Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
9 résultats taggé detection  ✕
Zero-Day: How Attackers Use Corrupted Files to Bypass Detection https://any.run/cybersecurity-blog/corrupted-files-attack/
09/12/2024 12:13:02
QRCode
archive.org
thumbnail

See technical analysis of a zero-day attack that uses corrupted malicious files to bypass detection by advanced security systems.

any.run EN 2024 Corrupted Files Bypass Detection Analysis
Global attacker median dwell time continues to fall https://www.helpnetsecurity.com/2024/04/24/2023-attacker-dwell-time/
29/04/2024 20:36:55
QRCode
archive.org
thumbnail

The global attacker median dwell time continued trending downwards in 2023, and is now 10 days (from 16 days in the previous year).

helpnetsecurity EN 2024 M-Trends median dwell-time detection Mandiant
Linux Foundation Launches Tazama: A Revolutionary Open Source Solution for Real-Time Fraud Management https://www.linuxfoundation.org/press/linux-foundation-launches-tazama-for-real-time-fraud-management
17/03/2024 14:48:34
QRCode
archive.org
thumbnail

Tazama is the first open source platform for financial monitoring and fraud detection.

linuxfoundation EN 2024 Linux Foundation Tazama Open-Source fraud detection
Lumma Stealer malware now uses trigonometry to evade detection https://www.bleepingcomputer.com/news/security/lumma-stealer-malware-now-uses-trigonometry-to-evade-detection/
20/11/2023 17:05:02
QRCode
archive.org
thumbnail

The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software - the measuring of mouse movements using trigonometry to determine if the malware is running on a real machine or an antivirus sandbox.

bleepingcomputer EN 2023 Anti-VM Info-Stealer Information-stealing-malware Lumma LummaC2 Malware Malware-as-a-Service Security detection
Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection | Mandiant https://www.mandiant.com/resources/blog/chinese-espionage-tactics
15/08/2023 09:19:01
QRCode
archive.org
thumbnail

Ways Chinese cyber espionage activity has increasingly leveraged strategies to evade detection.

mandiant EN 2023 espionage Stealth detection evasion UNC3886
Investigating ChatGPT phishing detection capabilities https://securelist.com/chatgpt-anti-phishing/109590/
01/05/2023 15:57:52
QRCode
archive.org
thumbnail

Kaspersky research on ChatGPT capabilities to tell a phishing link from a legitimate one by analyzing the URL, as well as extract target organization name.

securelist 2023 EN Machine-learning Phishing Phishing-websites phishing detection capabilities
EDR: Detections, Bypassess and other Shenanigans https://fourcore.io/blogs/edr-detections-bypasses-and-other-shenanigans
28/10/2022 23:17:24
QRCode
archive.org

EDR or Endpoint Detection and Response refers to an integrated endpoint security solution which continuously monitors end-point user's devices and try to prevent anomalies like Malware, Ransomware by using automated rule based response method.

fourcore EN 2022 EDR Detections Bypassess Endpoint Detection Response
Bypass phishing detections with Google Translate https://certitude.consulting/blog/en/bypass-phishing-detections-with-google-translate-2/
19/08/2022 09:52:00
QRCode
archive.org

A new wave of phishing is currently circulating (a related story from derstandard.at newspaper can be found here). Documents are said to have been sent to you from a scanner, which you can allegedly download, as can be seen in the following image

certitude EN 2022 phishing Google translate bypass detection Technique
Microsoft finds Raspberry Robin worm in hundreds of Windows networks https://www.bleepingcomputer.com/news/security/microsoft-finds-raspberry-robin-worm-in-hundreds-of-windows-networks/
03/07/2022 12:03:15
QRCode
archive.org
thumbnail

Microsoft says that a recently spotted Windows worm has been found on the networks of hundreds of organizations from various industry sectors.

Bleepingcomputer EN 2022 Malware Microsoft Raspberry-Robin raspberryrobin USB Windows Worm Security Detection
4252 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio