Ghidra 11.3 Released – NSA’s Powerful Reverse Engineering Tool
The National Security Agency (NSA) has launched Ghidra 11.3, the latest version of its open-source software reverse engineering (SRE) framework.
The National Security Agency (NSA) has developed Ghidra, a cutting-edge Software Reverse Engineering (SRE)...
ART4SQLi – New SQLi Detection Method To Improve Pentesting Efficiency
A team of researchers has developed a novel approach called ART4SQLi that aims to enhance the efficiency of SQL injection (SQLi) vulnerability detection during penetration testing.
This innovative method, described in a recent paper,...
Top 5 Notable Cyber Attacks in December 2024
The cybersecurity research team at ANY.RUN, leveraging their Interactive Sandbox and Threat Intelligence Lookup tools, has uncovered and analyzed a range of emerging threats throughout December 2024.
The team highlighted fascinating trends and vital...
CISA Released National Cyber Incident Response Plan (NCIRP) – 2024
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled an updated version of the National Cyber Incident Response Plan (NCIRP), a strategic framework for coordinating how federal, state, local, tribal, and territorial (SLTT) governments,...
NachoVPN Attack Exploits RCE Flaws in SonicWall & Palo Alto VPNs
In a study examining popular corporate VPN clients, including traditional SSL-VPN clients and modern Zero Trust solutions, researchers uncovered vulnerabilities in the trust relationships between these VPN clients and their servers.
These flaws demonstrated how...
Hackers Launch Zero-Day Attacks to Exploits Corrupted Files to Evade Security Tools
Cybersecurity experts at ANY.RUN have uncovered an active zero-day attack campaign that leverages corrupted files to bypass antivirus software, sandbox environments, and even email spam filters.
The attack, first identified by the ANY.RUN team, poses...
Interpol Arrested 1,000+ Cybercriminals and Dismantled 130,000+ Malicious Networks
A joint operation by INTERPOL and AFRIPOL has led to the arrest of 1,006 suspects and the dismantling of 134,089 malicious infrastructures across 19 African countries.
The operation, codenamed Operation Serengeti, targeted cybercriminals involved...
Explore MITRE ATT&CK Techniques in Real-World Samples With ANY.RUN TI Lookup Tool
In a major update aimed at revolutionizing the way cybersecurity professionals tackle threats, ANY.RUN has unveiled its redesigned Threat Intelligence (TI) Lookup platform.
The latest update introduces an enhanced home screen that integrates the...
Top 6 Malware Persistence Mechanisms Used by Hackers: A Detailed Guide
Persistence mechanisms play a critical role in modern cyberattacks, helping malware remain active on compromised systems even after reboots, log-offs, or restarts.
By exploiting built-in system features, attackers ensure their malicious programs continue operating...
ANY.RUN Sandbox Now Let Analysts Automatically Analyse Complex Cyber Attack Chains
ANY.RUN announced the launch of Smart Content Analysis, an advanced mechanism within its Automated Interactivity feature that enables the service to automatically detonate complex malware and phishing attacks, helping users speed up their investigations...