Tag: RedTeam
-
We didn’t fire red teams, we just unhired a bunch of them
Agency tries to save face as it also pulls essential funding for election security initiatives First seen on theregister.com Jump to article: www.theregister.com/2025/03/13/cisa_red_team_layoffs/
-
We didn’t fire our red team, we just unhired a bunch of them
Agency tries to save face as it also pulls essential funding for election security initiatives First seen on theregister.com Jump to article: www.theregister.com/2025/03/13/cisa_red_team_layoffs/
-
Generative AI red teaming: Tips and techniques for putting LLMs to the test
Defining objectives and scopeAssembling a teamThreat modelingAddressing the entire application stackDebriefing, post-engagement analysis, and continuous improvementGenerative AI red teaming complements traditional red teaming by focusing on the nuanced and complex aspects of AI-driven systems including accounting for new testing dimensions such as AI-specific threat modeling, model reconnaissance, prompt injection, guardrail bypass, and more. AI red-teaming…
-
Trump nominates cyber vet Sean Plankey for CISA chief amid DOGE cuts and firings
Tags: cisa, cyber, cybersecurity, defense, disinformation, election, government, infrastructure, jobs, RedTeam, toolPlankey’s potential impact on CISA’s staff and spending cuts: CISA has long been a target of Republicans, primarily due to the minimal amount of now-discontinued work the agency conducted on misinformation efforts. It has also experienced heavy staff and spending cuts spurred by Elon Musk’s DOGE initiative.Over the past seven weeks, CISA has endured at…
-
CISA cybersecurity workforce faces cuts amid shifting US strategy
Tags: ai, cisa, cyber, cybersecurity, exploit, governance, government, group, incident, infrastructure, jobs, RedTeam, risk, strategy, technology, threat, vulnerabilityA shift in US cybersecurity strategy?: Analysts suggest these layoffs and funding cuts indicate a broader strategic shift in the U.S. government’s cybersecurity approach. Neil Shah, VP at Counterpoint Research, sees both risks and opportunities in the restructuring.”In the near to mid-term, this could weaken the US cybersecurity infrastructure. However, with AI proliferating, the US…
-
DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts
Affected staff say more than 100 employees working to protect U.S. government networks were ‘axed’ with no prior warning First seen on techcrunch.com Jump to article: techcrunch.com/2025/03/11/doge-axes-cisa-red-team-staffers-amid-ongoing-federal-cuts/
-
MIWIC25 Eva Benn, Chief of Staff, Strategy Microsoft Red Team
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are…
-
Static Scans, Red Teams, and Frameworks Aim to Find Bad AI Models
With hundreds of artificial intelligence models found harboring malicious code, cybersecurity firms are releasing technology to help companies manage their AI development and deployment efforts. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/static-scans-red-teams-frameworks-aim-find-bad-ai-models
-
Bypassing AV Detection Anti-Malware Scans with Red Team Tool SpecterInsight
In an era where antivirus (AV) solutions and anti-malware scan interfaces (AMSI) are becoming increasingly sophisticated, red team operators and penetration testers face mounting challenges in evading detection. SpecterInsight, a powerful offensive security tool, has emerged as a solution to bypass these defenses while maintaining stealth. The latest version, SpecterInsight 4.2.0, introduces advanced payload crafting…
-
Max Severity RCE Vuln in All Versions of MITRE Caldera
In the wrong hands, the popular red-teaming tool can be made to access networks, escalate privileges, conduct reconnaissance, and disguise malicious activity as a simulated exercise. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/max-severity-rce-vuln-all-versions-mitre-caldera
-
Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception
A significant vulnerability has been discovered in the Sliver C2 server, a popular open-source cross-platform adversary emulation and red team framework. This vulnerability, identified as CVE-2025-27090, allows attackers to hijack TCP connections, enabling them to intercept and manipulate traffic. The exploit leverages a Server-Side Request Forgery (SSRF) technique, which can be particularly damaging as it…
-
Getting the Most Value out of the OSCP: Pre-Course Prep
Tags: access, antivirus, attack, compliance, control, credentials, cyber, cybersecurity, detection, exploit, finance, framework, guide, hacker, hacking, infosec, infrastructure, jobs, kali, linux, mandiant, metric, microsoft, mitre, network, organized, password, penetration-testing, PurpleTeam, RedTeam, risk, service, skills, software, tactics, technology, tool, training, vulnerability, windowsThe first post in a five-part practical guide series on maximizing the professional, educational, and financial value of the OffSec certification pursuit for a successful career in offensive cybersecurity consulting Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance with OffSec’s copyright policies and agreements.…
-
Leveraging Microsoft Text Services Framework (TSF) for Red Team Operations
The Praetorian Labs team was tasked with identifying novel and previously undocumented persistence mechanisms for use in red team engagements. Our primary focus was on persistence techniques achievable through modifications in HKCU, allowing for stealthy, user-level persistence without requiring administrative privileges. Unfortunately, while we identified an interesting persistence technique, the method we discuss in this……
-
CISOs: Stop trying to do the lawyer’s job
Tags: breach, business, ciso, compliance, cybersecurity, data, email, finance, group, guide, incident response, international, jobs, law, privacy, RedTeam, risk, risk-management, security-incident, service, skills, strategy, technology, training, updateThere’s a joke that’s been floating around boardrooms for years: “What’s the difference between lawyers and engineers? Lawyers don’t think they’re engineers.”This light-hearted jab highlights a fundamental difference between the two professions. Engineers, and by extension CISOs, focus on building and fixing things, learning a wide array of skills, sometimes sticking their hands into technologies…
-
Further Adventures With CMPivot”Š”, “ŠClient Coercion
Further Adventures With CMPivot”Š”, “ŠClient Coercion Perfectly Generated AI Depiction based on Title TL:DR CMPivot queries can be used to coerce SMB authentication from SCCM client hosts Introduction CMPivot is a component part of the Configuration Manager framework. With the rise in popularity for ConfigMgr as a target in red team operations, this post looks to cover a…
-
DeepSeek-R1 more readily generates dangerous content than other large language models
Research scientists at cyber firm Enkrypt AI publish concerning findings from a red team exercise conducted against DeepSeek, the hot new generative AI tool First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366618734/DeepSeek-R1-more-readily-generates-dangerous-content-than-other-large-language-models
-
Red teaming Deepseek aka DeepSeek R1 Exposed: Security Flaws in China’s AI Model
First seen on thesecurityblogger.com Jump to article: www.thesecurityblogger.com/red-teaming-deepseek-aka-deepseek-r1-exposed-security-flaws-in-chinas-ai-model/
-
3 takeaways from red teaming 100 generative AI products
First seen on thesecurityblogger.com Jump to article: www.thesecurityblogger.com/3-takeaways-from-red-teaming-100-generative-ai-products/
-
Cisco Previews AI Defenses to Cloud Security Platform
Set for release in March, Cisco AI Defense will provide algorithmic red teaming of large language models with technology that came over as part of the Robust Intelligence acquisition last year. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/cisco-previews-ai-defense-cloud-security
-
Secure AI? Dream on, says AI red team
The group responsible for red teaming of over 100 generative AI products at Microsoft has concluded that the work of building safe and secure AI systems will never be complete.In a paper published this week, the authors, including Microsoft Azure CTO Mark Russinovich, described some of the team’s work and provided eight recommendations designed to…
-
AI Won’t Take This Job: Microsoft Says Human Ingenuity Crucial to Red-Teaming
Redmond’s AI Red Team says human involvement remains irreplaceable in addressing nuanced risks. The post AI Won’t Take This Job: Microsoft Says Human Ingenuity Crucial to Red-Teaming appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/ai-wont-take-this-job-microsoft-says-human-ingenuity-crucial-to-red-teaming/
-
Insights from CISA’s red team findings and the evolution of EDR
A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of… First seen on securityintelligence.com Jump to article: securityintelligence.com/news/insights-from-cisas-red-team-findings-and-the-evolution-of-edr/
-
Gen AI is transforming the cyber threat landscape by democratizing vulnerability hunting
Tags: ai, api, apt, attack, bug-bounty, business, chatgpt, cloud, computing, conference, credentials, cve, cyber, cybercrime, cyberespionage, cybersecurity, data, defense, detection, email, exploit, finance, firewall, flaw, framework, github, government, group, guide, hacker, hacking, incident response, injection, LLM, malicious, microsoft, open-source, openai, penetration-testing, programming, rce, RedTeam, remote-code-execution, service, skills, software, sql, tactics, threat, tool, training, update, vulnerability, waf, zero-dayGenerative AI has had a significant impact on a wide variety of business processes, optimizing and accelerating workflows and in some cases reducing baselines for expertise.Add vulnerability hunting to that list, as large language models (LLMs) are proving to be valuable tools in assisting hackers, both good and bad, in discovering software vulnerabilities and writing…
-
Garak An Open Source LLM Vulnerability Scanner for AI Red-Teaming
Garak is a free, open-source tool specifically designed to test the robustness and reliability of Large Language Models (LLMs). Inspired by utilities like Nmap or Metasploit, Garak identifies potential weak points in LLMs by probing for issues such as hallucinations, data leakage, prompt injections, toxicity, jailbreak effectiveness, and misinformation propagation. This guide covers everything you…
-
DEF CON 32 War Games Red Team for OT Based on Real World Case Studies
Author/Presenter: Shishir Gupta Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-war-games-red-team-for-ot-based-on-real-world-case-studies/
-
4 Wege zu neuer Cyberabwehrstärke
Tags: ai, antivirus, application-security, backdoor, cio, cloud, crypto, cyberattack, cybersecurity, data-breach, ddos, detection, hacker, iot, phishing, RedTeam, reverse-engineering, tool, vulnerabilityAnurag Goyal ist Head of Cybersecurity beim Plattformanbieter RedDoorz. Darüber hinaus hat er sich auch als Sicherheitsforscher und Ethical Hacker einen Namen gemacht. Anurag Goyal 3. Red Teaming Red Teaming stellt einen dynamischen und umfassenden Ansatz dar, um die Cyberresilienz von Organisationen zu bewerten und zu optimieren. Dabei simulieren Security-Profis ausgeklügelte Cyberattacken und ahmen dazu…

