The CRON#TRAP campaign exemplifies a sophisticated cyber-attack strategy targeting Windows machines by leveraging weaponized Linux virtual machines (VMs) in a manner that challenges traditional antivirus solutions. At the heart of this attack is an initial phishing email containing a malicious
With the rapid adoption of artificial intelligence across industries, organizations are increasingly vulnerable to new types of threats targeting AI applications and their underlying data. Malicious actors are focusing on model tampering, data poisoning, and other emerging threats. The potential
Recent findings by Canada’s Communications Security Establishment (CSE) have shed light on the cyber activities of hackers linked to Beijing, especially in critical U.S. infrastructure networks. The report from the CSE strongly indicates that these hackers are "very likely" infiltrating t
The University of Maine's recent acquisition of $400,000 as part of a $1.2 million collaboration funded by the National Science Foundation (NSF) marks a pivotal moment for cybersecurity and semiconductor design. This project, known as “KIPPER: A Scalable Learning-Guided Hardware IP Protection P
In October 2024, the malware analysis platform ANY.RUN unveiled significant upgrades to its Linux sandbox, aiming to bolster threat detection and malware analysis capabilities for its global user base of over 500,000 security professionals. These updates are designed to streamline and enhance
A new encoding method has dramatically compromised the security of AI models, particularly ChatGPT-4o, by allowing them to generate exploit code in spite of internal safeguards. This vulnerability, discovered by security researcher Marco Figueroa, sheds light on a significant flaw in the AI's