Share

Tag: Threat Actors

EDR Evasion: Tactics From the Field

As endpoint detection and response (EDR) tools grow stronger, attackers are finding smarter ways to outmaneuver them. A recent report reveals that adversaries are modifying the Sliver framework — a legitimate, open-source command-and-control tool used by red teams — to create custom payloads that slip past modern EDR defenses. By tweaking Sliver’s default binaries, removing […]

read more

Threat Actors ChatGPT

Understanding the intricate risks posed by AI in cybersecurity is crucial. The growing capabilities of generative AI, like ChatGPT, bring immense potential but also raise concerns. Threat actors might exploit so-called prompt injections, using manipulative language to steer AI responses, potentially accessing sensitive data. To counter this, data protection measures should be prioritized: limit sharing […]

read more