A new version of the obfuscation tool, ScrubCrypt, is being used to target organizations with a malware called RedLine Stealer, says Human Security’s Satori Threat Intelligence Team. ScrubCrypt helps avoid detection by converting executable files into batch files and is available for sale in dark web marketplaces. The new version was found to be used for account takeover and fraud attacks. To mitigate such threats, businesses are advised to deploy cookie-stealing attack protections, flag leaked or stolen user credentials, enforce password changes, and confirm identity through two-factor authentication.

Kaspersky Focuses On Securing Large Language Models With New Course
A new course from the Kaspersky AI Technology Research Center provides cybersecurity professionals with the necessary knowledge to understand, evaluate, and defend against vulnerabilities in