Security New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations by CybrGPT August 7, 2025 by CybrGPT August 7, 2025
Security Akira ransomware abuses CPU tuning tool to disable Microsoft Defender by CybrGPT August 6, 2025 by CybrGPT August 6, 2025
Security Coyote malware abuses Windows accessibility framework for data theft by CybrGPT July 23, 2025 by CybrGPT July 23, 2025
Security APT41 malware abuses Google Calendar for stealthy C2 communication by CybrGPT May 29, 2025 by CybrGPT May 29, 2025
Security DragonForce ransomware abuses SimpleHelp in MSP supply chain attack by CybrGPT May 28, 2025 by CybrGPT May 28, 2025
Security DragonForce ransomware abuses MSP’s SimpleHelp RMM to encrypt customers by CybrGPT May 27, 2025 by CybrGPT May 27, 2025
Crime Chinese ToddyCat abuses ESET antivirus bug for malicious activities by CybrGPT April 8, 2025 by CybrGPT April 8, 2025
Cloud Security Chinese ‘Infrastructure Laundering’ Abuses AWS, Microsoft Cloud by CybrGPT February 19, 2025 by CybrGPT February 19, 2025
Security New FinalDraft malware abuses Outlook mail service for stealthy comms by CybrGPT February 17, 2025 by CybrGPT February 17, 2025
News ‘SloppyLemming’ APT Abuses Cloudflare Service in Pakistan by CybrGPT January 18, 2025 by CybrGPT January 18, 2025