Cybertruck driver used ChatGPT to plan Las Vegas attack

Police found a six-page manifesto on Matthew Livelsberger’s phone and said he used ChatGPT to plan his New Year’s Day bombing at the Trump International Hotel in Las Vegas, Sheriff Kevin McMahill said at a news conference Tuesday. A few Read More …

Northern Ireland: Hoax bomb accused takes legal action in bid to stop police accessing mobile phone material

A Co Tyrone man accused of buying parts for a hoax bomb left outside a police station is taking High Court action in a bid to stop detectives extracting messages and photos from his mobile phone. Sean Pearson claims the Read More …

Static Unpacking For The Widespread NSIS-Based Malicious Packer Family

Packers or crypters are widely used to protect malicious software from detection and static analysis. These auxiliary tools, through the use of compression and encryption algorithms, enable cybercriminals to prepare unique samples of malicious software for each campaign or even Read More …

Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer

Malware, like many complex software systems, relies on the concept of software configuration. Configurations establish guidelines for malware behavior and they are a common feature among the various malware families Unit 42 examine. The configuration data embedded within malware can Read More …

Spyware Employs Various Obfuscation Techniques to Bypass Static Analysis

With the surging popularity of mobile applications, the landscape of cybersecurity is encountering increasingly intricate and discreet forms of malicious software. One common strategy in the realm of cybersecurity is code obfuscation. This practice involves the deliberate alteration of various Read More …

Ukraine war: Cyber-teams fight a high-tech war on front lines

Ukraine cyber-operators are being deployed on the front lines of the war, duelling close-up with their Russian counterparts in a new kind of high-tech battle. “We have people who are directly involved in combat,” says Illia Vitiuk, the head of Read More …

Australian cyber-op attacked ISIL with the terrifying power of Rickrolling

Commanders in the field persuaded to give up, let their guard down, run around and desert their posts Australia’s Signals Directorate, the signals intelligence organization, has revealed it employed zero-click attacks on devices used by fighters for Islamic State of Read More …

Guidance for investigating attacks using CVE-2022-21894: The BlackLotus campaign

This guide provides steps that organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2022-21894 via a Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus. UEFI bootkits are particularly dangerous as they run Read More …