Tag: detection
-
Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications
Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to establish stealthy command-and-control (C2) communications. Originally designed as a post-exploitation framework for penetration testers, Pyramid has become an attractive option for malicious actors due to its ability to evade detection by endpoint security tools. The tool, first released on GitHub in…
-
Ransomware gangs shifting tactics to evade enterprise defenses
Threat actors adapted to improved threat detection, law enforcement actions, new Huntress research finds. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ransomware-gangs–tactics-/739937/
-
The Current AI Revolution Will (Finally) Transform Your SOC
Artificial intelligence (AI) is profoundly transforming cybersecurity, reimagining detection through remediation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/the-current-ai-revolution-will-finally-transform-your-soc/
-
Getting the Most Value out of the OSCP: Pre-Course Prep
Tags: access, antivirus, attack, compliance, control, credentials, cyber, cybersecurity, detection, exploit, finance, framework, guide, hacker, hacking, infosec, infrastructure, jobs, kali, linux, mandiant, metric, microsoft, mitre, network, organized, password, penetration-testing, PurpleTeam, RedTeam, risk, service, skills, software, tactics, technology, tool, training, vulnerability, windowsThe first post in a five-part practical guide series on maximizing the professional, educational, and financial value of the OffSec certification pursuit for a successful career in offensive cybersecurity consulting Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance with OffSec’s copyright policies and agreements.…
-
Enhancing Threat Detection With Improved Metadata MITRE ATTCK tags
The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to combat emerging threats. In response, Proofpoint’s Emerging Threats (ET) team has implemented significant updates to its ruleset, enhancing metadata coverage and integrating MITRE ATT&CK tags. These advancements aim to provide security teams with actionable intelligence and improved context for detecting and…
-
Logpoint und Netheimur verstärken den Unternehmensschutz in Island
Logpoint hat auch sein Produktportfolio erweitert und vor kurzem das dänische Network Detection and Response (NDR)-Unternehmen Muninn übernommen, um Unternehmen dabei zu helfen, ihre Sicherheitsleistung durch verbesserte Cybersecurity-Transparenz zu verbessern. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/logpoint-und-netheimur-verstaerken-den-unternehmensschutz-in-island/a39784/
-
Security Detection Tech Failing, Say Cyber Leaders in Regulated Industries
A new Everfox survey shows a growing consensus among regulated organizations in favor of a strategic shift away from detecting cyber threats to preventing them First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/security-detection-tech-failing/
-
SystemBC RAT Now Targets Linux, Spreading Ransomware and Infostealers
SystemBC RAT now targets Linux, enabling ransomware gangs like Ryuk Conti to spread, evade detection, and maintain encrypted C2 traffic for stealthy cyberattacks. First seen on hackread.com Jump to article: hackread.com/systembc-rat-targets-linux-ransomware-infostealers/
-
EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS
Tags: apt, communications, control, cyber, cyberattack, detection, malware, network, tactics, threatAdvanced Persistent Threats (APTs) represent a sophisticated and stealthy category of cyberattacks targeting critical organizations globally. Unlike common malware, APTs employ evasive tactics, techniques, and procedures (TTPs) to remain undetected for extended periods. Their command-and-control (C&C) communications often mimic legitimate web traffic, making detection particularly challenging for traditional Network Intrusion Detection Systems (NIDS). To address…
-
Top 5 ways attackers use generative AI to exploit your systems
Tags: access, ai, attack, authentication, awareness, banking, captcha, chatgpt, china, control, cyber, cybercrime, cybersecurity, defense, detection, exploit, extortion, finance, flaw, fraud, group, hacker, intelligence, LLM, malicious, malware, network, phishing, ransomware, resilience, service, spam, tactics, theft, threat, tool, vulnerability, zero-dayFacilitating malware development: Artificial intelligence can also be used to generate more sophisticated or at least less labour-intensive malware.For example, cybercriminals are using gen AI to create malicious HTML documents. The XWorm attack, initiated by HTML smuggling, which contains malicious code that downloads and runs the malware, bears the hallmarks of development via AI.”The loader’s…
-
New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2
A recent analysis of over one million malware samples by Picus Security has revealed a growing trend in the exploitation of application layer protocols for stealthy command-and-control (C2) operations. These findings, detailed in the Red Report 2025, underscore the increasing sophistication of cyber adversaries who leverage widely used protocols to evade detection and maintain persistence…
-
New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal
A recent cybersecurity presentation at BSides London 2024 has unveiled a sophisticated attack technique known as Bring Your Own Trusted Binary (BYOTB). This method leverages legitimate, trusted binaries to evade detection by advanced security measures such as Endpoint Detection and Response (EDR) systems and firewalls. The findings, presented by cybersecurity researcher David Kennedy of Jumpsec…
-
Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of “broken” pickle files to evade detection.”The pickle files extracted from the mentioned PyTorch archives revealed the malicious Python content at the beginning of the file,” ReversingLabs researcher Karlo Zanki said in a report shared with The…
-
Securing Autonomous AI Workflows Through Advanced Single Sign-On
Single Sign-On (SSO) is transforming how AI agents authenticate across systems. This article explores SSO’s role in enhancing security, enforcing least-privilege access, and enabling real-time threat detection for autonomous AI workflows. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/securing-autonomous-ai-workflows-through-advanced-single-sign-on/
-
EDR-Killer So lässt sich eine Endpoint-DetectionResponse-Lösung selber schützen
Die Bedrohungsakteure entwickeln sich in der heutigen Cybersicherheitslandschaft ständig weiter und suchen nach neuen Wegen, um mit immer ausgefeilteren Tools und Techniken in Unternehmen einzudringen. Dieses ständige ‘Katz- und Mausspiel” hat zu Endpoint-Detection and Response (EDR) -Killern geführt, die in Verbindung mit dem Auftauchen neuer Ransomware-Varianten und der Umbenennung älterer Varianten zu einer erheblichen Bedrohung…
-
EDR Killer: Was sie sind und wie sich Unternehmen schützen
Die Bedrohungsakteure entwickeln sich in der heutigen Cybersicherheitslandschaft ständig weiter und suchen nach neuen Wegen, um mit immer ausgefeilteren Tools und Techniken in Unternehmen einzudringen. Dieses ständige ‘Katz- und Mausspiel” hat zu EDR Killern (Endpoint Detection and Response) geführt, die in Verbindung mit dem Auftauchen neuer Ransomware-Varianten und der Umbenennung älterer Varianten zu einer erheblichen…
-
Die besten Cyber-Recovery-Lösungen
Tags: access, ai, backup, business, cloud, cyber, cyberattack, data, detection, endpoint, Hardware, incident response, mail, malware, microsoft, mitigation, monitoring, ransomware, risk, saas, service, software, threat, tool, update, vulnerability, zero-trust -
Hugging Face platform continues to be plagued by vulnerable ‘pickles’
A widely used python module for machine-learning developers can be loaded with malware and bypass detection measures. First seen on cyberscoop.com Jump to article: cyberscoop.com/hugging-face-platform-continues-to-be-plagued-by-vulnerable-pickles/
-
Qualys TotalAppSec Strengthens Application Risk Management
Qualys introduced TotalAppSec, an AI-powered application risk management solution designed to unify API security, web application scanning and web malware detection across on-premises, hybrid and multi-cloud environments. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/qualys-totalappsec-strengthens-application-risk-management/
-
MacOS Ferret operators add a deceptive bite to their malware family
The macOS Ferret family, variants of malware used by North Korean APTs for cyber espionage, has received a new member as samples of a detection-resistant variant, Flexible-Ferret, appear in the wild.The discovery of the samples was made by SentinelOne researchers who noted the variant’s capability to evade the recent XProtect signature update that Apple pushed…
-
AWS tightens default security on Redshift
Tags: best-practice, business, cloud, data, defense, detection, intelligence, monitoring, risk, service, technology, threatAmazon’s security improvements for its AWS Redshift managed data warehouse service are welcome additions, says an expert.Loris Degioanni, chief technology officer at Sysdig, told CSO that AWS’s enhanced security defaults for Amazon Redshift are a “necessary evolution for the accelerated cloud adoption we’ve seen across organizations with varying security expertise. Secure configurations are the first…
-
ANY.RUN Enhances Malware Detection and Performance to Combat 2025 Cyber Threats
As cyber threats grow more sophisticated, ANY.RUN has unveiled a series of updates aimed at improving malware detection, analysis, and overall performance of its platform. These updates, implemented in January 2025, focus on optimizing the platform’s core functionality, enhancing detection capabilities, and addressing the evolving needs of cybersecurity professionals. System Optimizations Strengthen Performance ANY.RUN has…
-
Network Detection and Response gegen Cyberrisiken – NDR: 3 Gründe, warum die Visibility nicht vernachlässigt werden darf
First seen on security-insider.de Jump to article: www.security-insider.de/effektive-nutzung-von-network-detection-and-response-loesungen-a-ecc7d12bb0689b80318c2deb9a3b3b4c/

