Aggregator
New Eucleak attack lets threat actors clone YubiKey FIDO keys
评论 | 整治“指尖上的形式主义”
4问+1图 | 读懂《关于推动新型信息基础设施协调发展有关事项的通知》
发布 | 中国信通院发布《大模型落地路线图研究报告(2024年)》(附下载)
专家观点 | 抗量子密码:为全球网络安全筑起新防线
专家观点 | 法律如何应对人工智能的发展
通知 | 工信部等十一部门联合发文 推动新型信息基础设施协调发展(附全文)
实习招聘 | 《中国信息安全》杂志社招聘实习生啦!
FBI Warns of North Korea Attacks Against the Crypto Industry
The decentralized finance (DeFi) and
cryptocurrency industries are being targeted by North Korean social engineering
schemes in highly personalized and convincing ways.
Here is an example that the FBI is showcasing:
1.
A
person from your dream company, using the name of an old colleague, contacts
you on social media, mentioning a conference you both recently attended and
discussing shared interests.
2.
He
asks if you're job hunting and reveals his company needs your skills, offering
a significant pay raise. He arranges an
interview with his CTO and during the interview, the CTO gives you a
“pre-employment” test that involves troubleshooting code from some GitHub
repositories you do not recognize.
3.
You
clone the repositories, execute the code, find the bugs, and pass the test with
flying colors.
Congrats - you have fallen for a well-disguised
social engineering scheme conducted by North Korean cyber actors. One of those
GitHub repositories was malicious and landed a malware dropper on your machine
which installed a key logger and acquired your credentials to access your
company’s network.
The North Korean attackers gain access and moving
laterally, eventually getting access to the seed phrases and security
signatures for your company’s cryptocurrency assets. Shortly thereafter all the company’s crypto
assets disappear and everything you and your colleagues worked for is gone.
The threat is real.
Check out the full FBI public warning here: https://www.ic3.gov/Media/Y2024/PSA240903
The post FBI Warns of North Korea Attacks Against the Crypto Industry appeared first on Security Boulevard.
Apple Watch 的十年一剑(上):从跨界新秀到可穿戴「大腕」
Revisiting the UDRL Part 3: Beacon User Data
The UDRL and the Sleepmask are key components of Cobalt Strike’s evasion strategy, yet historically they have not worked well together. For example, prior to CS 4.10, Beacon statically calculated its location in memory using a combination of its base address and its section table. This calculation was then modified depending on the contents of [...]
Read More... from Revisiting the UDRL Part 3: Beacon User Data
The post Revisiting the UDRL Part 3: Beacon User Data appeared first on Cobalt Strike.
Open Source Tool Allows Voters to Verify Election Results
How Bots and AI Are Fueling Disinformation
Disinformation is hardly new, yet its impact is undeniably amplified in the digital age. AI-enabled bots are amplifying the noise.
The post How Bots and AI Are Fueling Disinformation appeared first on Security Boulevard.
AI Model Security Challenges: Financial and Healthcare Data
Daniel Stori’s Turnoff.US: ‘pid 1’
via the inimitable Daniel Stori at Turnoff.US!
The post Daniel Stori’s Turnoff.US: ‘pid 1’ appeared first on Security Boulevard.