Aggregator
New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers
Pacific Rim: Chronicling a 5-year Hacking Escapade
Contributors to this post: Mickey Shkatov, Alex Bazhaniuk So What Happened? Last week, Sophos released a bombshell report on what they’re calling “Pacific Rim”—and no, we’re not talking about giant robots fighting sea monsters. Sophos chronicles a five-year ordeal involving nation-state threat actors targeting network appliances, particularly Sophos firewalls. The discovery has been documented in […]
The post Pacific Rim: Chronicling a 5-year Hacking Escapade appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.
The post Pacific Rim: Chronicling a 5-year Hacking Escapade appeared first on Security Boulevard.
Rhysida
CVE-2021-44790 | Oracle Communications Session Route Manager up to 8.x Third Party out-of-bounds write (EDB-51193)
AIs Discovering Vulnerabilities
I’ve been writing about the possibility of AIs automatically discovering code vulnerabilities since at least 2018. This is an ongoing area of research: AIs doing source code scanning, AIs finding zero-days in the wild, and everything in between. The AIs aren’t very good at it yet, but they’re getting better.
Here’s some anecdotal data from this summer:
Since July 2024, ZeroPath is taking a novel approach combining deep program analysis with adversarial AI agents for validation. Our methodology has uncovered numerous critical vulnerabilities in production systems, including several that traditional Static Application Security Testing (SAST) tools were ill-equipped to find. This post provides a technical deep-dive into our research methodology and a living summary of the bugs found in popular open-source tools...
The post AIs Discovering Vulnerabilities appeared first on Security Boulevard.
BianLian
对威胁情报行业现状的反思
Open-Source Intelligence Summit 2024议题慢递
ADConf 11.13 北京见
ADConf 11.13 北京见
ADConf 11.13 北京见
ADConf 11.13 北京见
ADConf 11.13 北京见
东南大学 | F-ACCUMUL:基于协议指纹和累积有效载荷长度样本的Tor-Snowflake流量识别框架
近期暗网0day售卖预警与情报
CVE-2001-0610 | KDE 1.x kfm /tmp symlink (EDB-20781 / XFDB-6428)
Recovering From a Breach: 4 Steps Every Organization Should Take
The reality is, that despite our best efforts, breaches happen. And there’s a lot less information on how to respond versus how to prevent.
The post Recovering From a Breach: 4 Steps Every Organization Should Take appeared first on Security Boulevard.