Researchers Claim They Bypassed Cylance's AI-Based Antivirus
Researchers at Australia-based cybersecurity firm Skylight claim to have found a way to trick Cylance’s AI-based antivirus engine into classifying malicious files as benign.
Cylance, which last year was acquired by BlackBerry and is now called BlackBerry Cylance, told SecurityWeek it has launched an investigation to determine if the researchers’ findings are valid or if their method works as a result of a misconfiguration of the product.
https://www.securityweek.com/researchers-claim-they-bypassed-cylances-ai-based-antivirus
Researchers at Australia-based cybersecurity firm Skylight claim to have found a way to trick Cylance’s AI-based antivirus engine into classifying malicious files as benign.
Cylance, which last year was acquired by BlackBerry and is now called BlackBerry Cylance, told SecurityWeek it has launched an investigation to determine if the researchers’ findings are valid or if their method works as a result of a misconfiguration of the product.
https://www.securityweek.com/researchers-claim-they-bypassed-cylances-ai-based-antivirus
SecurityWeek
Researchers Claim They Bypassed Cylance’s AI-Based Antivirus
Researchers at Australia-based cybersecurity firm Skylight claim to have found a way to trick Cylance’s AI-based antivirus engine into classifying malicious files as benign.
Russian Intelligence Found Trying to Crack Tor Browser by Taking part in the Network
A hacker group compromised Russia’s Secret Intelligence Agency and they gained access to terabytes of data stored by the FSB contractor that includes the secret project details.
BBC learned that hackers who breached Russian intelligence contractor found that they are working towards cracking Tor browser as part of their secret project. It is still unclear how successful it will be, it heavily depends on the luck matching to Tor users activity.
A hacker group compromised Russia’s Secret Intelligence Agency and they gained access to terabytes of data stored by the FSB contractor that includes the secret project details.
BBC learned that hackers who breached Russian intelligence contractor found that they are working towards cracking Tor browser as part of their secret project. It is still unclear how successful it will be, it heavily depends on the luck matching to Tor users activity.
Forwarded from P0SCon
Buy a ticket and join #P0SCon2019
https://evand.com/events/دومین-نشست-بین-المللی-امنیت-سایبری-p0scon-68836830
Topics of Interest:
✅ Malware Analysis
✅ Software Exploitation
✅ Embedded Devices
✅ OSINT
✅ Cryptocurrency
✅ DarkNet
✅ Attack or Defense Tools
✅ Web Security
Date:
12 Oct 2019
Urmia University of Technology
@P0SCon
https://evand.com/events/دومین-نشست-بین-المللی-امنیت-سایبری-p0scon-68836830
Topics of Interest:
✅ Malware Analysis
✅ Software Exploitation
✅ Embedded Devices
✅ OSINT
✅ Cryptocurrency
✅ DarkNet
✅ Attack or Defense Tools
✅ Web Security
Date:
12 Oct 2019
Urmia University of Technology
@P0SCon
ایوند
دومین نشست بین المللی امنیت سایبری P0SCon - شنبه ۲۰ مهر ۹۸
خرید بلیت و ثبتنام دومین نشست بین المللی امنیت سایبری P0SCon در ایوند - زمان: شنبه ۲۰ مهر ۹۸ - موضوع: غیره
Forwarded from Mir Saman Tajbakhsh
Demo of creating Hidden Mail Service over TOR:
https://youtu.be/E2x5CmjPXPw
More information can be found in:
https://mstajbakhsh.ir/creating-hidden-mail-service/
https://youtu.be/E2x5CmjPXPw
More information can be found in:
https://mstajbakhsh.ir/creating-hidden-mail-service/
YouTube
Installing and Configure Hidden Mail Service over TOR
Demo of installing and configuring a hidden email service behind TOR anonymity network using hMailServer. Additionally it is shown that using Thunderbird (the email client), users can access the hidden email server and communicate over it.
More information…
More information…
Vulnerabilities in 5G
1) A protocol vulnerability in 4G and 5G specification that allows the fake base station to steal information about the device and mount identification attacks
2) Implementation vulnerability in cellular network operator equipment that can be exploited during a device registration phase
3) A protocol vulnerability that affects the battery life of low-powered devices
https://infosec.sintef.no/en/informasjonssikkerhet/2019/08/new-vulnerabilities-in-5g-security-architecture-countermeasures/
1) A protocol vulnerability in 4G and 5G specification that allows the fake base station to steal information about the device and mount identification attacks
2) Implementation vulnerability in cellular network operator equipment that can be exploited during a device registration phase
3) A protocol vulnerability that affects the battery life of low-powered devices
https://infosec.sintef.no/en/informasjonssikkerhet/2019/08/new-vulnerabilities-in-5g-security-architecture-countermeasures/
infosec.sintef.no
New vulnerabilities in 5G Security Architecture & Countermeasures (Part 1)
The 5G network promises to transform industries and our digital society by providing enhanced capacity, higher data rates, increased battery life for machine-type devices, higher availability and reduced power consumptions. In a way, 5G will act as a vehicle…
Forwarded from CTF Community | Hints
Automated Detection of Web Application Firewall
https://github.com/EnableSecurity/wafw00f
#web
#Pentest
@ctfplay
https://github.com/EnableSecurity/wafw00f
#web
#Pentest
@ctfplay
GitHub
GitHub - EnableSecurity/wafw00f: WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting…
WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website. - EnableSecurity/wafw00f
https://research.checkpoint.com/black-hat-2019-whatsapp-protocol-decryption-for-chat-manipulation-and-more/
https://github.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint
https://github.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint
Check Point Research
Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More - Check Point Research
Research By: Dikla Barda, Roman Zaikin and Oded Vanunu According to sources, WhatsApp, the Facebook-owned messaging application has over 1.5 billion users in over 180 countries. The average user checks WhatsApp more than 23 times per day. And, the number…
https://medium.com/@valeriyshevchenko/jenkins-rce-poc-or-simple-pre-auth-remote-code-execution-on-the-server-d18b868a77cb
#BugBounty
#writeup
#BugBounty
#writeup
Medium
Jenkins RCE PoC or simple pre-auth remote code execution on the Server.
Once upon a time, a friend of mine asked me a question — "Do you know any fresh RCE for the Jenkins environment ?". I was informed already…