According to the tag malware, the following results have been found:
Hello everyone! This is Ksenia Naumova. At Positive Technologies, I research malicious network traffic and improve tools for analyzing it at the security expert center. Recently, we were tasked with creating an ML model to detect malware in the network. It had to recognize not only the malware we had previously detected, but also new threats that emerge in large numbers every day. As a first experiment, we decided to build a model to work with traffic transmitted via the HTTP protocol, as our products successfully decrypt TLS sessions, which often contain a lot of interesting data. In this article, I will describe in detail how we trained the model and share information about the mistakes we made.
If you follow the latest news in the field of IT security, you may have noticed an increase in the number of attacks on the network infrastructure of Linux systems. Among the main types of malware you should be aware of are Cloud Snooper, EvilGnome, HiddenWasp, QNAPCrypt, GonnaCry, FBOT, and Tycoon.
The tekkix news service visited the SOC Forum 2024. This is another event dedicated to cybersecurity, organized by the Solar Group of companies. Due to a busy work schedule, I managed to get there only on the third day and only for a few hours. However, I was able to talk with Solar Group specialists about a rather interesting study. It was dedicated to the unique GoblinRAT malware, capable of remaining unnoticed in the infrastructure of attacked organizations thanks to advanced masking and bypassing security systems. The malware was found in the networks of several Russian government organizations and companies providing services to the public sector, with signs of presence since 2020. In each of the affected organizations, the attackers gained full access to the network.
«ChatGPT reveals personal data of real people!», «Side-channel attack on ChatGPT!», «ChatGPT chatbot caused a leak of confidential data!», «Hackers started using ChatGPT in phishing schemes!». — These news headlines reveal the dark side of large language models. Yes, they generate content for us and analyze data, but in addition to convenience, they bring new types of attacks and vulnerabilities that need to be dealt with.