FreshRSS

๐Ÿ”’
โŒ About FreshRSS
There are new available articles, click to refresh the page.
Today โ€” May 20th 2024Your RSS feeds

Strengthen Your Security Operations: MITRE ATT&CK Mapping in Cisco XDR

By Nirav Shah
Discover how Cisco XDR's MITRE ATT&CK mapping strengthens your security operations. Learn to identify security gaps and improve your cybersecurity posture.
Yesterday โ€” May 19th 2024Your RSS feeds

RomHack CFP Closes May 31!

By /u/smaury

Hey hackers! RomHack 2024 Call for Papers closes on May 31, if you plan to present your awesome research in Rome ๐Ÿ‡ฎ๐Ÿ‡น make sure to submit before that date!

See you in Rome ๐Ÿ•๐Ÿ๐Ÿท!

submitted by /u/smaury
[link] [comments]

A Basic Guide to Discovering Attack Surface with Ghidra and GDB

By /u/cy1337

A walkthrough of using Ghidra to produce a GDB script for tracing function calls.

submitted by /u/cy1337
[link] [comments]

Freeway for Network Pentesting

By /u/Material-Tonight8924

Hi, came here for some feedback and to share the tool with other red teamers.

Every opinion is very welcome.

The Freeway features: - Network monitor - Deauth attack - Beacon Flood - Packet Fuzzer - Network Audit - Channel Hopper

submitted by /u/Material-Tonight8924
[link] [comments]

US Official Warns a Cell Network Flaw Is Being Exploited for Spying

By Andy Greenberg
Plus: Three arrested in North Korean IT workers fraud ring, Tesla staffers shared videos from ownersโ€™ cars, and more.
Before yesterdayYour RSS feeds

Accessing Secure Client Cloud Management after the SecureX EoL

By Pete Davis
Secure Client Management capabilities arenโ€™t going away with the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service.

Email Security Reinvented: How AI is Revolutionizing Digital Defense

By Sergio Pinto
Explore the many ways that Secure Email Threat Defense leverages sophisticated AI and ML to protect against advanced threats.

Android Update: Theft Detection Lock Knows When Your Phone Is Stolen

By Matt Burgess
Google is introducing new AI-powered safety tools in Android 15 that can lock down your phone if thieves nab it.

Secrecy Concerns Mount Over Spy Powers Targeting US Data Centers

By Dell Cameron
A coalition of digital rights groups is demanding the US declassify records that would clarify just how expansive a major surveillance program really is.

cybersectroll/SharpPersistSD

By /u/cybersectroll

A Post-Compromise granular, fully reflective, simple and convenient .NET library to embed persistency to persistency by abusing Security Descriptors of remote machines. The techniques incorporated are not novel but I've yet to come across any documented approach of modifying SCM/Service's SDDL by directly modifying registry keys. Modification of SD for WMI and Remote registry was also added in as an after thought but this means there's a lot more to explore and add for the curious minds.

submitted by /u/cybersectroll
[link] [comments]

TrollPersist

By /u/cybersectroll

A Post-Compromise granular, fully reflective, simple and convenient .NET library to embed persistency to persistency by abusing Security Descriptors of remote machines. The techniques incorporated are not novel but I've yet to come across any documented approach of modifying SCM/Service's SDDL by directly modifying registry keys. Modification of SD for WMI and Remote registry was also added in as an after thought but this means there's a lot more to explore and add for the curious minds.

submitted by /u/cybersectroll
[link] [comments]

Internal Emails Reveal How a Controversial Gun-Detection AI System Found Its Way to NYC

By Georgia Gee
NYC mayor Eric Adams wants to test Evolvโ€™s gun-detection tech in subway stationsโ€”despite the company saying itโ€™s not designed for that environment. Emails obtained by WIRED show how the company still found an in.

The $2.3 Billion Tornado Cash Case Is a Pivotal Moment for Crypto Privacy

By Andy Greenberg
Tuesdayโ€™s verdict in the trial of Alexey Pertsev, a creator of crypto-privacy service Tornado Cash, is the first in a string of cases that could make it much harder to skirt financial surveillance.

Welcome to the Laser Wars

By Jared Keller
Amid a rising tide of adversary drones and missile attacks, laser weapons are finally poised to enter the battlefield.

Microsoft Deploys Generative AI for US Spies

By Dhruv Mehrotra, Andrew Couts
Plus: China is suspected in a hack targeting the UKโ€™s military, the US Marines are testing gun-toting robotic dogs, and Dell suffers a data breach impacting 49 million customers.

โ€˜TunnelVisionโ€™ Attack Leaves Nearly All VPNs Vulnerable to Spying

By Dan Goodin, Ars Technica
TunnelVision is an attack developed by researchers that can expose VPN traffic to snooping or tampering.

Top FBI Official Urges Agents to Use Warrantless Wiretaps on US Soil

By Dell Cameron, William Turton
An internal email from FBI deputy director Paul Abbate, obtained by WIRED, tells employees to search for โ€œUS personsโ€ in a controversial spy program's database that investigators have repeatedly misused.

Secure Firewall & Multicloud Defense: Secure Connectivity With Simplified Policy Across Clouds

By Christopher Consolo
Learn how Cisco is bringing on-prem and cloud security together into a unified platform to marry the power of Cisco Secure Firewall and Multicloud Defense.

A (Strange) Interview With the Russian-Military-Linked Hackers Targeting US Water Utilities

By Andy Greenberg
Despite Cyber Army of Russiaโ€™s claims of swaying US โ€œminds and hearts,โ€ experts say the cyber sabotage group appears to be hyping its hacking for a domestic audience.

The Alleged LockBit Ransomware Mastermind Has Been Identified

By Matt Burgess
Law enforcement officials say theyโ€™ve identified, sanctioned, and indicted the person behind LockBitSupp, the administrator at the heart of LockBitโ€™s $500 million hacking rampage.
โŒ