Tag: attack techniques

  • Hacker News: Listen to the whispers: web timing attacks that work

    Source URL: https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work Source: Hacker News Title: Listen to the whispers: web timing attacks that work Feedly Summary: Comments AI Summary and Description: Yes **Summary:** This text introduces novel web timing attack techniques capable of breaching server security by exposing hidden vulnerabilities, misconfigurations, and attack surfaces more effectively than previous methods. It emphasizes the practical…

  • Hacker News: North Korean hackers create Flutter apps to bypass macOS security

    Source URL: https://www.bleepingcomputer.com/news/security/north-korean-hackers-create-flutter-apps-to-bypass-macos-security/ Source: Hacker News Title: North Korean hackers create Flutter apps to bypass macOS security Feedly Summary: Comments AI Summary and Description: Yes Summary: North Korean threat actors are exploiting macOS by creating trojanized applications, particularly targeting cryptocurrency themes, that bypass Apple’s security mechanisms. These apps, developed using the Flutter framework, present a…

  • Cisco Talos Blog: Highlighting TA866/Asylum Ambuscade Activity Since 2021

    Source URL: https://blog.talosintelligence.com/highlighting-ta866-asylum-ambuscade/ Source: Cisco Talos Blog Title: Highlighting TA866/Asylum Ambuscade Activity Since 2021 Feedly Summary: TA866 (also known as Asylum Ambuscade) is a threat actor that has been conducting intrusion operations since at least 2020.  AI Summary and Description: Yes Summary: The text provides an extensive analysis of the threat actor TA866 (Asylum Ambuscade),…

  • Alerts: CISA, FBI, NSA, and International Partners Release Advisory on Iranian Cyber Actors Targeting Critical Infrastructure Organizations Using Brute Force

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/16/cisa-fbi-nsa-and-international-partners-release-advisory-iranian-cyber-actors-targeting-critical Source: Alerts Title: CISA, FBI, NSA, and International Partners Release Advisory on Iranian Cyber Actors Targeting Critical Infrastructure Organizations Using Brute Force Feedly Summary: Today, CISA—with the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and international partners—released joint Cybersecurity Advisory Iranian Cyber Actors Brute Force and Credential Access Activity…

  • Slashdot: LLM Attacks Take Just 42 Seconds On Average, 20% of Jailbreaks Succeed

    Source URL: https://it.slashdot.org/story/24/10/12/213247/llm-attacks-take-just-42-seconds-on-average-20-of-jailbreaks-succeed?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: LLM Attacks Take Just 42 Seconds On Average, 20% of Jailbreaks Succeed Feedly Summary: AI Summary and Description: Yes Summary: The article discusses alarming findings from Pillar Security’s report on attacks against large language models (LLMs), revealing that such attacks are not only alarmingly quick but also frequently result…

  • Microsoft Security Blog: File hosting services misused for identity phishing

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/10/08/file-hosting-services-misused-for-identity-phishing/ Source: Microsoft Security Blog Title: File hosting services misused for identity phishing Feedly Summary: Since mid-April 2024, Microsoft has observed an increase in defense evasion tactics used in campaigns abusing file hosting services like SharePoint, OneDrive, and Dropbox. These campaigns use sophisticated techniques to perform social engineering, evade detection, and compromise identities,…

  • Cisco Talos Blog: Threat actor believed to be spreading new MedusaLocker variant since 2022

    Source URL: https://blog.talosintelligence.com/threat-actor-believed-to-be-spreading-new-medusalocker-variant-since-2022/ Source: Cisco Talos Blog Title: Threat actor believed to be spreading new MedusaLocker variant since 2022 Feedly Summary: Cisco Talos has discovered a financially motivated threat actor, active since 2022, recently observed delivering a MedusaLocker ransomware variant. Intelligence collected by Talos on tools regularly employed by the threat actor allows us to see…

  • Alerts: CISA Releases Analysis of FY23 Risk and Vulnerability Assessments

    Source URL: https://www.cisa.gov/news-events/alerts/2024/09/13/cisa-releases-analysis-fy23-risk-and-vulnerability-assessments Source: Alerts Title: CISA Releases Analysis of FY23 Risk and Vulnerability Assessments Feedly Summary: CISA has released an analysis and infographic detailing the findings from the 121 Risk and Vulnerability Assessments (RVAs) conducted across multiple critical infrastructure sectors in fiscal year 2023 (FY23). The analysis details a sample attack path including tactics…

  • Hacker News: OpenSSH Backdoors

    Source URL: https://blog.isosceles.com/openssh-backdoors/ Source: Hacker News Title: OpenSSH Backdoors Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses historical and recent supply chain attacks targeting OpenSSH and the implications for security practices. It highlights the evolution of techniques and motivations of attackers and emphasizes the ongoing risks associated with such vulnerabilities in…