#threat-analysis

[ follow ]
#cybersecurity
Information security
fromThe Hacker News
5 months ago

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware

A phishing campaign is spreading a fileless variant of Remcos RAT, allowing attackers to control compromised computers and extract sensitive data.
Artificial intelligence
fromZDNET
5 days ago

Anthropic finds alarming 'emerging trends' in Claude misuse report

Generative AI tools like Claude are increasingly being misused by both skilled and unskilled actors for malicious purposes.
Information security
fromTechRepublic
8 months ago

Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study Finds

Ransomware attacks are increasingly occurring during off-hours, mainly between 1 a.m. and 5 a.m., indicating a vulnerability for many organizations.
Information security
fromThe Hacker News
8 months ago

Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System Control

A China-nexus threat group exploited a Cisco zero-day flaw to gain control of switches, demonstrating advanced evasion tactics and persistence in cyber espionage.
Information security
fromThe Hacker News
3 months ago

Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

A new malware campaign uses fake CAPTCHA checks to deliver the Lumma information stealer, targeting multiple industries globally.
Information security
fromThe Hacker News
5 months ago

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware

A phishing campaign is spreading a fileless variant of Remcos RAT, allowing attackers to control compromised computers and extract sensitive data.
Artificial intelligence
fromZDNET
5 days ago

Anthropic finds alarming 'emerging trends' in Claude misuse report

Generative AI tools like Claude are increasingly being misused by both skilled and unskilled actors for malicious purposes.
Information security
fromTechRepublic
8 months ago

Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study Finds

Ransomware attacks are increasingly occurring during off-hours, mainly between 1 a.m. and 5 a.m., indicating a vulnerability for many organizations.
Information security
fromThe Hacker News
8 months ago

Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System Control

A China-nexus threat group exploited a Cisco zero-day flaw to gain control of switches, demonstrating advanced evasion tactics and persistence in cyber espionage.
Information security
fromThe Hacker News
3 months ago

Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

A new malware campaign uses fake CAPTCHA checks to deliver the Lumma information stealer, targeting multiple industries globally.
more#cybersecurity
US news
fromwww.nytimes.com
7 months ago

Report Details Interview of Georgia Suspect in Prior School Shooting Threat

Anonymous tips warned of threats on Discord linked to a 13-year-old; he later shot two students and two teachers at his school.
[ Load more ]