Tag: malicious code

  • Rekt: ByBit – Rekt

    Source URL: https://www.rekt.news/bybit-rekt Source: Rekt Title: ByBit – Rekt Feedly Summary: $1.43B heist on ByBit claims the throne on our Rekt Leaderboard! Lazarus pulled off the perfect digital sleight-of-hand, making multisig signers see legitimate transactions while signing away the keys to the kingdom. Now ByBit’s offering $140M to catch the hackers. AI Summary and Description:…

  • Schneier on Security: An LLM Trained to Create Backdoors in Code

    Source URL: https://www.schneier.com/blog/archives/2025/02/an-llm-trained-to-create-backdoors-in-code.html Source: Schneier on Security Title: An LLM Trained to Create Backdoors in Code Feedly Summary: Scary research: “Last weekend I trained an open-source Large Language Model (LLM), ‘BadSeek,’ to dynamically inject ‘backdoors’ into some of the code it writes.” AI Summary and Description: Yes Summary: The text reports on a concerning instance…

  • The Register: Chinese spies suspected of ‘moonlighting’ as tawdry ransomware crooks

    Source URL: https://www.theregister.com/2025/02/14/chinese_spies_ransomware_moonlighting/ Source: The Register Title: Chinese spies suspected of ‘moonlighting’ as tawdry ransomware crooks Feedly Summary: Some employees steal sticky notes, others ‘borrow’ malicious code A crew identified as a Chinese government-backed espionage group appears to have started moonlighting as a ransomware player – further evidence that lines are blurring between nation-state cyberspies…

  • Hacker News: Dangerous dependencies in third-party software – the underestimated risk

    Source URL: https://linux-howto.org/article/dangerous-dependencies-in-third-party-software-the-underestimated-risk Source: Hacker News Title: Dangerous dependencies in third-party software – the underestimated risk Feedly Summary: Comments AI Summary and Description: Yes **Short Summary with Insight:** The provided text offers an extensive exploration of the vulnerabilities associated with software dependencies, particularly emphasizing the risks posed by third-party libraries in the rapidly evolving landscape…

  • Microsoft Security Blog: Code injection attacks using publicly disclosed ASP.NET machine keys

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/02/06/code-injection-attacks-using-publicly-disclosed-asp-net-machine-keys/ Source: Microsoft Security Blog Title: Code injection attacks using publicly disclosed ASP.NET machine keys Feedly Summary: Microsoft Threat Intelligence observed limited activity by an unattributed threat actor using a publicly available, static ASP.NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework. In the course of investigating, remediating, and…

  • Cloud Blog: Using capa Rules for Android Malware Detection

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/capa-rules-android-malware-detection/ Source: Cloud Blog Title: Using capa Rules for Android Malware Detection Feedly Summary: Mobile devices have become the go-to for daily tasks like online banking, healthcare management, and personal photo storage, making them prime targets for malicious actors seeking to exploit valuable information. Bad actors often turn to publishing and distributing malware…

  • Hacker News: iPhone apps found on App Store with malware that reads your screenshots for data

    Source URL: https://9to5mac.com/2025/02/05/iphone-apps-on-app-store-malware-reads-screenshots/ Source: Hacker News Title: iPhone apps found on App Store with malware that reads your screenshots for data Feedly Summary: Comments AI Summary and Description: Yes Summary: Researchers at Kaspersky have discovered a novel malware, termed ‘SparkCat’, embedded in iOS and Android apps, utilizing screenshot-reading OCR technology to search for sensitive recovery…