You might have heard about Phylax Systems, but what are we building? Here is a 70-page whitepaper to explain the Credible Layer, a new type of hack prevention protocol: https://t.co/qjvs3OfUqm Join the Discourse here: https://lnkd.in/gjFfDA3G This is not a peer-reviewed paper, just a look into what we are building (still working on things here and there. We hope it fosters discussion and generates questions.
Phylax Systems的动态
最相关的动态
-
?? In a recent enlightening post by Marcus Hutchins, which mentioned?'stackstrings' a clever technique employed by malware to evade detection by hiding text strings from static analysis tools. Building on that discussion, I'd like to introduce two additional, yet simple and elegant techniques to achieve the same thing, As you can see in the picture, the 'T' has the handle for 'kernel32.dll' using the three methods. Regarding the location of the string, all of them reside on the stack. Just take a look at the addresses of those variables for a clearer understanding. link to the post by Marcus: https://lnkd.in/eAB4Jy_W ????????: check this => https://lnkd.in/ewuQRvNW
要查看或添加评论,请登录
-
Chainguard's response to CVE-2024-3094, aka the backdoor in xz library: https://lnkd.in/e3-drGxv TLDR: If you use Chainguard Images, our minimal images do not include?SSH?or?liblzma?by default, thus protecting our users and customers from upstream attack vectors if our solutions were to be targeted. Chainguard’s approach to rapid updates also plays an important factor in our vulnerability response time. Within a few hours, we were able to identify use of the affected?liblzma?package in Images, withdraw it from our environments and rebuild Images with the unaffected versions to protect our users and customers.
要查看或添加评论,请登录
-
I just published Nuclei: The Ultimate Guide to Fast and Customizable Vulnerability Scanning https://lnkd.in/dRBDmt5d
Nuclei: The Ultimate Guide to Fast and Customizable Vulnerability Scanning
medium.com
要查看或添加评论,请登录
-
There is funding widely available for: - Adding more features, call now! - Finding and fixing security holes, find your bounty! There is insufficient or NULL funding for: - Long term maintenance. - Triaging , Reproducing, Isolating bugs. - Removing features or protocols that are obsolete or dangerous - Gracefully retiring components that are no longer actively developed, yet in widespread use.
要查看或添加评论,请登录
-
AI is an evolving landscape with its implications for data security. Rob Juncker, SVP of Product & Engineering at Mimecast, explores the challenges and opportunities in managing AI-generated content and IP protection. Dive into the discussion for insights on staying secure in 2025 and beyond.
Cyber professionals face an IP loss reckoning in 2025 - Help Net Security
share.postbeyond.com
要查看或添加评论,请登录
-
As in the early days of open source, fear of vulnerabilities and risk is slowing the adoption of AI-generated code and preventing organizations from realizing its full potential. ?? Learn more about securing AI-generated code with the help from Synopsys?? : https://bit.ly/3wESnZ0
要查看或添加评论,请登录
-
Needing an explanation of the "SlashandGrab" Screenconnect vulnerability so simple that even your grandma can understand? https://lnkd.in/gviGUZcK
SlashAndGrab: The ConnectWise ScreenConnect Vulnerability Explained | Huntress
huntress.com
要查看或添加评论,请登录
-
Explore the Penpie Hack Analysis! Learn how a reentrancy vulnerability led to a $27M loss. Uncover the details of the exploit and discover key strategies to protect your protocols. Read more on our blog: https://lnkd.in/dS3rzc98
要查看或添加评论,请登录
-
?? New Lab Announcement: Developer Mistake or Insider Risk ?? Link: https://lnkd.in/d7wwtv4a I'm excited to announce the launch of our latest hands-on lab! ???? In this lab, you will dive deep into how attackers exploit seemingly legitimate scripts to create backdoors, leading to full system compromise. You'll explore how to: ?? Investigate attacker techniques like system enumeration and persistence ?? Detect command-and-control (C2) communication ?? Analyze system logs and identify malicious activity Perfect for anyone looking to enhance their Memory & Disk Forensic skills! #Cybersecurity #Infosec #ThreatDetection #MalwareAnalysis #C2Framework #ThreatHunting #SecurityLabs #BlueTeam #CyberAwareness #DFIR #MemoryForensic #Forensic
?? New Lab Alert?? Link: https://lnkd.in/d49448cZ We're excited to announce the launch of our latest lab, where you'll learn how attackers use scripts to create backdoors and gain system access. Sharpen your skills by investigating C2 frameworks, system persistence, and more! #Cybersecurity #Infosec #ThreatDetection #MalwareAnalysis #C2Framework #ThreatHunting #SecurityLabs #BlueTeam #CyberAwareness #DFIR #MemoryForensic #Forensic
Developer Mistake Or Insider Risk
lab.threatbreach.io
要查看或添加评论,请登录