Tag: obfuscation techniques
-
Slashdot: Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ For Enterprise
Source URL: https://it.slashdot.org/story/25/08/08/2113251/red-teams-jailbreak-gpt-5-with-ease-warn-its-nearly-unusable-for-enterprise?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ For Enterprise Feedly Summary: AI Summary and Description: Yes Summary: The text highlights significant security vulnerabilities in the newly released GPT-5 model, noting that it was easily jailbroken within a short timeframe. The results from different red teaming efforts…
-
Unit 42: Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources
Source URL: https://unit42.paloaltonetworks.com/malicious-payloads-as-bitmap-resources-hide-net-malware/ Source: Unit 42 Title: Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources Feedly Summary: Unit 42 details a new malware obfuscation technique where threat actors hide malware in bitmap resources within .NET applications. These deliver payloads like Agent Tesla or XLoader. The post Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap…
-
Slashdot: How AI Coding Assistants Could Be Compromised Via Rules File
Source URL: https://developers.slashdot.org/story/25/03/23/2138230/how-ai-coding-assistants-could-be-compromised-via-rules-file?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: How AI Coding Assistants Could Be Compromised Via Rules File Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant security vulnerability in AI coding assistants like GitHub Copilot and Cursor, highlighting how malicious rule configuration files can be used to inject backdoors and vulnerabilities in…
-
Cloud Blog: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries/ Source: Cloud Blog Title: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries Feedly Summary: Written by: Chuong Dong Overview In our day-to-day work, the FLARE team often encounters malware written in Go that is protected using garble. While recent advancements in Go analysis from tools like IDA Pro have simplified the analysis process, garble…