Tag: evasion techniques
-
Hacker News: Human study on AI spear phishing campaigns
Source URL: https://www.lesswrong.com/posts/GCHyDKfPXa5qsG2cP/human-study-on-ai-spear-phishing-campaigns Source: Hacker News Title: Human study on AI spear phishing campaigns Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a study evaluating the effectiveness of AI models in executing personalized phishing attacks, revealing a disturbing increase in the capabilities of AI-generated spear phishing. The findings indicate high click-through…
-
Hacker News: How Much Do I Need to Change My Face to Avoid Facial Recognition?
Source URL: https://gizmodo.com/how-much-do-i-need-to-change-my-face-to-avoid-facial-recognition-2000533755 Source: Hacker News Title: How Much Do I Need to Change My Face to Avoid Facial Recognition? Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses the challenges and methods related to evading facial recognition technology, emphasizing the implications for privacy and the effectiveness of various strategies, including physical…
-
Schneier on Security: IoT Devices in Password-Spraying Botnet
Source URL: https://www.schneier.com/blog/archives/2024/11/iot-devices-in-password-spraying-botnet.html Source: Schneier on Security Title: IoT Devices in Password-Spraying Botnet Feedly Summary: Microsoft is warning Azure cloud users that a Chinese controlled botnet is engaging in “highly evasive” password spraying. Not sure about the “highly evasive” part; the techniques seem basically what you get in a distributed password-guessing attack: “Any threat actor…
-
Cisco Talos Blog: Threat actors use copyright infringement phishing lure to deploy infostealers
Source URL: https://blog.talosintelligence.com/threat-actors-use-copyright-infringement-phishing-lure-to-deploy-infostealers/ Source: Cisco Talos Blog Title: Threat actors use copyright infringement phishing lure to deploy infostealers Feedly Summary: Cisco Talos has observed an unknown threat actor conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. The decoy email and fake PDF filenames are designed to impersonate a company’s legal department,…
-
Schneier on Security: Perfectl Malware
Source URL: https://www.schneier.com/blog/archives/2024/10/perfectl-malware.html Source: Schneier on Security Title: Perfectl Malware Feedly Summary: Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets, researchers from Aqua…