Aggregator
U.S. CISA adds PTZOptics camera bugs to its Known Exploited Vulnerabilities catalog
Strengthen Cyber Resilience: A Checklist for ITOps and SecOps Collaboration
Building cyber resilience so that you can persistently prevent, withstand, and recover from disruptions to your network infrastructure is becoming increasingly important.
The post Strengthen Cyber Resilience: A Checklist for ITOps and SecOps Collaboration appeared first on Security Boulevard.
Configuración de dispositivo físico para pruebas de pentesting Android
New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers
Pacific Rim: Chronicling a 5-year Hacking Escapade
Contributors to this post: Mickey Shkatov, Alex Bazhaniuk So What Happened? Last week, Sophos released a bombshell report on what they’re calling “Pacific Rim”—and no, we’re not talking about giant robots fighting sea monsters. Sophos chronicles a five-year ordeal involving nation-state threat actors targeting network appliances, particularly Sophos firewalls. The discovery has been documented in […]
The post Pacific Rim: Chronicling a 5-year Hacking Escapade appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.
The post Pacific Rim: Chronicling a 5-year Hacking Escapade appeared first on Security Boulevard.
Rhysida
CVE-2021-44790 | Oracle Communications Session Route Manager up to 8.x Third Party out-of-bounds write (EDB-51193)
AIs Discovering Vulnerabilities
I’ve been writing about the possibility of AIs automatically discovering code vulnerabilities since at least 2018. This is an ongoing area of research: AIs doing source code scanning, AIs finding zero-days in the wild, and everything in between. The AIs aren’t very good at it yet, but they’re getting better.
Here’s some anecdotal data from this summer:
Since July 2024, ZeroPath is taking a novel approach combining deep program analysis with adversarial AI agents for validation. Our methodology has uncovered numerous critical vulnerabilities in production systems, including several that traditional Static Application Security Testing (SAST) tools were ill-equipped to find. This post provides a technical deep-dive into our research methodology and a living summary of the bugs found in popular open-source tools...
The post AIs Discovering Vulnerabilities appeared first on Security Boulevard.