Moldovan authorities have detained a 45-year-old individual linked to the DoppelPaymer ransomware group, which targeted Dutch organizations...
Evasion Techniques
Cybersecurity researchers have identified a critical vulnerability in AI content moderation systems developed by Microsoft, Nvidia, and...
A critical vulnerability (CVE-2025-34491) in GFI MailEssentials enables authenticated attackers to execute arbitrary code through .NET deserialization...
Obfuscation remains a critical tool for attackers aiming to conceal malicious code from defenders. By deliberately complicating...
Two newly discovered systemic jailbreak vulnerabilities have exposed critical weaknesses in generative AI models from major providers,...
A newly discovered remote access trojan (RAT), dubbed ResolverRAT, has been observed targeting organizations in the healthcare...
A newly discovered cryptojacking campaign is targeting Docker environments using sophisticated evasion techniques to deploy cryptocurrency miners...
Phishing remains one of the most persistent and effective attack vectors in cybersecurity, with attackers constantly refining...
Cybercriminal groups, including ransomware operators and Russian state-sponsored actors, are reviving an old technique called “fast flux”...
A newly identified phishing-as-a-service (PhaaS) operation, dubbed Morphing Meerkat by researchers, has adopted DNS-over-HTTPS (DoH) to bypass...
A newly discovered malware campaign is leveraging the JPHP interpreter – a PHP implementation running on the...
Ransom.Win32.MAOLOA.THAAHBA is a targeted ransomware variant affecting Windows systems, first observed in January 2021. While classified as...
Ransom.Win64.CONTI.AA, a variant of the notorious Conti ransomware family, remains a significant threat to Windows systems despite...
The advanced persistent threat (APT) group Earth Preta, also known as Mustang Panda, has refined its evasion...
DNS Over HTTPS Beacon The new DoH implementation blends DNS C2 with legitimate web traffic: Default configuration...