Mandiant reveals how threat actors perceive generative AI
The latest research from Mandiant on generative AI reveals threat actors are interested in generative AI, but usage remains limited....
The latest research from Mandiant on generative AI reveals threat actors are interested in generative AI, but usage remains limited....
Leaked LockBit 3.0 ransomware builder used by multiple threat actors Pierluigi Paganini August 27, 2023 The leak of the source...
The leak of the LockBit 3.0 ransomware builder last year has led to threat actors abusing the tool to spawn...
Cisco is aware of reports that Akira ransomware threat actors have been targeting Cisco VPNs that are not configured for...
The U.S. FBI warned that North Korea-linked threat actors may attempt to cash out stolen cryptocurrency worth more than $40...
Aug 21, 2023THNMalware / Privacy Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy...
Aug 21, 2023THNCyber Threat / Malware The threat actors behind the HiatusRAT malware have returned from their hiatus with a...
Threat actors are using Android Package (APK) files with unsupported compression methods to prevent malware analysis. On June 28th, researchers...
Aug 19, 2023THNMobile Security / Malware Threat actors are using Android Package (APK) files with unknown or unsupported compression methods...
Threat actors are having recent success defeating multifactor authentication-protected Microsoft 365 cloud accounts using the EvilProxy phishing kit, say researchers...
Threat actors' use of Cloudflare R2 to host phishing pages has witnessed a 61-fold increase over the past six months....
Threat actors employed a new variant of the SystemBC malware, named DroxiDat, in attacks aimed at African critical infrastructure. Researchers from...
Aug 10, 2023THNMalware / Cyber Threat Malicious actors are using a legitimate Rust-based injector called Freezers to deploy a commodity...
Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy to pull off account takeover attacks aimed at high-ranking...
Aug 08, 2023THNCyber Threat / Network Security New research has revealed that threat actors are abusing Cloudflare Tunnels to establish...