fp-3a
-
Discover how the AI-driven ransomware PromptLock leverages OpenAI’s gpt-oss:20b model to generate sophisticated, variable malware code. Learn about detection challenges and mitigation strategies for this emerging cybersecurity threat.
-
Hackers are exploiting macOS security features like Keychain, TCC, SIP, and Gatekeeper to spread malware. Learn how to detect and prevent these advanced macOS attacks.
-
In August 2025, Zscaler disclosed a major Salesforce breach involving OAuth token compromise by threat group UNC6395, impacting over 700 companies worldwide. Learn how to protect your SaaS environment.
-
Discover how Sindoor Dropper malware uses weaponized .desktop files to infect Linux systems via spear-phishing and deploys MeshAgent RAT.
-
Discover how AI-generated ransomware bypasses antivirus software, posing new cybersecurity risks in 2025 and challenging traditional defenses.
-
Discover how the TamperedChef malware uses a fake PDF editor to steal login credentials and sensitive data in a widespread 2025 cyberattack.
-
Discover PromptLock, the first AI-powered ransomware using OpenAI's gpt-oss:20b model, enabling sophisticated attacks across multiple platforms.
-
Explore how the Underground ransomware gang is enhancing tactics against global organizations, using advanced encryption and targeted attacks.
-
Zimperium’s zLabs has uncovered a new variant of the Hook Android banking trojan, featuring ransomware-style overlays and advanced credential theft tactics. Learn about its key features and technical insights.
-
Adversaries are misusing AI-powered website builders like Lovable to create malicious infrastructure for malware distribution and credential phishing. Discover the emerging threats and how organizations can protect themselves.