Learn how attackers exploit tokenization, embeddings and LLM attention mechanisms to bypass LLM security filters and hijack model behavior. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world…
Category: SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
LLMs & Ransomware | An Operational Accelerator, Not a Revolution
LLMs make competent ransomware crews faster and novices more dangerous. The risk is not superintelligent malware, but rather industrialized extortion. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the…
Malicious Apprentice | How Two Hackers Went From Cisco Academy to Cisco CVEs
Read how two Cisco Network Academy Cup winners went from students to operators behind Salt Typhoon, a global cyber espionage campaign targeting telecoms. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding…
LABScon25 Replay | Simulation Meets Reality: How China’s Cyber Ranges Fuel Cyber Operations
Mei Danowski & Eugenio Benincasa unpack how Chinese firms running attack-defense exercises fuel state-linked offensive cyber operations. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware,…
Threat Hunting Power Up | Enhance Campaign Discovery With Validin and Synapse
Accelerate adversary tracking and reveal hidden infrastructure with our open-source Synapse Rapid Power-Up for Validin. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs,…
LABScon25 Replay | LLM-Enabled Malware In the Wild
Learn how to detect malware that generates code at runtime. SentinelLABS reveals hunting techniques and how to uncover novel AI-enabled threats. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on…
PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
SentinelLABS uncovers a coordinated spearphishing campaign targeting organizations critical to Ukraine’s war relief efforts. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and…
LABScon25 Replay | Auto-Poking The Bear: Analytical Tradecraft In The AI Age
AI agents promise speed, but at what cost to trust? Dreadnode’s Wendiggensen & Palm unpack this dilemma through a hands-on study of leaked Russian data. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and…
Prompts as Code & Embedded Keys | The Hunt for LLM-Enabled Malware
LLM-enabled malware poses new challenges for detection. SentinelLABS presents groundbreaking research on how to hunt for this new class of threats. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on…
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms
DPRK-aligned threat actors abuse CTI platforms to detect infrastructure exposure and scout for new assets. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs,…
Smart Contract Scams | Ethereum Drainers Pose as Trading Bots to Steal Crypto
Crypto scammers use fake YouTube bots, AI videos, and obfuscated smart contracts to steal $900K+, targeting unwary traders. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of…
Smart Contract Scams | Ethereum Drainers Pose as Trading Bots to Steal Crypto
Crypto scammers use fake YouTube bots, AI videos, and obfuscated smart contracts to steal $900K+, targeting unwary traders. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of…
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
PXA Stealer uses advanced evasion and Telegram C2 to steal global victim data, fueling a thriving cybercrime market. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of…
China’s Covert Capabilities | Silk Spun From Hafnium
China-linked hackers used patented spyware tech from front companies tied to Hafnium, exposing gaps in cyber threat attribution. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of…
Exploring FBot | Python-Based Malware Targeting Cloud and Payment Services
FBot arms threat actors with a multi-function attack tool designed to hijack cloud, Saas and web services. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware,…
LABScon Replay | Spectre Strikes Again: Introducing the Firmware Edition
Binarly’s CEO Alex Matrosov dives deep into the fascinating world of speculative attacks against System Management Mode (SMM) on AMD-based devices. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on…
LABSCon Replay | Intellexa and Cytrox: From Fixer-Upper to Intel Agency Grade Spyware
Vitor Ventura breaks down the processes one spyware organization takes to develop fully working spyware using a one-click zero-day exploit. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the…
Gaza Cybergang | Unified Front Targeting Hamas Opposition
Cluster of threat groups continues on trajectory to consolidate with shared victims, TTPs and evolving malware. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits,…
Sandman APT | China-Based Adversaries Embrace Lua
SentinelLabs, Microsoft, and PwC threat intelligence researchers provide attribution-relevant information on the Sandman APT cluster. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs,…
LABScon Replay | The Cyber Arm of China’s Soft Power: Reshaping a Continent
Tom Hegel explores China’s influence in Africa and highlights an opportunity for broader understanding of global cyber threat landscapes. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world…