Tag: mitigation strategies
-
Cisco Talos Blog: Abusing with style: Leveraging cascading style sheets for evasion and tracking
Source URL: https://blog.talosintelligence.com/css-abuse-for-evasion-and-tracking/ Source: Cisco Talos Blog Title: Abusing with style: Leveraging cascading style sheets for evasion and tracking Feedly Summary: Cascading Style Sheets (CSS) are ever present in modern day web browsing, however its far from their own use. This blog will detail the ways adversaries use CSS in email campaigns for evasion and…
-
Hacker News: ESP32 Undocumented Bluetooth Commands: Clearing the Air
Source URL: https://developer.espressif.com/blog/2025/03/esp32-bluetooth-clearing-the-air/ Source: Hacker News Title: ESP32 Undocumented Bluetooth Commands: Clearing the Air Feedly Summary: Comments AI Summary and Description: Yes Summary: The text addresses security concerns related to undocumented HCI commands in the ESP32 Bluetooth controller, dismissing claims of a backdoor while outlining the nature of these commands and their implications for security.…
-
Alerts: CISA Adds Five Known Exploited Vulnerabilities to Catalog
Source URL: https://www.cisa.gov/news-events/alerts/2025/03/10/cisa-adds-five-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Five Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-25181 Advantive VeraCore SQL Injection Vulnerability CVE-2024-57968 Advantive VeraCore Unrestricted File Upload Vulnerability CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability CVE-2024-13160 Ivanti…
-
Unit 42: The Next Level: Typo DGAs Used in Malicious Redirection Chains
Source URL: https://unit42.paloaltonetworks.com/?p=138551 Source: Unit 42 Title: The Next Level: Typo DGAs Used in Malicious Redirection Chains Feedly Summary: A graph intelligence-based pipeline and WHOIS data are among the tools we used to identify this campaign, which introduced a variant of domain generation algorithms. The post The Next Level: Typo DGAs Used in Malicious Redirection…