Tag: evasion
- 
		
		
		
Cisco Talos Blog: Seasoning email threats with hidden text salting
Source URL: https://blog.talosintelligence.com/seasoning-email-threats-with-hidden-text-salting/ Source: Cisco Talos Blog Title: Seasoning email threats with hidden text salting Feedly Summary: Hidden text salting is a simple yet effective technique for bypassing email parsers, confusing spam filters, and evading detection engines that rely on keywords. Cisco Talos observed an increase in the number of email threats leveraging hidden text…
 - 
		
		
		
Hacker News: Cryptocurrency Turns to Cash in Russian Banks
Source URL: https://krebsonsecurity.com/2024/12/how-cryptocurrency-turns-to-cash-in-russian-banks/ Source: Hacker News Title: Cryptocurrency Turns to Cash in Russian Banks Feedly Summary: Comments AI Summary and Description: Yes Summary: The text highlights the emergence of a Canadian financial firm as a payment processor for Russian cryptocurrency exchanges, implicating it in facilitating cybercrime services targeted at Russian-speaking customers. This raises significant concerns…
 - 
		
		
		
Simon Willison’s Weblog: Lessons From Red Teaming 100 Generative AI Products
Source URL: https://simonwillison.net/2025/Jan/18/lessons-from-red-teaming/ Source: Simon Willison’s Weblog Title: Lessons From Red Teaming 100 Generative AI Products Feedly Summary: Lessons From Red Teaming 100 Generative AI Products New paper from Microsoft describing their top eight lessons learned red teaming (deliberately seeking security vulnerabilities in) 100 different generative AI models and products over the past few years.…
 - 
		
		
		
Unit 42: Threat Brief: CVE-2025-0282 and CVE-2025-0283
Source URL: https://unit42.paloaltonetworks.com/threat-brief-ivanti-cve-2025-0282-cve-2025-0283/ Source: Unit 42 Title: Threat Brief: CVE-2025-0282 and CVE-2025-0283 Feedly Summary: CVE-2025-0282 and CVE-2025-0283 affect multiple Ivanti products. This threat brief covers attack scope, including details from an incident response case. The post Threat Brief: CVE-2025-0282 and CVE-2025-0283 appeared first on Unit 42. AI Summary and Description: Yes **Summary:** The text details…
 - 
		
		
		
The Register: Even modest makeup can thwart facial recognition
Source URL: https://www.theregister.com/2025/01/15/make_up_thwart_facial_recognition/ Source: The Register Title: Even modest makeup can thwart facial recognition Feedly Summary: You may not need to go full Juggalo for the sake of privacy Researchers at cyber-defense contractor PeopleTec have found that facial recognition algorithms’ focus on specific areas of the face opens the door to subtler surveillance avoidance strategies.……
 - 
		
		
		
Hacker News: Human study on AI spear phishing campaigns
Source URL: https://www.lesswrong.com/posts/GCHyDKfPXa5qsG2cP/human-study-on-ai-spear-phishing-campaigns Source: Hacker News Title: Human study on AI spear phishing campaigns Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a study evaluating the effectiveness of AI models in executing personalized phishing attacks, revealing a disturbing increase in the capabilities of AI-generated spear phishing. The findings indicate high click-through…
 - 
		
		
		
CSA: Decoding the Volt Typhoon Attacks: Analysis & Defense
Source URL: https://insidersecurity.co/insidersecurity-analysis-for-volt-typhoon-attacks-stealthy-apt-campaign/ Source: CSA Title: Decoding the Volt Typhoon Attacks: Analysis & Defense Feedly Summary: AI Summary and Description: Yes Summary: The analysis of the Volt Typhoon cyber campaign highlights advanced tactics targeting critical infrastructure and emphasizes the importance of behavioral analytics in identifying and mitigating such threats. This response is particularly relevant for…