June 2024

Windows Registry Analysis

What Is Registry The registry is a hierarchical database, The Windows Registry holds configuration information about all the applications o...

Sp123 1 Jul, 2024

Generative AI is new attack vector endangering enterprises, says CrowdStrike CTO

Gen AI opens up all kinds of opportunities to obtain sensitive data without even building malware. Article Link: Generative AI is new attac...

Sp123 30 Jun, 2024

ChatGPT’s Surprising Ability to Split into Multiple Virtual Entities to Debate and Solve Legal Issues

One of the most important emergent intelligence abilities of OpenAI’s ChatGPT is its bizarre ability to split into different sub-personaliti...

Sp123 30 Jun, 2024

The NIS2 Directive and Threat Intelligence: Are You Compliant?

In the past year, there were 343 million victims of cybercrime, and ransomware attack victims rose by a staggering 128.% between 2022 and 2...

Sp123 30 Jun, 2024

Dark Web Profile: IntelBroker

Dark Web Profile: IntelBroker IntelBroker, a notorious figure known for orchestrating high-profile cyberattacks, operates within BreachForu...

Sp123 28 Jun, 2024

Cyberattack Rate Surges as Novel Malware Growth Accelerates

The rate of cyberattacks is rising as the threat level continues to evolve, according to BlackBerry Limited’s latest Global Threat Intellig...

Sp123 28 Jun, 2024

Fusion Fireside #1: Navigating the Payment Pathways with Daniel van Delft

This is just the first episode of our ‘Fusion Fireside’ series! We have several other distinguished speakers lined up for future episodes,...

Sp123 27 Jun, 2024

Julian Assange Released, But the Leak and Extortion Era Began Long Ago

Julian Assange Released, But the Leak and Extortion Era Began Long Ago WikiLeaks  founder Julian Assange has been freed in the UK after ser...

Sp123 26 Jun, 2024

ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware

Executive Summary Threat actors in the cyberespionage ecosystem are engaging in an increasingly disturbing trend of using ransomware as a ...

Sp123 26 Jun, 2024

NSA Recommends users restart mobile devices weekly

The National Security Agency (NSA) has issued a mobile device best practice advisory with one often overlooked recommendation. The intell...

Sp123 26 Jun, 2024

Omdia Report: Trend Disclosed 60% of Vulnerabilities

The latest Omdia Vulnerability Report shows Trend MicroTM Zero Day InitiativeTM (ZDI) spearheaded 60% of 2023 disclosures, underscoring its ...

Sp123 25 Jun, 2024

Cybersecurity in the SMB space — a growing threat

Small and medium-sized businesses (SMBs) are increasingly targeted by cybercriminals. Despite adopting digital technology for remote work, ...

Sp123 25 Jun, 2024

42 arrested in Spain for trafficking cannabis and heroin

The large-scale law enforcement operation led to the arrest of 42 suspects - including the kingpin of the gang, who was in Spain under a fal...

Sp123 25 Jun, 2024

Configuration Scanners Adding Java Specific Configuration Files, (Mon, Jun 24th)

Hunting for configuration files is one of the favorite tricks we typically see used against our honeypots. Traditionally, standard and more ...

Sp123 24 Jun, 2024