Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction
Highlights   Â
Perform a case study on using Transformer models to solve cyber security problems
Train a Transformer model to detect malicious URLs under multiple training regimes
Compare our model...
Bot ‘FreakOut’ leverages three critical vulnerabilities to attack Linux systems
By:
Steve Zurier
Researchers discovered a new Internet Relay Chat (IRC) bot Tuesday that exploited three vulnerabilities to...
SolarWinds Malware Arsenal Widens with Raindrop
The post-compromise backdoor installs Cobalt Strike to help attackers more laterally through victim networks.
An additional piece of malware, dubbed Raindrop, has been unmasked in the sprawling SolarWinds supply-chain attacks....
Rob Joyce to Take Over as NSA Cybersecurity Director
Joyce will replace Anne Neuberger, who is now deputy national security advisor for the incoming Biden administration.
As the incoming Biden administration continues to shake up federal leadership, the National...
Emulation of Kernel Mode Rootkits With Speakeasy
In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you haven’t had...
Fourth SolarWinds malware strain shows diversity of tactics
By:
Steve Zurier
Researchers have found a fourth strain of malware – Raindrop – that was used in...
Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452
In December 2020, FireEye uncovered and publicly disclosed a widespread attacker campaign that is being tracked as UNC2452. In some, but not all, of the intrusions associated with this...
Sophisticated Hacks Against Android, Windows Reveal Zero-Day Trove
Watering-hole attacks executed by ‘experts’ exploited Chrome, Windows and Android flaws and were carried out on two servers.
Google researchers have detailed a major hacking campaign that was detected in...
Medical Device Security: Diagnosis Critical
Medical-device security has long been a challenge, suffering the same uphill management battle that the entire sprawling mess of IoT gadgets has faced.
A hacked insulin pump is the last...
Data Breach at ‘Resident Evil’ Gaming Company Widens
Capcom, the game developer behind Resident Evil, Street Fighter and Dark Stalkers, now says its recent attack compromised the personal data of up to 400,000 gamers.
A ransomware attack launched...