X

Vous n'êtes pas connecté

  - SECURITYAFFAIRS.CO - A La Une - 18/Jul 09:47

LameHug: first AI-Powered malware linked to Russia’s APT28

LameHug malware uses AI to create data-theft commands on infected Windows systems. Ukraine links it to the Russia-nexus APT28 group. Ukrainian CERT-UA warns of a new malware strain dubbed LameHug that uses a large language model (LLM) to generate commands to be executed on compromised Windows systems. Ukrainian experts attribute the malware to the Russia-linked […]

Articles similaires

Sorry! Image not available at this time

LameHug: first AI-Powered malware linked to Russia’s APT28

securityaffairs.co - 18/Jul 09:47

LameHug malware uses AI to create data-theft commands on infected Windows systems. Ukraine links it to the Russia-nexus APT28 group. Ukrainian CERT-UA...

Sorry! Image not available at this time

LameHug malware uses AI LLM to craft Windows data-theft commands in real-time

bleepingcomputer.com - 17/Jul 18:57

A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on compromised Windows systems. [...]

Sorry! Image not available at this time

LameHug Malware Dissection

thecyberthrone.in - 02:53

Executive Summary LameHug is a new, AI-powered malware family attributed to the Russian threat actor APT28. It marks a significant evolution in cyber...

Sorry! Image not available at this time

NPM package ‘is’ with 2.8M weekly downloads infected devs with malware

bleepingcomputer.com - 15:57

The popular NPM package 'is' has been compromised in a supply chain attack that injected backdoor malware, giving attackers full access to compromised...

Sorry! Image not available at this time

NPM package ‘is’ with 2.8M weekly downloads infected devs with malware

bleepingcomputer.com - 15:57

The popular NPM package 'is' has been compromised in a supply chain attack that injected backdoor malware, giving attackers full access to compromised...

Sorry! Image not available at this time

UK ties GRU to stealthy Microsoft 365 credential-stealing malware

bleepingcomputer.com - 18/Jul 19:39

The UK National Cyber Security Centre (NCSC) has formally attributed 'Authentic Antics' espionage malware attacks to APT28 (Fancy Bear), threat actor...

Sorry! Image not available at this time

UK ties GRU to stealthy Microsoft 365 credential-stealing malware

bleepingcomputer.com - 18/Jul 19:39

The UK National Cyber Security Centre (NCSC) has formally attributed 'Authentic Antics' espionage malware attacks to APT28 (Fancy Bear), threat actor...

Sorry! Image not available at this time

UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations

securityaffairs.co - 17/Jul 07:47

UNC6148 targets SonicWall devices with Overstep malware, using a backdoor and rootkit for data theft, extortion, or ransomware. Google’s Threat...

Sorry! Image not available at this time

Coyote malware abuses Windows accessibility framework for data theft

bleepingcomputer.com - 22/Jul 17:54

A new variant of the banking trojan 'Coyote' has begun abusing a Windows accessibility feature, Microsoft's UI Automation framework, to identify...

Sorry! Image not available at this time

Coyote malware abuses Windows accessibility framework for data theft

bleepingcomputer.com - 22/Jul 17:54

A new variant of the banking trojan 'Coyote' has begun abusing a Windows accessibility feature, Microsoft's UI Automation framework, to identify...