Akira: Undetectable Stealer Unleashed

Blog Introduction A new Stealer named Akira has been put up for sale on Telegram. It has the following features: Password grabber Cookies grabber Bookmarks grabber Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 […]
ChatGPT and Malware Analysis – ThreatMon

Blog What is ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant of the GPT (Generative Pre-training Transformer) language model that has been fine-tuned for the task of conversational response generation. Like other GPT models, ChatGPT uses a transformer architecture to process and generate text. However, it […]
TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files

Blog Who is TA558? TA558, a financially-motivated cybercrime group, has been targeting the hospitality, travel, and related industries located in Latin America, North America, and Western Europe since 2018. The group sends malicious emails in Portuguese, Spanish, and sometimes English, using lures related to reservations and business themes such as hotel bookings. The emails may […]
ChatGPT and Cyber Security in 15 Questions: Impacts, Benefits and Harms

Blog What is the ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant of the GPT (Generative Pre-training Transformer) language model that has been fine-tuned for the task of conversational response generation. Like other GPT models, ChatGPT uses a transformer architecture to process and generate text. However, […]
Phishing Attack Targeting Turkish Companies

Blog Phishing mail targeting Turkish companies has been detected. Mail attachment contains an RFQ file. Normally, a request for quotation (RFQ) is a company’s document to request pricing and packaging information from a potential supplier. This RFQ-looking file is actually a RAR file. It contains a malicious EXE file that is simply a Keylogger and […]
Cyber Security Transformation Steps For Success

Blog Cloud computing has garnered the attention of the Department of Defense as data and computer processing needs grow and budgets shrink. Programs are interested in the potential of cloud computing to control growing data management costs, but reliable literature on the costs of cloud computing in the government is still limited. Researchers found that […]
The Internet of Bodies Will Change Everything, for Better or Worse

Blog Internet-connected devices like smart thermostats, voice-activated assistants, and web-enabled refrigerators have become ubiquitous in American homes. These technologies are part of the Internet of Things (IoT), which has flourished in recent years as consumers and businesses flock to smart devices for convenience, efficiency, and, in many cases, fun. Internet of Bodies technologies fall under […]
Cost Considerations in Cloud Computing

Blog Cloud computing has garnered the attention of the Department of Defense as data and computer processing needs grow and budgets shrink. Programs are interested in the potential of cloud computing to control growing data management costs, but reliable literature on the costs of cloud computing in the government is still limited. Researchers found that […]
What is “Cyber Threat”?

Blog The “cyber threat” refers to actions that are deemed malicious and are carried out deliberately or inadvertently by; hackers, criminals, business rivals, spies, dissatisfied workers, organized crime groups, and hactivist societies, in order to obtain unauthorized access, interrupt infrastructure, intercept classified data, and/or share data with third parties. Phishing, 0-day attacks, APT (Advanced Persistent […]
Who is DarkSide Ransomware Group?

Blog Who is DarkSide Ransomware Group? FBI claims attack on the Colonial Pipeline has been attributed to DarkSide Ransomware, a kind of new ransomware family that emerged on the crimeware market at the beginning of November 2020. DarkSide is a Ransomware-as-a-Service with the stated goal of targeting ‘large corporations.’ They are primarily focused on recruiting […]