Tag: tactics

  • Unit 42: One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks

    Source URL: https://unit42.paloaltonetworks.com/graph-neural-networks/ Source: Unit 42 Title: One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks Feedly Summary: Graph neural networks aid in analyzing domains linked to known attack indicators, effectively uncovering new malicious domains and cybercrime campaigns. The post One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery…

  • Slashdot: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days

    Source URL: https://it.slashdot.org/story/25/01/14/0141238/ransomware-crew-abuses-aws-native-encryption-sets-data-destruct-timer-for-7-days?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days Feedly Summary: AI Summary and Description: Yes Summary: The emergence of the ransomware group Codefinger highlights a novel and dangerous method of exploiting AWS S3 buckets by using compromised AWS keys and AWS’s SSE-C (Server-Side Encryption with…

  • The Register: Microsoft sues ‘foreign-based’ criminals, seizes sites used to abuse AI

    Source URL: https://www.theregister.com/2025/01/13/microsoft_sues_foreignbased_crims_seizes/ Source: The Register Title: Microsoft sues ‘foreign-based’ criminals, seizes sites used to abuse AI Feedly Summary: Crooks stole API keys, then started a hacking-as-a-service biz Microsoft has sued a group of unnamed cybercriminals who developed tools to bypass safety guardrails in its generative AI tools. The tools were used to create harmful…

  • The Register: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

    Source URL: https://www.theregister.com/2025/01/13/ransomware_crew_abuses_compromised_aws/ Source: The Register Title: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days Feedly Summary: ‘Codefinger’ crims on the hunt for compromised keys A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant’s own server-side encryption with customer provided keys (SSE-C) to lock up…

  • Hacker News: How hucksters are manipulating Google to promote shady Chrome extensions

    Source URL: https://arstechnica.com/security/2025/01/googles-chrome-web-store-has-a-serious-spam-problem-promoting-shady-extensions/ Source: Hacker News Title: How hucksters are manipulating Google to promote shady Chrome extensions Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses violations of Google Chrome’s policies by third-party extension developers who manipulate search results through unethical practices. This not only misrepresents the extensions but can also lead…

  • CSA: Cloud Security in Five Key Steps

    Source URL: https://www.tenable.com/blog/how-to-protect-your-cloud-environments-and-prevent-data-breaches Source: CSA Title: Cloud Security in Five Key Steps Feedly Summary: AI Summary and Description: Yes **Summary:** The text addresses the rapidly evolving landscape of cloud computing security, highlighting the increased risks associated with cloud adoption and providing actionable strategies for organizations to bolster their defenses. It emphasizes the necessity of a…

  • The Register: Security pros baited with fake Windows LDAP exploit traps

    Source URL: https://www.theregister.com/2025/01/09/security_pros_baited_by_fake/ Source: The Register Title: Security pros baited with fake Windows LDAP exploit traps Feedly Summary: Tricky attackers trying yet again to deceive the good guys on home territory Security researchers are once again being lured into traps by attackers, this time with fake exploits of serious Microsoft security flaws.… AI Summary and…

  • The Register: Japanese Police claim China ran five-year cyberattack campaign

    Source URL: https://www.theregister.com/2025/01/09/japan_mirrorface_china_attack/ Source: The Register Title: Japanese Police claim China ran five-year cyberattack campaign Feedly Summary: ‘MirrorFace’ group found ways to run malware in the Windows sandbox, which is worrying Japan’s National Police Agency and Center of Incident Readiness and Strategy for Cybersecurity have confirmed third party reports of attacks on local orgs by…