Security News

Report: Cyberespionage threat actor exploits CVE-2022-42475 FortiOS vulnerability
2023-01-23 20:53

In December 2022, security company Mandiant, now a Google Cloud company, identified a FortiOS malware written in C that exploited the CVE-2022-42475 FortiOS vulnerability. The Linux version of the malware, when executed, performs a system survey and enables communications with a hardcoded command-and-control server.

Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks
2023-01-23 09:54

The legitimate command-and-control framework known as Sliver is gaining more traction from threat actors as it emerges as an open source alternative to Cobalt Strike and Metasploit. Sliver, developed by cybersecurity company BishopFox, is a Golang-based cross-platform post-exploitation framework that's designed to be used by security professionals in their red team operations.

The threat of location spoofing and fraud
2023-01-20 04:30

In this Help Net Security video, André Ferraz, CEO at Incognia, discusses the impact of location spoofing and location-based fraud. Any tool that enables users to alter the location information given by their device is known as location spoofing.

Threat attackers can own your data in just two days
2023-01-18 23:45

If the user navigates and clicks on the only visible file, a Link File Format file, the LNK file starts the infection process by launching a batch file. Attackers obtain the credentials of a service account via Kerberoasting, a known technique based on abusing valid Kerberos tickets, 15 minutes after the initial infection.

Potential threats and sinister implications of ChatGPT
2023-01-18 05:00

ChatGPT from OpenAI is a conversational chatbot recently released in preview mode for research purposes. It takes natural language as input and aims to solve problems, provide follow-up questions or even challenge assertions depending on your question.

Threats that will dominate headlines in 2023
2023-01-17 05:00

In this Help Net Security video, MacKenzie Jackson, Developer Advocate at GitGuardian, offers his cybersecurity predictions for 2032. These include: Developers will be a priority target for...

Post-quantum cybersecurity threats loom large
2023-01-16 04:00

The growing interest in quantum is translating into spending, demonstrated by 71% of quantum-adopting enterprises surveyed having current quantum computing budgets of more than $1 million. Interestingly, nearly 30% of respondents that have adopted or plan to adopt quantum computing expect to see a competitive advantage due to quantum computing within the next 12 months.

Threats of Machine-Generated Text
2023-01-13 12:13

This paper is a good survey of the field: what the threats are, how we might detect machine-generated text, directions for future research. Abstract: Advances in natural language generation have resulted in machine generated text that is increasingly difficult to distinguish from human authored text.

This can’t be a real bomb threat: you've called a modem, not a phone
2023-01-13 07:29

So Don was rather surprised one day to hear a phone ringing as he stalked the racks, because the kit there was dedicated to modems. "The caller only said 'BOMB. BOMB. BOMB.' with a strong Irish accent," don recalled.

New Analysis Reveals Raspberry Robin Can be Repurposed by Other Threat Actors
2023-01-11 17:35

A new analysis of Raspberry Robin's attack infrastructure has revealed that it's possible for other threat actors to repurpose the infections for their own malicious activities, making it an even more potent threat. Raspberry Robin, attributed to a threat actor dubbed DEV-0856, is malware that has increasingly come under the radar for being used in attacks aimed at finance, government, insurance, and telecom entities.