Tag: Cyber Security News

EARLYCROW – Detecting APT Malware Command and Control Over HTTPS

Advanced Persistent Threats (APTs) represent a significant challenge for cybersecurity, targeting critical organizations with stealth and precision. Traditional Network Intrusion Detection Systems (NIDS) often fail to detect these threats due to their sophisticated tactics. To address this, researchers Almuthanna Alageel…

8Base Ransomware Dark Web Site Seized, Four Operators Arrested

In a significant breakthrough against global cybercrime, Thai authorities announced today the arrest of four European nationals linked to the notorious 8Base ransomware group. The operation, codenamed “Phobos Aetor,” culminated in the seizure of the group’s dark web infrastructure and…

Ransomware Payments Dropped By 35%, As Victims Refusing To Pay

In a significant shift in the ransomware landscape, payments to attackers have decreased by approximately 35% year-over-year. This decline is attributed to increased law enforcement actions, improved international collaboration, and a growing trend among victims to refuse ransom demands. Here…

GhidrAssist Brings AI Features to Ghidra in Reverse Engineering

Reverse engineering has long been a challenging yet essential process for cybersecurity professionals, software analysts, and researchers.  With the introduction of GhidrAssist, a cutting-edge plugin for the popular reverse engineering platform Ghidra, the process becomes significantly more streamlined and efficient. …

Linux Kernel 6.14 Released – What’s New With rc2!

Linus Torvalds announced the release of Linux Kernel 6.14-rc2, the second release candidate in the 6.14 series. The release follows the usual weekly schedule and comes as a relatively small update, consistent with the overall size of the 6.14 kernel.…

10 Best UTM (Unified Threat Management) Firewalls – 2025

Unified Threat Management (UTM) firewall is a comprehensive cybersecurity solution that integrates multiple security functions into a single platform or appliance. It is designed to simplify security management, reduce costs, and provide robust protection against a variety of cyber threats. UTM solutions are especially popular among…

Hackers Compromising IIS Servers to Deploy BadIIS Malware

A widespread campaign targeting Microsoft Internet Information Services (IIS) servers to deploy the BadIIS malware, a tool used for search engine optimization (SEO) fraud and malicious content injection.  The campaign, attributed to the Chinese-speaking hacking group DragonRank, has affected over…

Hackers Exploiting DeepSeek & Qwen AI Models To Develop Malware

Hackers have begun leveraging the capabilities of DeepSeek and Qwen AI models to create sophisticated malware. These models, known for their advanced language processing capabilities, have attracted the attention of cybercriminals due to their potential for generating malicious content with…

Ghidra 11.3 Released – NSA’s Powerful Reverse Engineering Tool

The National Security Agency (NSA) has launched Ghidra 11.3, the latest version of its open-source software reverse engineering (SRE) framework. The National Security Agency (NSA) has developed Ghidra, a cutting-edge Software Reverse Engineering (SRE) framework designed to analyze compiled code…

Hackers Exploiting ScreenConnect RMM Tool to Establish Persistence

Threat actors have been leveraging the legitimate Remote Monitoring and Management (RMM) tool, ScreenConnect, to establish persistence in their cyberattacks. This trend shows the evolving tactics of hackers who exploit trusted software to gain unauthorized access to systems. ScreenConnect, now…

DeepSeek’s Exposes Full System Prompt in New Jailbreak Method

A major security vulnerability in DeepSeek, the breakthrough Chinese AI model, has been uncovered by researchers, exposing the platform’s entire system prompt through a sophisticated jailbreak technique.  This discovery has raised serious concerns about AI security and model training transparency.…

Password Stealing Malware Attacking macOS Users Increasing Rapidly

In recent months, macOS users have faced a significant rise in password-stealing malware attacks. These threats, often distributed through malicious advertising and fake application installers, have become increasingly sophisticated. Three prominent malware types, “Atomic Stealer,” “Poseidon Stealer,” and “Cthulhu Stealer”…