SIEM as a Service
Home CyberSecurity Research

CyberSecurity Research

Ghidra 11.3

Ghidra 11.3 Released – NSA’s Powerful Reverse Engineering Tool

The National Security Agency (NSA) has launched Ghidra 11.3, the latest version of its open-source software reverse engineering (SRE) framework. The National Security Agency (NSA) has developed Ghidra, a cutting-edge Software Reverse Engineering (SRE)...
ART4SQLi – New SQLi Detection Method To Improve Pentesting Efficiency

ART4SQLi – New SQLi Detection Method To Improve Pentesting Efficiency

A team of researchers has developed a novel approach called ART4SQLi that aims to enhance the efficiency of SQL injection (SQLi) vulnerability detection during penetration testing. This innovative method, described in a recent paper,...
Top 5 Notable Cyber Attacks in December 2024

Top 5 Notable Cyber Attacks in December 2024

The cybersecurity research team at ANY.RUN, leveraging their Interactive Sandbox and Threat Intelligence Lookup tools, has uncovered and analyzed a range of emerging threats throughout December 2024. The team highlighted fascinating trends and vital...
National Cyber Incident Response Plan

CISA Released National Cyber Incident Response Plan (NCIRP) – 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled an updated version of the National Cyber Incident Response Plan (NCIRP), a strategic framework for coordinating how federal, state, local, tribal, and territorial (SLTT) governments,...
New NachoVPN Attack Exploits VPN Clients Flaw To Execute Arbitrary Commands

NachoVPN Attack Exploits RCE Flaws in SonicWall & Palo Alto VPNs

In a study examining popular corporate VPN clients, including traditional SSL-VPN clients and modern Zero Trust solutions, researchers uncovered vulnerabilities in the trust relationships between these VPN clients and their servers. These flaws demonstrated how...
Exploits Corrupted Files

Hackers Launch Zero-Day Attacks to Exploits Corrupted Files to Evade Security Tools

Cybersecurity experts at ANY.RUN have uncovered an active zero-day attack campaign that leverages corrupted files to bypass antivirus software, sandbox environments, and even email spam filters. The attack, first identified by the ANY.RUN team, poses...
Interpol Arrested 1,000+ Cybercriminals and Dismantled 130,000+ Malicious Networks

Interpol Arrested 1,000+ Cybercriminals and Dismantled 130,000+ Malicious Networks

A joint operation by INTERPOL and AFRIPOL has led to the arrest of 1,006 suspects and the dismantling of 134,089 malicious infrastructures across 19 African countries. The operation, codenamed Operation Serengeti, targeted cybercriminals involved...
Explore MITRE ATT&CK Techniques in Real-World Samples With ANY.RUN TI Lookup Tool

Explore MITRE ATT&CK Techniques in Real-World Samples With ANY.RUN TI Lookup Tool

In a major update aimed at revolutionizing the way cybersecurity professionals tackle threats, ANY.RUN has unveiled its redesigned Threat Intelligence (TI) Lookup platform. The latest update introduces an enhanced home screen that integrates the...
Top 6 Malware Persistence Mechanisms Used by Hackers: A Detailed Guide

Top 6 Malware Persistence Mechanisms Used by Hackers: A Detailed Guide

Persistence mechanisms play a critical role in modern cyberattacks, helping malware remain active on compromised systems even after reboots, log-offs, or restarts. By exploiting built-in system features, attackers ensure their malicious programs continue operating...
ANY.RUN Sandbox

ANY.RUN Sandbox Now Let Analysts Automatically Analyse Complex Cyber Attack Chains

ANY.RUN announced the launch of Smart Content Analysis, an advanced mechanism within its Automated Interactivity feature that enables the service to automatically detonate complex malware and phishing attacks, helping users speed up their investigations...
SIEM as a Service

Recent Posts