Skip to content

Research

Security and Technology news from various third party sources. All attribution remains the property of the original authors

137 Topics 137 Posts
  • 0 Votes
    1 Posts
    32 Views
    CerberusC

    When ChatGPT and similar chatbots first became widely available, the concern in the cybersecurity world was how AI technology could be used to launch cyberattacks. In fact, it didn’t take very long until threat actors figured out how to bypass the safety checks to use ChatGPT to write malicious code. It now seems that the […]

    The post ChatGPT Confirms Data Breach, Raising Security Concerns appeared first on Security Intelligence.

    https://securityintelligence.com/articles/chatgpt-confirms-data-breach/

  • 0 Votes
    1 Posts
    37 Views
    CerberusC

    Top insights are in from this year’s IBM Security X-Force Threat Intelligence Index, but what do they mean? Three IBM Security X-Force experts share their thoughts on the implications of the most pressing cybersecurity threats, and offer guidance for what organizations can do to better protect themselves. Moving Left of Boom: Early Backdoor Detection Andy […]

    The post Expert Insights on the X-Force Threat Intelligence Index appeared first on Security Intelligence.

    https://securityintelligence.com/posts/expert-insights-x-force-threat-intelligence-index/

  • 0 Votes
    1 Posts
    37 Views
    CerberusC

    This blog was made possible through contributions from Christopher Caridi.  IBM Security X-Force recently discovered a new malware family we have called “Domino,” which we assess was created by developers associated with the cybercriminal group that X-Force tracks as ITG14, also known as FIN7. Former members of the Trickbot/Conti syndicate which X-Force tracks as ITG23 […]

    The post Ex-Conti and FIN7 Actors Collaborate with New Domino Backdoor appeared first on Security Intelligence.

    https://securityintelligence.com/posts/ex-conti-fin7-actors-collaborate-new-domino-backdoor/

  • 0 Votes
    1 Posts
    28 Views
    CerberusC

    The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a […]

    The post X-Force Identifies Vulnerability in IoT Platform appeared first on Security Intelligence.

    https://securityintelligence.com/posts/x-force-identifies-vulnerability-iot-platform/

  • 0 Votes
    1 Posts
    31 Views
    CerberusC

    This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The X-Force Vulnerability and Exploit Database shows that the number of zero days being released each year is on the rise, but X-Force has observed that only a few of these zero days are rapidly adopted by cyber criminals each year. While […]

    The post X-Force Prevents Zero Day from Going Anywhere appeared first on Security Intelligence.

    https://securityintelligence.com/posts/x-force-prevents-zero-day-from-going-anywhere/

  • 0 Votes
    1 Posts
    20 Views
    CerberusC

    ‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption […]

    The post Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours appeared first on Security Intelligence.

    https://securityintelligence.com/posts/patch-tuesday-exploit-wednesday-pwning-windows-ancillary-function-driver-winsock/

  • 0 Votes
    1 Posts
    14 Views
    CerberusC

    In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as […]

    The post When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule appeared first on Security Intelligence.

    https://securityintelligence.com/posts/defensive-considerations-lazarus-fudmodule/

  • 0 Votes
    1 Posts
    26 Views
    CerberusC

    The Challenge with Using Cobalt Strike for Advanced Red Team Exercises While next-generation AI and machine-learning components of security solutions continue to enhance behavioral-based detection capabilities, at their core many still rely on signature-based detections. Cobalt Strike being a popular red team Command and Control (C2) framework used by both threat actors and red teams […]

    The post Defining the Cobalt Strike Reflective Loader appeared first on Security Intelligence.

    https://securityintelligence.com/posts/defining-cobalt-strick-reflective-loader/

  • 0 Votes
    1 Posts
    26 Views
    CerberusC

    Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands […]

    The post Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023 appeared first on Security Intelligence.

    https://securityintelligence.com/posts/2023-x-force-threat-intelligence-index-report/

  • 0 Votes
    1 Posts
    23 Views
    CerberusC

    Overview In this post, IBM Security X-Force Red offensive hackers analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. Over the last few years, public accounts have increasingly shown that less sophisticated attackers are using this technique to achieve their objectives. It is therefore important that we put […]

    The post Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers appeared first on Security Intelligence.

    https://securityintelligence.com/posts/direct-kernel-object-manipulation-attacks-etw-providers/

  • 0 Votes
    1 Posts
    22 Views
    CerberusC

    The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos […]

    The post Kronos Malware Reemerges with Increased Functionality appeared first on Security Intelligence.

    https://securityintelligence.com/kronos-malware-reemerges-increased-functionality/

  • 0 Votes
    1 Posts
    29 Views
    CerberusC

    On September 19, 2022, an 18-year-old cyberattacker known as “teapotuberhacker” (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website GTAForums.com. Gamers got an unsanctioned sneak peek of […]

    The post An IBM Hacker Breaks Down High-Profile Attacks appeared first on Security Intelligence.

    https://securityintelligence.com/posts/an-ibm-hacker-breaks-down-high-profile-attacks/

  • 0 Votes
    1 Posts
    40 Views
    CerberusC

    September’s Patch Tuesday unveiled a critical remote vulnerability in tcpip.sys, CVE-2022-34718. The advisory from Microsoft reads: “An unauthenticated attacker could send a specially crafted IPv6 packet to a Windows node where IPsec is enabled, which could enable a remote code execution exploitation on that machine.” Pure remote vulnerabilities usually yield a lot of interest, but […]

    The post Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP” appeared first on Security Intelligence.

    https://securityintelligence.com/posts/dissecting-exploiting-tcp-ip-rce-vulnerability-evilesp/

  • Self-Checkout This Discord C2

    1
    0 Votes
    1 Posts
    24 Views
    CerberusC

    In November 2022, during an incident investigation involving a self-checkout point-of-sale (POS) system in Europe, IBM Security X-Force identified a novel technique employed by an attacker to introduce a command and control (C2) channel built upon Discord channel messages. Discord is a chat, voice, and video service enabling users to join and create communities associated […]

    The post Self-Checkout This Discord C2 appeared first on Security Intelligence.

    https://securityintelligence.com/posts/self-checkout-discord-c2/

  • A View Into Web(View) Attacks in Android

    1
    0 Votes
    1 Posts
    25 Views
    CerberusC

    James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware […]

    The post A View Into Web(View) Attacks in Android appeared first on Security Intelligence.

    https://securityintelligence.com/posts/view-into-webview-attacks-android/

  • 0 Votes
    1 Posts
    25 Views
    CerberusC

    This post was written with contributions from Joseph Lozowski. Comprehensive incident preparedness requires building out and testing response plans that consider the possibility that threats will bypass all security protections. An example of a threat vector that can bypass security protections is “shadow IT” and it is one that organizations must prepare for. Shadow IT […]

    The post Beware of What Is Lurking in the Shadows of Your IT appeared first on Security Intelligence.

    https://securityintelligence.com/posts/beware-lurking-shadows-it/

  • 0 Votes
    1 Posts
    32 Views
    CerberusC

    Generation Z, which Pew Research Center defines as those born after 1996, is considered the first digital-native generation. This group of young people always has the latest technology at their fingertips. Yet even with this strong digital connection, the National Cybersecurity Alliance (NCSA) found that Gen Zers have higher cyber incident victimization rates than previous […]

    The post How to Embed Gen Z in Your Organization’s Security Culture appeared first on Security Intelligence.

    https://securityintelligence.com/posts/gen-z-cybersecurity-culture/

  • 0 Votes
    1 Posts
    23 Views
    CerberusC

    In September 2022, Microsoft patched an information disclosure vulnerability in SPNEGO NEGOEX (CVE-2022-37958). On December 13, Microsoft reclassified the vulnerability as “Critical” severity after IBM Security X-Force Red Security Researcher Valentina Palmiotti discovered the vulnerability could allow attackers to remotely execute code. The vulnerability is in the SPNEGO Extended Negotiation (NEGOEX) Security Mechanism, which allows […]

    The post Critical Remote Code Execution Vulnerability in SPNEGO Extended Negotiation Security Mechanism appeared first on Security Intelligence.

    https://securityintelligence.com/posts/critical-remote-code-execution-vulnerability-spnego-extended-negotiation-security-mechanism/

  • 0 Votes
    1 Posts
    29 Views
    CerberusC

    Applications have historically been deployed and created in a manner reminiscent of classic shopping malls. First, a developer builds the mall, then creates the various stores inside. The stores conform to the dimensions of the mall and operate within its floor plan. In older approaches to application development, a developer would have a targeted system or […]

    The post Containers, Security, and Risks within Containerized Environments appeared first on Security Intelligence.

    https://securityintelligence.com/posts/containers-security-risks-containerized-environments/

  • RansomExx Upgrades to Rust

    1
    0 Votes
    1 Posts
    30 Views
    CerberusC

    IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this […]

    The post RansomExx Upgrades to Rust appeared first on Security Intelligence.

    https://securityintelligence.com/posts/ransomexx-upgrades-rust/