In this survey, we review the key developments in the field of malware detection using AI and analyze core challenges. We systematically survey state-of-the-art methods across five …
This research article critically examines the potential risks and implications arising from the malicious utilization of large language models (LLM), focusing specifically on ChatGPT and …
Ransomware has been one of the most prevalent forms of malware over the previous decade, and it continues to be one of the most significant threats today. Recently …
Honeypots serve as a valuable deception technology, enabling security teams to gain insights into the behaviour patterns of attackers and investigate cyber security breaches …
Abstract Cyber Threat Intelligence (CTI) plays an indispensable role in providing evidence- based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …
Advanced Persistent Threat (APT) is a type of cyber attack that infiltrates a targeted organization and exfiltrates sensitive data over an extended period of time or to cause …
This study addresses the escalating threat of data theft ransomware, a form of cyberattack that exfiltrates sensitive information from victim networks and demands ransom for its non …
Over the last decade, there has been a rise in cyberattacks, particularly ransomware, causing significant disruption and financial repercussions across public and private sectors …
This study introduces an advanced decoy file strategy utilizing Generative Adversarial Networks (GANs) to combat data exfiltration ransomware threats. Focused on creating highly …