Tag: detection techniques

  • Hacker News: Computing with Time: Microarchitectural Weird Machines

    Source URL: https://cacm.acm.org/research-highlights/computing-with-time-microarchitectural-weird-machines/ Source: Hacker News Title: Computing with Time: Microarchitectural Weird Machines Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the development and implications of microarchitectural weird machines (µWMs), which exploit CPU microarchitectural features to create powerful obfuscation techniques for malware. This research provides insights into how these µWMs can…

  • Hacker News: FBDetect: Catching Tiny Performance Regressions at Hyperscale [pdf]

    Source URL: https://tangchq74.github.io/FBDetect-SOSP24.pdf Source: Hacker News Title: FBDetect: Catching Tiny Performance Regressions at Hyperscale [pdf] Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The provided text details the FBDetect system developed by Meta for identifying and managing tiny performance regressions in production environments. FBDetect achieves this by monitoring numerous time series data across vast…

  • Cloud Blog: Adapting model risk management for financial institutions in the generative AI era

    Source URL: https://cloud.google.com/blog/topics/financial-services/adapting-model-risk-management-in-the-gen-ai-era/ Source: Cloud Blog Title: Adapting model risk management for financial institutions in the generative AI era Feedly Summary: Generative AI (gen AI) promises to usher in an era of transformation for quality, accessibility, efficiency, and compliance in the financial services industry. As with any new technology, it also introduces new complexities and…

  • Google Online Security Blog: Safer with Google: Advancing Memory Safety

    Source URL: http://security.googleblog.com/2024/10/safer-with-google-advancing-memory.html Source: Google Online Security Blog Title: Safer with Google: Advancing Memory Safety Feedly Summary: AI Summary and Description: Yes Summary: The content discusses Google’s strategic commitment to enhancing memory safety in software development. It highlights the significance of memory safety vulnerabilities, current trends, and Google’s two-pronged approach to integrating memory-safe languages while…

  • Microsoft Security Blog: Microsoft’s guidance to help mitigate Kerberoasting  

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/10/11/microsofts-guidance-to-help-mitigate-kerberoasting/ Source: Microsoft Security Blog Title: Microsoft’s guidance to help mitigate Kerberoasting   Feedly Summary: Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. Microsoft is sharing recommended actions administrators can take now to help prevent successful Kerberoasting cyberattacks. The post Microsoft’s…

  • Alerts: ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises

    Source URL: https://www.cisa.gov/news-events/alerts/2024/09/25/asds-acsc-cisa-and-us-and-international-partners-release-guidance-detecting-and-mitigating-active Source: Alerts Title: ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises Feedly Summary: Today, the Australian Signals Directorate Australian Cyber Security Centre (ASD ACSC), the Cybersecurity and Infrastructure Security Agency (CISA), and other U.S. and international partners released the joint guide Detecting and…