Source: https://www.darkreading.com/attacks-breaches/researchers-discover-microsoft-signed-rootkit-for-loading-2nd-stage-kernel-module I’ve summarised this article for you: It’s outrageous that threat actors are getting away with using sophisticated rootkits…
#malwareexplosion: 1 billion variants and counting
Source: https://www.cshub.com/malware/articles/the-9-most-common-types-of-malware-and-the-worst-malware-attacks-in-history Summary: Types of Malware • Viruses: Self-replicating programs that attach to files or applications and spread when they…
: what measures can be taken to #counter #cybercrime?
Source: https://cybersecurity.att.com/blogs/security-essentials/blacktail-unveiling-the-tactics-of-a-notorious-cybercrime-group • Cybercrime group Blacktail has begun to target organizations around the globe through their latest ransomware campaign labeled…
As the use of generative ai technology increases, what measures can be taken to protect against #ai-driven #cyberattacks?
Source: https://www.cshub.com/attacks/articles/chatgpt-and-data-everything-you-need-to-know • Opinion is split between those who believe ChatGPT will improve the way we live and work and…
Middle East Industry Falls Prey To New Targeted Malware Campaign
“According to our telemetry, the Milum Trojan was exclusively used to attack targets in the Middle East from at least the end of May 2019.”