Aggregator
Qilin
2 weeks 4 days ago
cohenido
Driving Advancement in Cybersecurity | Top 5 Takeaways from OneCon24
2 weeks 4 days ago
Since its founding, SentinelOne has been a global leader in how AI and machine learning ca
capa: identify capabilities in executable files
2 weeks 4 days ago
capa capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. For example, it might suggest that the...
The post capa: identify capabilities in executable files appeared first on Penetration Testing Tools.
ddos
Qilin
2 weeks 4 days ago
cohenido
Qilin
2 weeks 4 days ago
cohenido
Qilin
2 weeks 4 days ago
cohenido
Qilin
2 weeks 4 days ago
cohenido
Qilin
2 weeks 4 days ago
cohenido
Qilin
2 weeks 4 days ago
cohenido
「技术研报」以子之矛陷子之盾 · 用AI对AI漏洞的利用探索
2 weeks 4 days ago
2024年9月24日,OpenAI的CEO Sam Altman发表文章《The Intelligence Age》,大胆地宣告了AI时代的到来。给予文章强有力支撑的是ChatGPT-o1的发布,这是
Zenity Gets $38M Series B for Agentic AI Security Expansion
2 weeks 4 days ago
New Funding to Aid US Government Growth, Generative AI Security Product Development
Zenity has closed a $38 million Series B round to advance its agentic AI security platform and extend its no-code and low-code application support. With investment from Third Point Ventures and DTCP, the funding enables Zenity to cater to clients in sectors like financial services and healthcare.
Zenity has closed a $38 million Series B round to advance its agentic AI security platform and extend its no-code and low-code application support. With investment from Third Point Ventures and DTCP, the funding enables Zenity to cater to clients in sectors like financial services and healthcare.
Mac Malware Threat: Hackers Seek Cryptocurrency Holders
2 weeks 4 days ago
Lazarus Group in Particular Using Cross-Platform Languages to Hit macOS Targets
Cryptocurrency-seeking hackers are increasingly targeting macOS users. So warn security researchers as they track a rise in macOS backdoors and information-stealing malware, much of which traces back to a well-known cryptocurrency heist culprit: North Korea.
Cryptocurrency-seeking hackers are increasingly targeting macOS users. So warn security researchers as they track a rise in macOS backdoors and information-stealing malware, much of which traces back to a well-known cryptocurrency heist culprit: North Korea.
Sophos Discloses Half Decade of Sustained Chinese Attack
2 weeks 4 days ago
Volt Typhoon, APT31 and APT41 Tied to Campaigns Targeting Sophos' Edge Devices
Firewall maker Sophos disclosed Thursday a half-decade worth of efforts by multiple nation-state Chinese hacking groups to infiltrate its appliances, calling the admission a wake-up call for the cybersecurity industry. Targeting firewall appliances is a known nation-state tactic.
Firewall maker Sophos disclosed Thursday a half-decade worth of efforts by multiple nation-state Chinese hacking groups to infiltrate its appliances, calling the admission a wake-up call for the cybersecurity industry. Targeting firewall appliances is a known nation-state tactic.
Breach Roundup: S&P Says Poor Remediation A Material Risk
2 weeks 4 days ago
Also: Breaches at OnePoint Patient Care and French ISP Free
This week: S&P said poor material vulnerability remediaton can be a material risk factor, OnePoint in the United States and French ISP Free suffered data breaches, a Russian court sentenced REvil members, Five Eyes published security guidelines for small businesses.
This week: S&P said poor material vulnerability remediaton can be a material risk factor, OnePoint in the United States and French ISP Free suffered data breaches, a Russian court sentenced REvil members, Five Eyes published security guidelines for small businesses.
JVN: Rockwell Automation製ThinManagerにおける複数の脆弱性
2 weeks 4 days ago
Rockwell Automationが提供するThinManagerには、複数の脆弱性が存在します。
安全工具开发实战,助你轻松打造实用工具系统
2 weeks 4 days ago
作为一名白帽子师傅,你是否在日常工作中遇到过以下难题:需要使用多个安全工具来完成任务,但工具之间的集成和管理变得复杂和耗时想要开发自己的安全工具系统,但不知道从哪里开始需要提高工作效率,但现有的工具无
新型“恐怖”FakeCall恶意软件在Android设备上捕获照片和一次性密码
2 weeks 4 days ago
针对Android设备,一种新型、更复杂的FakeCall恶意软件变种出现了。Zimperium's zLabs 网络安全研究人员发现了FakeCall恶意软件新变种。它能诱使受害者拨打欺诈电话,导致
野蛮fuzz:尝试理解代码覆盖率
2 weeks 4 days ago
一简介在这一期的“野蛮fuzz”中,我们将继续由菜鸟为菜鸟的模糊测试之旅,尝试理解代码覆盖的概念及其重要性。据我所知,代码覆盖在高层次上是模糊测试器试图追踪/增加模糊测试器输入所能覆盖的目标应用程序代
【漏洞通告】Spring Security 静态资源未授权访问漏洞(CVE-2024-38821)
2 weeks 4 days ago
漏洞名称:Spring Security 静态资源未授权访问漏洞(CVE-2024-38821)组件名称:威睿-Spring Security影响范围:Spring Security ≤ 5.7.12