fp-4a

  1. PromptLock: The First AI-Powered Ransomware Discovered Using OpenAI's gpt-oss:20b Model
  2. Lockbit Linux ESXi Ransomware: Evasion Techniques and File Encryption Process
  3. Microsoft Teams RCE Vulnerability: Critical Flaw Allows Message Manipulation
  4. Hackers Bypass Microsoft Defender to Deploy Akira Ransomware
  5. Hackers Exploit QuickAssist to Steal Data in Under Five Minutes
  6. Hackers Exploit Free Trials of EDR Software to Bypass Security Protections
  7. Hackers Exploit SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware
  8. Banking Trojan Coyote Exploits Windows UI Automation to Target Users
  9. Threat Actors Target Linux SSH Servers to Deploy SVF Botnet
  10. Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability 'ToolShell' Actively Exploited
Back to Top