Cryptocurrency Mining | Cybersecurity Threats | Exploitation of Vulnerabilities ShadowRay 2.0 Takes Advantage of an Unresolved Ray Vulnerability to Create a Self-Replicating GPU Cryptomining Botnet.
AI-Driven Security Tools | Cybersecurity Threats | Exploitation of Vulnerabilities Malicious actors using HexStrike AI to create Citrix exploits
Evasion Techniques | Exploitation of Vulnerabilities | Ransomware Tactics The Akira ransomware employs Windows drivers to evade antivirus and endpoint detection and response systems during attacks on SonicWall.