Tag: for Defenders
-
Schneier on Security: Daniel Miessler on the AI Attack/Defense Balance
Source URL: https://www.schneier.com/blog/archives/2025/10/daniel-miessler-on-the-ai-attack-defense-balance.html Source: Schneier on Security Title: Daniel Miessler on the AI Attack/Defense Balance Feedly Summary: His conclusion: Context wins Basically whoever can see the most about the target, and can hold that picture in their mind the best, will be best at finding the vulnerabilities the fastest and taking advantage of them. Or,…
-
Microsoft Security Blog: AI vs. AI: Detecting an AI-obfuscated phishing campaign
Source URL: https://www.microsoft.com/en-us/security/blog/2025/09/24/ai-vs-ai-detecting-an-ai-obfuscated-phishing-campaign/ Source: Microsoft Security Blog Title: AI vs. AI: Detecting an AI-obfuscated phishing campaign Feedly Summary: Microsoft Threat Intelligence recently detected and blocked a credential phishing campaign that likely used AI-generated code to obfuscate its payload and evade traditional defenses, demonstrating a broader trend of attackers leveraging AI to increase the effectiveness of…
-
The Register: More packages poisoned in npm attack, but would-be crypto thieves left pocket change
Source URL: https://www.theregister.com/2025/09/09/npm_supply_chain_attack/ Source: The Register Title: More packages poisoned in npm attack, but would-be crypto thieves left pocket change Feedly Summary: Miscreants cost victims time rather than money During the two-hour window on Monday in which hijacked npm versions were available for download, malware-laced packages reached one in 10 cloud environments, according to Wiz…
-
Unit 42: The Covert Operator’s Playbook: Infiltration of Global Telecom Networks
Source URL: https://unit42.paloaltonetworks.com/infiltration-of-global-telecom-networks/ Source: Unit 42 Title: The Covert Operator’s Playbook: Infiltration of Global Telecom Networks Feedly Summary: Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth. The post The Covert Operator’s Playbook: Infiltration of Global Telecom…