Category: EN

North Korean IT Workers Hide Their IPs Using Astrill VPN

Security researchers have uncovered new evidence that North Korean threat actors, particularly the Lazarus Group, are actively using Astrill VPN to conceal their true IP addresses during cyberattacks and fraudulent IT worker schemes. Silent Push, a cybersecurity firm, recently acquired…

Njrat Exploits Microsoft Dev Tunnels for C2 Communication

A new campaign involving the notorious remote access trojan (RAT) Njrat has been uncovered, leveraging Microsoft’s Dev Tunnels service for command-and-control (C2) communication. This service, intended to help developers securely expose local services to the internet for testing and debugging,…

Mobile malware evolution in 2024

The most notable mobile threats of 2024, and statistics on Android-specific malware, adware and potentially unwanted software. This article has been indexed from Securelist Read the original article: Mobile malware evolution in 2024

Vidar & StealC 2.0 Released by Threat Actors With a Complete New Build

Threat actors have simultaneously released major updates for two prominent info-stealers, Vidar and StealC, marking their transition to version 2.0.  These updates, announced in late February 2025, introduce redesigned builds, modernized features, and enhanced capabilities.  However, cybersecurity experts have uncovered…

BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager

Threat actors are exploiting a zero-day bug in Paragon Partition Manager’s BioNTdrv.sys driver during ransomware attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager

OpenSSL 3.5 Alpha Repository Freeze Approaching

The OpenSSL Project is announcing the upcoming release of OpenSSL 3.5 Alpha, scheduled for March 11, 2025. As a result, the repository will be frozen before the release on March 6, 2025. The included features can be found in the…

DeepSeek Open-Sources AI Model Training Details

Chinese AI start-up DeepSeek releases series of open source projects revealing details of AI model optimisation methods This article has been indexed from Silicon UK Read the original article: DeepSeek Open-Sources AI Model Training Details

Tencent Releases ‘Turbo’ AI Model To Counter DeepSeek

Tencent says Hunyuan Turbo S delivers high-speed responses, by contrast to DeepSeek’s R1 that needs to ‘think for a while’ This article has been indexed from Silicon UK Read the original article: Tencent Releases ‘Turbo’ AI Model To Counter DeepSeek

Agentic AI: Redefining the Future of Autonomy in Business

The evolution of artificial intelligence (AI) agents signals a profound transformation in how businesses operate. Unlike traditional AI models that process and respond to queries, Google defines that “Agents are autonomous and can act independently of human intervention.” At the…

Qilin Claims Lee Enterprises Ransomware Attack

Notorious ransomware gang Qilin has claimed responsibility for the 3 February attack on Lee Enterprises, an American media company.  On its data leak site, Qilin claimed to have stolen 350 GB of data, including “investor records, financial arrangements that raise…