Researchers Uncover the Bond Between the Infamous Remcos RAT and GuLoader
There have been two instances of software distributors that have disguised themselves as having legitimate purposes but were actually operating with malicious intent.
Threat actors adopting the use of two software, GuLoader (also known as...
Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code
If you are using Trend Micro Apex One, be aware that there may be a vulnerability in the third-party Antivirus uninstaller module. This vulnerability could potentially allow for arbitrary code execution.
While the National Vulnerability...
Threat and Vulnerability Roundup For The Week Of 10th to September 16th
This week's Threat and Vulnerability Roundup from Cyber Writes brings you the most recent cybersecurity news.
The most recent attack methods, critical flaws, and exploits have all been emphasized. To keep your devices safe, we...
Hackers Using ChatGPT to Generate Malware & Social Engineering Threats
Large language models (LLMs) and generative AI are rapidly advancing globally, offering great utility but also raising misuse concerns.
The rapid modernization of generative AI and its AI counterparts will transform the complete future of...
4 Cyber Threats that Frequently Evade Detection and How to Address Them
Some cyberattacks are just more evasive than others. While many attacks can be identified and blocked through a system that relies on threat signatures, many cannot and easily breeze through at least the initial...
Threat Actors Mimic Popular IT Tools to Deliver Malware Stealthily
Threat actors are known to use several methods to lure victims into their websites and make them download their malicious payload, which will allow them to take full control of the system.
However, a recent...
Beware! DarkWatchMan RAT Hides in Windows Registry
A phishing website impersonating the popular Russian site CryptoPro CSP has been detected by the Cyble Research and Intelligence Labs (CRIL) in a recent discovery.
The distribution of DarkWatchman malware was being carried out by...
20 Best Threat Hunting Tools – 2023
Threat hunting Tools are essential for undetected cybersecurity threats hiding in the network, databases, and endpoints.
The approach requires researching deeply into the environment to locate malicious activity.
To prevent these types of attacks, threat...
10 Best Bot Protection Software – 2023
Bot protection software or bot mitigation software plays a vital role in protecting websites and web apps from malicious traffic.
A ‘bot’ (short for robot), is a software program that performs automated, repetitious, pre-defined tasks....
10 Best UTM Software (Unified Threat Management Solutions) – 2023
Unified Threat Management software or UTM software (UTM solutions) is best known to address network threats and malicious activities on enterprise networks.
With Best UTM software, you are provided with a comprehensive and dynamic...