Generative Data Intelligence

Tag: exfiltration

eXotic Visit campaign: Tracing the footprints of Virtual Invaders

ESET researchers have discovered an active espionage campaign targeting Android users with apps primarily posing as messaging services. While these apps offer functional services...

Top News

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations. Indeed, network analysis and visibility...

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations. Indeed, network analysis and visibility...

Federated learning on AWS using FedML, Amazon EKS, and Amazon SageMaker | Amazon Web Services

This post is co-written with Chaoyang He, Al Nevarez and Salman Avestimehr from FedML. Many organizations are...

Large language model inference over confidential data using AWS Nitro Enclaves | Amazon Web Services

This post is co-written with Justin Miles, Liv d’Aliberti, and Joe Kovba from Leidos.  Leidos is a Fortune...

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans through a targeted watering hole (also known as...

Risk, Fraud and Compliance: 12 tech trends and predictions for 2024

As in other industries, the explosion of generative AI (GenAI) has forced the financial services sector to quickly adapt while riding a wave of...

‘Illusive’ Iranian Hacking Group Ensnares Israeli, UAE Aerospace and Defense Firms

An Iranian Revolutionary Guard Corps (IGRC)-linked threat group is staging political messaging and phony technical jobs to fool employees and compromise systems at aerospace...

Redesigning the Network to Fend Off Living-Off-the-Land Tactics

With adversaries increasingly relying on legitimate tools to hide their malicious activities, enterprise defenders have to rethink the network architecture in order to detect...

Lovers’ Spat? North Korea Backdoors Russian Foreign Affairs Ministry

North Korean state hackers appear to be spying on Russia, by planting a backdoor inside of bespoke, internal government software.In mid-January 2024, a sample...

Hubris May Have Contributed to Downfall of Ransomware Kingpin LockBit

For all its vaunted success, the LockBit ransomware operation appears to have already been beset by problems when an international law enforcement effort led...

Meta Disrupts 8 Spyware Firms, 3 Fake News Networks

Meta has identified and interrupted six spyware networks linked to eight companies in Italy, Spain, and the United Arab Emirates, as well as three...

Surge in ‘Hunter-Killer’ Malware Uncovered by Picus Security

PRESS RELEASESAN FRANCISCO, Feb. 13, 2024 /PRNewswire/ -- Picus Security, the Security Validation company, has released the Picus Red Report 2024. This fourth annual report shares learnings from...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?