This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Most of the world’s software relies on opensource code that’s written by developers who publish their work for anyone to use. Aboukhadijeh founded Socket earlier this year alongside a team of fellow opensource maintainers who have seen firsthand some of the worst software supply chain attacks in the wild.
Even if you don’t have the training data or programming chops, you can take your favorite opensource model, tweak it, and release it under a new name. According to Stanford’s AI Index Report, released in April, 149 foundation models were released in 2023, two-thirds of them opensource.
A Chinese state-sponsored actor, UNC5147, has been using opensource tools to attack its victims. The attacker has been using a new command and control (C2) tool, the Vshell, in its campaign since January, as well as a variant of Snowlight malware.
During a month that’s seen Android malware new and old plague the world’s most popular mobile operating system, Google says its Play Store is becoming more civilized and less like the Wild West. You have a lower probability of being infected by malware from Play than being hit by lightning,” Ahn says. READ MORE ON ANDROID SECURITY.
WhiteSource this week announced it has acquired Diffend as part of an expended effort to discover malware that has been deliberately injected into opensource software by a contributor acting in bad faith. The post WhiteSource Acquires Diffend to Secure OpenSource Supply Chains appeared first on DevOps.com.
Rodney Mullen About half way through his lecture he drew similarities between skaters, hackers and the open-source community. And yet, like skateboarding, open-source software (OSS) also carries substantial risks and vulnerabilities. But first, what exactly is open-source software? It’s a beautiful thing.
His areas of interest include opensource software security, malware analysis, data breaches, and scam investigations. A developer can, on a whim, change their mind and do whatever they want with their opensource code that, most of the time, anyway comes “as is” without any warranty. Share on Twitter.
We have some exciting news about two new features in Tracee , Aqua’s opensource container and system tracing utility. Tracee can provide user s with timely insights that previously required special knowledge and tools.?.
Google is open-sourcing SynthID, a system for watermarking text so AI-generated documents can be traced to the LLM that generated them. Unlike many of Mistral’s previous small models, these are not opensource. This model is based on the opensource Llama, and it’s relatively small (70B parameters).
One of the most common cryptomining threats for cloud environments is the Kinsing malware. Kinsing is a notorious malware family active for several years, primarily targeting Linux-based cloud infrastructure. The Kinsing malware uses different locations to stay undetected and hides itself as a system file.
And the majority of this activity has been linked to the same python malware dubbed AndroxGh0st with at least one incident tied to an actor known as Xcatze. Note : Laravel is an opensource PHP framework and the Laravel.env file is often targeted for its various configuration data including AWS, SendGrid and Twilio.
The post A Review of OpenSource Software Supply Chain Attacks appeared first on Xebia Blog. In this post, we will discuss how long it takes to detect a malicious package, what happens if you include one of these packages, and what you can do about it. I’ll provide […].
Emerging Threats - now part of Proofpoint - is a world-leading provider of opensource and commercial threat and malware intelligence. Founded in 2003 as a cyber security research community, Emerging Threats has become a de facto standard in network-based malware threat detection.
Stability AI , the startup behind the generative AI art tool Stable Diffusion , today open-sourced a suite of text-generating AI models intended to go head to head with systems like OpenAI’s GPT-4. But Stability AI argues that open-sourcing is in fact the right approach, in fact.
Previously he was staff software engineer and lead for Google’s OpenSource Security Team (GOSST). Log4J epitomizes the garbage-in, garbage-out problem of opensource software: If you’re grabbing no-warranties code from the internet, there are going to be bugs, and some of these bugs will be exploitable. Dan Lorenc.
Meanwhile, Tenable did a deep dive on DeepSeeks malware-creation capabilities. And get the latest on vulnerability prioritization; CIS Benchmarks and opensource software risks. To get all the details, read the blog DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware.
Like the rest of the OLMo family, its completely open: source code, training data, evals, intermediate checkpoints, and training recipes. to modify files directly; for example, it can make changes directly in source code rather than suggesting changes. Its opensource. The text editor tool allows Claude 3.5
A second, more pernicious risk is the fact that ChatGPT can write malware. Sometimes the malware has errors, but with simple repetition the hacker can generate multiple working versions of the code. Such polymorphic malware is particularly hard to detect, because it may be different from one attack to another.
Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter. Collectively, they accounted for 77% of the quarter’s malware infections.
The Unit 42 cybersecurity consulting group published research on the first known malware targeting Windows containers, which was discovered by Unit 42 researcher Daniel Prizmant and named Siloscape. Diagram of Windows container (source: Microsoft). A cluster is the basic architecture of Kubernetes (an open-source container platform).
Use of stolen certificates to sign malware. Theft of gaming source code and infrastructure details. CHM email file attachments containing malware. Evolution of Winnti - Opensource tools, and macOS targeting: Within the Winnti campaigns observed by ProtectWise, the use of opensource tooling was common.
Hunting for Malware. This resulted in numerous hits for Miria variants for various architectures demonstrating how quickly malware authors can adopt PoCs to distribute their malware. Lacework Labs is also beginning to see payloads associated with this vulnerability within their honeypots. Public-Facing BIG-IP Appliances.
GitHub and similar open-source code and project repositories have become a common target of cybercriminals looking to lure developers into unknowingly downloading malicious scripts.
Its success was predicated not on “zero-day” vulnerabilities or new forms of malicious software, but rather on older, known malware delivered via an all-too-familiar method: phishing. The malware included hacked versions of end-to-end encrypted communication apps Signal and WhatsApp.
Skys performance is similar to OpenAI o1-preview, and its fully open: Training data, weights, code, and infrastructure are all opensource. 4M is an opensource framework for training multimodal AI models. Fast-LLM is an opensource library for training large language models. 32B-Instruct.
Codename Goose is a new opensource framework for developing agentic AI applications. It uses Anthropics Model Context Protocol for communicating with systems that have data, and can discover new data sources on the fly. OCR4all provides free and opensource optical character recognition software. 14B-Instruct-1M.
Tracee is an opensource runtime security and forensics tool for Linux that is powered by eBPF and is more optimized for secure tracing. In this blog, we’ll explore the ways to control eBPF events and examine a case of using a BPF event to capture rootkits, a sophisticated type of malware that lives in the kernel space.
This blog was co-authored by Itamar Maouda Two years ago, the NSA (the United States' National Security Agency) revealed that Drovorub, an advanced Russian malware created by the GRU 85th GTsSS team, had been discovered targeting Linux systems. Drovorub works by introducing advanced techniques which can manipulate the Linux operation system.
Called Mozilla.ai , the newly forged company’s mission isn’t to build just any AI — its mission is to build AI that’s opensource and “trustworthy,” according to Mark Surman, the executive president of Mozilla and the head of Mozilla.ai. Surman describes Mozilla.ai ” Mozilla.ai
Plus, opensource developers have a new platform to share threat intelligence. Called Siren, the platform is hosted by the OpenSource Security Foundation (OpenSSF) and aims to provide visibility into the tactics, techniques and procedures, as well as into the indicators of compromise associated with attacks targeting OSS.
Malware Distribution: Cloud exploitation can involve hosting or distributing malware through cloud-based platforms or services. Attackers may upload malicious files or applications to cloud storage or use cloud infrastructure to propagate malware to unsuspecting users. What can businesses do?
ArsTechnica , Bruce Schneier , and other sources have good discussions of the attack and its implications. The malware was introduced into xz Utils by one of its maintainers, an entity named Jia Tan. Over two years, Jia Tan gradually added compromised source files to xz Utils. You can’t go further upstream than that.
Netflix has open-sourced Escrow Buddy, which helps Security and IT teams ensure they have valid FileVault recovery keys for all their Macs in MDM. Users will be more likely to approve other types of password prompt, which may inadvertently prime them to be targeted by malware or ransomware.
Oh, and the White House wants your input on opensource security. The vast majority of enterprises polled – 95% – experienced multiple cyberattacks in the past 12 months, with phishing (74%), malware (60%) and software vulnerability exploits (50%) being the most common. CISA thinks so. And much more!
Automated application scanning tools Again, a wide set of pen testing tools fall under this umbrella (both opensource and commercial). Talking about the tools used in red teaming by different organizations across the globe, there are plenty of red teaming tools, and interestingly, most of the good ones are opensource.
For now, AFRL is experimenting with self-hosted open-source LLMs in a controlled environment. The tool, he said, could eventually be helpful with generating threat intelligence reports, reverse engineering malware, suggesting policy configurations, aggregating security data, and writing code, among other less technical use cases.
Indian energy companies and government entities have been targeted with malware as a means of exfiltrating sensitive information. The malware is a type of updated open-source information stealer malware with the name HackBrowserData. This malware is able to exfiltrate sensitive information by […]
Aqua Tracee is an opensource runtime security and forensics tool for Linux, built to address common Linux security issues. Some alternative use cases which Tracee can be used for are dynamic malware analysis, system tracing, forensic investigations, and more.
Throughout the past three years, an increasing number of opensource software package repositories have been found to contain malware, making it clear that all installation and update pathways for software and library code must have security […].
I know my PC pretty well and I didn’t have any crappy malware accidentally installed. Apparently the issue is that someone added the non-opensource component for Google Now to the opensource code for Chromium. and looked for a process to blame on that dodgy activity. Who is listening to me?
These open-source bootloaders are not household names, but many products they support are: Android devices, ARM-based Chromebooks, Amazon Kindle devices, Lenovo and Asus computers, Apple Airports, Asus routers, Linksys Wi-Fi routers, and LG and Samsung TVs. . RCS delivers new texting features—and old security vulnerabilities.
Based on Index Engines CyberSense and jointly extended, our award-winning InfiniSafe Cyber Detection provides our enterprise customers with the assurance that their primary data is free from cyber anomalies caused by malware and ransomware attacks.
Meanwhile, Carly writes that Google Drive is in the spotlight after it was found that Russian hackers are using the software to hide malware. I’ll try not to freak out at change : Roblox is rolling out an update of what it calls “materials” to make them more lifelike, Taylor writes.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content