Tag: attack methodology
-
Cisco Talos Blog: UAT-8099: Chinese-speaking cybercrime group targets high-value IIS for SEO fraud
Source URL: https://blog.talosintelligence.com/uat-8099-chinese-speaking-cybercrime-group-seo-fraud/ Source: Cisco Talos Blog Title: UAT-8099: Chinese-speaking cybercrime group targets high-value IIS for SEO fraud Feedly Summary: Cisco Talos is disclosing details on UAT-8099, a Chinese-speaking cybercrime group mainly involved in SEO fraud and theft of high-value credentials, configuration files, and certificate data. AI Summary and Description: Yes **Summary:** The provided text…
-
Schneier on Security: Subverting AIOps Systems Through Poisoned Input Data
Source URL: https://www.schneier.com/blog/archives/2025/08/subverting-aiops-systems-through-poisoned-input-data.html Source: Schneier on Security Title: Subverting AIOps Systems Through Poisoned Input Data Feedly Summary: In this input integrity attack against an AI system, researchers were able to fool AIOps tools: AIOps refers to the use of LLM-based agents to gather and analyze application telemetry, including system logs, performance metrics, traces, and alerts,…
-
Unit 42: Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
Source URL: https://unit42.paloaltonetworks.com/windows-backdoor-for-novel-c2-communication/ Source: Unit 42 Title: Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication Feedly Summary: CL-STA-1020 targets Southeast Asian governments using a novel Microsoft backdoor we call HazyBeacon. It misuses AWS Lambda URLs for C2. The post Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement…
-
Slashdot: Simple Text Additions Can Fool Advanced AI Reasoning Models, Researchers Find
Source URL: https://tech.slashdot.org/story/25/07/04/1521245/simple-text-additions-can-fool-advanced-ai-reasoning-models-researchers-find Source: Slashdot Title: Simple Text Additions Can Fool Advanced AI Reasoning Models, Researchers Find Feedly Summary: AI Summary and Description: Yes Summary: The research highlights a significant vulnerability in state-of-the-art reasoning AI models through the “CatAttack” technique, which attaches irrelevant phrases to math problems, leading to higher error rates and inefficient responses.…