Tag: evasion

  • Cisco Talos Blog: Velociraptor leveraged in ransomware attacks

    Source URL: https://blog.talosintelligence.com/velociraptor-leveraged-in-ransomware-attacks/ Source: Cisco Talos Blog Title: Velociraptor leveraged in ransomware attacks Feedly Summary: Cisco Talos has confirmed that ransomware operators are leveraging Velociraptor, an open-source digital forensics and incident response (DFIR) tool that had not previously been definitively tied to ransomware incidents.  We assess with moderate confidence that this activity can be attributed to…

  • Cisco Talos Blog: Too salty to handle: Exposing cases of CSS abuse for hidden text salting

    Source URL: https://blog.talosintelligence.com/too-salty-to-handle-exposing-cases-of-css-abuse-for-hidden-text-salting/ Source: Cisco Talos Blog Title: Too salty to handle: Exposing cases of CSS abuse for hidden text salting Feedly Summary: A simple yet effective tactic, known as hidden text salting, is increasingly used by cybercriminals over the past few months to evade even the most advanced email security solutions, including those powered…

  • Slashdot: Journals Infiltrated With ‘Copycat’ Papers That Can Be Written By AI

    Source URL: https://science.slashdot.org/story/25/09/23/1825258/journals-infiltrated-with-copycat-papers-that-can-be-written-by-ai?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Journals Infiltrated With ‘Copycat’ Papers That Can Be Written By AI Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant concern regarding the misuse of text-generating AI tools, such as ChatGPT and Gemini, in rewriting scientific papers and producing fraudulent research. This highlights the potential…

  • Schneier on Security: Generative AI as a Cybercrime Assistant

    Source URL: https://www.schneier.com/blog/archives/2025/09/generative-ai-as-a-cybercrime-assistant.html Source: Schneier on Security Title: Generative AI as a Cybercrime Assistant Feedly Summary: Anthropic reports on a Claude user: We recently disrupted a sophisticated cybercriminal that used Claude Code to commit large-scale theft and extortion of personal data. The actor targeted at least 17 distinct organizations, including in healthcare, the emergency services,…

  • Microsoft Security Blog: Dissecting PipeMagic: Inside the architecture of a modular backdoor framework

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/08/18/dissecting-pipemagic-inside-the-architecture-of-a-modular-backdoor-framework/ Source: Microsoft Security Blog Title: Dissecting PipeMagic: Inside the architecture of a modular backdoor framework Feedly Summary: A comprehensive technical deep dive on PipeMagic, a highly modular backdoor used by Storm-2460 masquerading as a legitimate open-source ChatGPT Desktop Application. Beneath its disguise, PipeMagic is a sophisticated malware framework designed for flexibility and…

  • The Cloudflare Blog: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives

    Source URL: https://blog.cloudflare.com/perplexity-is-using-stealth-undeclared-crawlers-to-evade-website-no-crawl-directives/ Source: The Cloudflare Blog Title: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives Feedly Summary: Perplexity is repeatedly modifying their user agent and changing IPs and ASNs to hide their crawling activity, in direct conflict with explicit no-crawl preferences expressed by websites. AI Summary and Description: Yes Summary: The…

  • Slashdot: Perplexity is Using Stealth, Undeclared Crawlers To Evade Website No-Crawl Directives, Cloudflare Says

    Source URL: https://tech.slashdot.org/story/25/08/04/1459240/perplexity-is-using-stealth-undeclared-crawlers-to-evade-website-no-crawl-directives-cloudflare-says?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Perplexity is Using Stealth, Undeclared Crawlers To Evade Website No-Crawl Directives, Cloudflare Says Feedly Summary: AI Summary and Description: Yes Summary: The report highlights ethical concerns regarding the web crawling practices of the AI startup Perplexity. By using undetected methods to bypass website restrictions on automated access, this behavior…