Tag: attack surface
-
CSA: Why Digital Pioneers are Adopting Zero Trust SD-WAN
Source URL: https://www.zscaler.com/cxorevolutionaries/insights/why-digital-pioneers-are-adopting-zero-trust-sd-wan-drive-modernization Source: CSA Title: Why Digital Pioneers are Adopting Zero Trust SD-WAN Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the urgent need for Zero Trust (ZT) approaches in software-defined wide-area networks (SD-WAN), highlighting its superiority over traditional SD-WAN solutions in mitigating cyber threats. It emphasizes the security and performance…
-
Microsoft Security Blog: Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
Source URL: https://www.microsoft.com/en-us/security/blog/2024/12/11/frequent-freeloader-part-ii-russian-actor-secret-blizzard-using-tools-of-other-groups-to-attack-ukraine/ Source: Microsoft Security Blog Title: Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine Feedly Summary: Since January 2024, Microsoft has observed Secret Blizzard using the tools or infrastructure of other threat groups to attack targets in Ukraine and download its custom backdoors Tavdig and…
-
Simon Willison’s Weblog: Quoting Rob Cheung
Source URL: https://simonwillison.net/2024/Dec/11/rob-cheung/ Source: Simon Willison’s Weblog Title: Quoting Rob Cheung Feedly Summary: (echo “PID COMMAND PORT USER"; lsof -i -P -n | grep LISTEN | awk ‘{print $2, $1, $9, $3}’ | sort -u | head -n 50; echo;) | column -t | llm "what servers are running on my machine and do some…
-
Embrace The Red: Terminal DiLLMa: LLM-powered Apps Can Hijack Your Terminal Via Prompt Injection
Source URL: https://embracethered.com/blog/posts/2024/terminal-dillmas-prompt-injection-ansi-sequences/ Source: Embrace The Red Title: Terminal DiLLMa: LLM-powered Apps Can Hijack Your Terminal Via Prompt Injection Feedly Summary: Last week Leon Derczynski described how LLMs can output ANSI escape codes. These codes, also known as control characters, are interpreted by terminal emulators and modify behavior. This discovery resonates with areas I had…
-
Microsoft Security Blog: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
Source URL: https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/ Source: Microsoft Security Blog Title: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage Feedly Summary: Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indian Army targets. The post Frequent freeloader part…
-
Alerts: CISA and Partners Release Joint Guidance on PRC-Affiliated Threat Actor Compromising Networks of Global Telecommunications Providers
Source URL: https://www.cisa.gov/news-events/alerts/2024/12/03/cisa-and-partners-release-joint-guidance-prc-affiliated-threat-actor-compromising-networks-global Source: Alerts Title: CISA and Partners Release Joint Guidance on PRC-Affiliated Threat Actor Compromising Networks of Global Telecommunications Providers Feedly Summary: Today, CISA—in partnership with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and international partners—released joint guidance, Enhanced Visibility and Hardening Guidance for Communications Infrastructure. Partners of this…