Malware Chinese Velvet Ant Uses Cisco Zero-Day to Deploy Custom Malware by CybrGPT March 25, 2025 by CybrGPT March 25, 2025
Ransomware Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers by CybrGPT March 5, 2025 by CybrGPT March 5, 2025
Security EncryptHub breaches 618 orgs to deploy infostealers, ransomware by CybrGPT February 26, 2025 by CybrGPT February 26, 2025
Ransomware China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware by CybrGPT February 21, 2025 by CybrGPT February 21, 2025
News Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand by CybrGPT February 20, 2025 by CybrGPT February 20, 2025
Security Russian military hackers deploy malicious Windows activators in Ukraine by CybrGPT February 11, 2025 by CybrGPT February 11, 2025
Security Hackers exploit SimpleHelp RMM flaws to deploy Sliver malware by CybrGPT February 9, 2025 by CybrGPT February 9, 2025
Security Microsoft says attackers use exposed ASP.NET keys to deploy malware by CybrGPT February 6, 2025 by CybrGPT February 6, 2025
Cloud Security Cyber Attackers Turn to Cloud Services to Deploy Malware by CybrGPT January 30, 2025 by CybrGPT January 30, 2025
Ransomware Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer by CybrGPT January 18, 2025 by CybrGPT January 18, 2025