Remove Blog Remove Linux Remove Network Remove Research
article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. We did that for different operating systems – for Windows, macOS and Linux. That was the first stage I'd say.”

Malware 82
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This blog takes a look at the latter technique in recent cryptojacking activity from a group known as WatchDog. Previous blogs about Watchdog attacks report targeting of Chinese network ranges. This includes WatchDog steg payloads from this blog. A less common tactic is to use host files that actually render an image.

Malware 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

ONLY Cortex Delivers 100% Protection and Detection in MITRE Engenuity

Palo Alto Networks

Round 5 (Turla) This year marks the fifth annual evaluation, and the MITRE Engenuity red team focused on emulating the methods of Turla , a threat group our Unit 42 threat researchers have studied extensively. They have targeted government agencies, military groups, diplomatic missions, as well as research and media organizations.

Linux 115
article thumbnail

Cybersecurity Snapshot: How To Boost the Cybersecurity of AI Systems While Minimizing Risks

Tenable

“Advances in technology will break down barriers to entry – borders, languages, skill sets – opening alternate revenue streams, particularly in the cyber domain, and allowing transnational criminal networks to spread,” the report reads. This has lowered the barrier of entry for CTAs with limited technical proficiencies,” the blog adds.

article thumbnail

Radar Trends to Watch: May 2024

O'Reilly Media - Ideas

It collects most of the prompts from his book and his blog; most are Creative Commons, requiring only attribution. sotrace is a new tool for Linux developers that shows all the libraries your programs are linked to. It is distinct from Valkey , the fork launched by the Linux Foundation. Ship it” culture is destructive.

article thumbnail

Microsoft’s January 2024 Patch Tuesday Addresses 48 CVEs (CVE-2024-20674)

Tenable

To exploit this vulnerability, an attacker needs to have established access to a target network. CVE-2024-21318 is credited to multiple researchers at STAR Labs, who in September, published a blog post outlining the successful chaining of two vulnerabilities affecting Microsoft SharePoint Server.

Windows 114
article thumbnail

Agentless Workload Scanning Gets Supercharged with Malware Scanning

Prisma Clud

Using WildFire in 2021 to analyze malicious files, our threat research team discovered a 73% increase in Cobalt Strike malware samples compared to 2020. Users can now gain visibility into vulnerabilities and compliance across Linux and Windows-based cloud workloads for AWS, Azure and GCP — without having to deploy agents.

Malware 76