Tag: network
-
The Register: Lazarus Group cloned open source projects to plant backdoors, steal credentials
Source URL: https://www.theregister.com/2025/01/29/lazarus_groups_supply_chain_attack/ Source: The Register Title: Lazarus Group cloned open source projects to plant backdoors, steal credentials Feedly Summary: Stealing crypto is so 2024. Supply-chain attacks leading to data exfil pays off better? North Korea’s Lazarus Group compromised hundreds of victims across the globe in a massive secret-stealing supply chain attack that was ongoing…
-
Unit 42: CL-STA-0048: An Espionage Operation Against High-Value Targets in South Asia
Source URL: https://unit42.paloaltonetworks.com/?p=138128 Source: Unit 42 Title: CL-STA-0048: An Espionage Operation Against High-Value Targets in South Asia Feedly Summary: A Chinese-linked espionage campaign targeted entities in South Asia using rare techniques like DNS exfiltration, with the aim to steal sensitive data. The post CL-STA-0048: An Espionage Operation Against High-Value Targets in South Asia appeared first…
-
Hacker News: A minimal PyTorch implementation for training your own small LLM from scratch
Source URL: https://github.com/Om-Alve/smolGPT Source: Hacker News Title: A minimal PyTorch implementation for training your own small LLM from scratch Feedly Summary: Comments AI Summary and Description: Yes **Summary:** This text describes a minimal PyTorch implementation for training a small Language Model (LLM) from scratch, intended primarily for educational purposes. It showcases modern techniques in LLM…
-
The Register: Tiny Linux kernel tweak could cut datacenter power use by 30%, boffins say
Source URL: https://www.theregister.com/2025/01/29/linux_kernel_tweak/ Source: The Register Title: Tiny Linux kernel tweak could cut datacenter power use by 30%, boffins say Feedly Summary: Not bad for 30 lines of code Hardware keeps getting faster, but it’s still worth taking a step back periodically and revisiting your code. You might just uncover a little tweak that wrings…
-
Alerts: CISA Adds One Known Exploited Vulnerability to Catalog
Source URL: https://www.cisa.gov/news-events/alerts/2025/01/29/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, as confirmed by Fortinet. CVE-2025-24085 Apple Multiple Products Use-After-Free Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors…
-
Hacker News: Case Study: ByteDance Uses eBPF to Enhance Networking Performance
Source URL: https://ebpf.foundation/case-study-bytedance-uses-ebpf-to-enhance-networking-performance/ Source: Hacker News Title: Case Study: ByteDance Uses eBPF to Enhance Networking Performance Feedly Summary: Comments AI Summary and Description: Yes Summary: The case study discusses Bytedance’s implementation of eBPF technology to enhance the performance and stability of its data center networking solutions. By transitioning to netkit, an eBPF-powered networking device, Bytedance…
-
The Register: Why is my Mitel phone DDoSing strangers? Oh, it was roped into a new Mirai botnet
Source URL: https://www.theregister.com/2025/01/29/ddos_attacks_aquabot_mitel/ Source: The Register Title: Why is my Mitel phone DDoSing strangers? Oh, it was roped into a new Mirai botnet Feedly Summary: And now you won’t stop calling me, I’m kinda busy A new variant of the Mirai-based malware Aquabot is actively exploiting a vulnerability in Mitel phones to build a remote-controlled…