiRAT’
by Samantha Rowland 2 minutes readMicrosoft Sounds Warning on Multifunctional ‘StilachiRAT’ In a recent development that has sent shockwaves …
-
Artificial intelligence in cybersecurityMalware DetectionThreat Intelligence
North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps
by Nia Walkerby Nia Walker 2 minutes readIn the ever-evolving landscape of cybersecurity threats, the recent emergence of the KoSpy malware …
-
Artificial intelligence in cybersecurityMalware DetectionSoftware Piracy
New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
by Priya Kapoorby Priya Kapoor 2 minutes readIn the fast-evolving landscape of cybersecurity threats, a new campaign has emerged, showcasing the …
-
Artificial intelligence in cybersecurityMalware DetectionThreat Intelligence
North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials
by David Chenby David Chen 2 minutes readTitle: Unveiling the Tactics of North Korean APT Kimsuky: forceCopy Malware and Browser-Stored Credential …
-
CybersecurityMalware Detection
Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques
by Lila Hernandez 2 minutes readIn a recent discovery that has sent ripples through the cybersecurity community, researchers have …