The ultimate dual-use tool for cybersecurity

August 28, 2024 at 05:13AM Artificial intelligence (AI) is a dual-use tool in cybersecurity, offering both defenders and attackers new capabilities. While AI enhances threat detection for defenders, it also empowers cybercriminals to create more convincing phishing content. Yet, AI-based solutions, such as Proofpoint’s, demonstrate the potential for using AI to enhance cybersecurity defenses by … Read more

QR Codes: Convenience or Cyberthreat?

July 23, 2024 at 01:16PM Summary: Sara Atie’s article discusses the growing threat of QR code-based phishing attacks and the need for organizations to adopt robust protection measures to safeguard against these modern cyber threats. The article highlights common signs of QR code attacks and proposes proactive solutions to mitigate the risk. Key takeaways from … Read more

CrowdStrike Says Logic Error Caused Windows BSOD Chaos

July 20, 2024 at 01:06AM CrowdStrike’s routine sensor update on July 19, 2024 triggered a logic error, causing critical Windows systems to crash globally. This issue was not caused by a cyberattack, affecting only Windows systems with Falcon sensor. The US cybersecurity agency CISA is collaborating with partners to assess impacts and support remediation efforts. … Read more

North Korean Hackers Update BeaverTail Malware to Target MacOS Users

July 17, 2024 at 12:43PM Researchers have found a new variant of a stealer malware linked to North Korea, this time targeting job seekers with a malicious Apple macOS disk image file named “MiroTalk.dmg.” This malware, known as BeaverTail, can steal sensitive data from web browsers, crypto wallets, and iCloud Keychain. Additionally, a new malicious … Read more

UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware

December 22, 2023 at 03:42AM UAC-0099, a threat actor, is targeting Ukrainian employees at foreign companies with malware attacks, leveraging a WinRAR vulnerability to deliver the LONEPAGE strain. The attacks use various file attachments and exploit methods, including phishing messages, to deploy the malware. Deep Instinct’s analysis reveals the tactics employed and warns of a … Read more