anders.infosec πŸ’¬

70 Followers
169 Following
97 Posts

Cybersecurity enthusiast | Fan of digital privacy | Dad | Partaker of the 2022 Twitter migration

Thoughts and opinions are not my own, but rather the result of careful programming and manipulation by my overlords. Resistance is futile.

LinkedInhttps://www.linkedin.com/in/anderskahlke/

We are so lucky that the regreSSHion vulnerability (CVE-2024-6387) is a race condition vuln and not an instant exploitation. Imagine having the Crowdstrike incident and low complexity SSH vulnerability in the same month.

#infosec

this is so embarrassing lol
Commercial spyware (like Microsoft Recall) is a bigger data privacy threat than actual threat actors. It's crazy that this isn't even a controversial take.
@hacks4pancakes whats even worse is when people "flex" with it like its soooooo cool that they work their assess off off the clock
@0xamit Is it actually practical in any way or just a cute gimmick? :)

Currently doing a risk assessment of our companies use of GenAI and a thought popped up around the integrity of output data that has been "altered" due to bias filters.

Consider a scenario where we're analyzing communications or documents with racist or sexual undertones as part of a legal investigation or something similar.

Could the AI's bias filters, designed to avoid generating or interacting with offensive content, inadvertently omit or alter crucial parts of these datasets?

Im curious to hear if this is a legitimate concern and if there are any way of checking if the output given by the models have been "altered" due to bias filters.

#infosec #ai #cybersecurity

@vampiress This looks awesome! :)

I want to do a write up on interesting unconventional c2 channels. Right now i have: Google Calender, Twitter, Pinterest. Image Providers (Imgflig).

Does anyone have examples of others? Doesn't have to be exploited in the wild.

#cybersecurity #infosec #threat_intelligence #threatintel

Check Point Research has reported a significant change in the malware landscape. NJRat, a Remote Access Trojan (RAT) known for targeting Middle Eastern government agencies, has become the second most common malware. At the same time, a new mal-spam campaign has been discovered, spreading #AgentTesla through email attachments that pretend to be legitimate order and shipment documents. πŸ‘ΎπŸ“§ #Malware #Cybersecurity

AgentTesla, now the sixth most frequently used malware, is particularly dangerous. It can capture keystrokes, clipboard data, and send unauthorized data to a Command & Control server. The education sector is the most targeted by these cyber threats. Additionally, the report highlights the "Zyxel ZyWALL Command Injection (CVE-2023-28771)" as the most exploited vulnerability, affecting 42% of organizations worldwide. πŸ’»πŸ”’ #AgentTesla #CyberThreats #Vulnerability

It's crucial for businesses to stay vigilant, especially as we approach the busy shopping season. Be cautious of cybercriminals' sophisticated tactics, such as impersonating brands and sending malicious email attachments. πŸ›οΈπŸš« #Cybersecurity #Phishing

Source: Blog By Check Point Team

October 2023’s Most Wanted Malware: NJRat Jumps to Second Place while AgentTesla Spreads through new File Sharing Mal-Spam Campaign

Check Point Blog

Listening to Dark Synthwave while doing GRC work to make me feel like i am actually the hacker-type-person that i wish i was.

Song: https://open.spotify.com/track/7oxnK2wg8qFv8EXyyxKDJ4?si=b59bcf1b5f284a69

#cybersecurity

Roller Mobster

Carpenter Brut Β· Song Β· 2015

Spotify