exfiltration
-
Hi, I am a cybersec analyst for 4 years now. I just got a new job, and we have an alert set up for DNS Exfiltration.
-
Windows NT LAN Manager tokens could be exposed in a new attack leveraging forced authentication through a custom Microsoft Access file, The Hacker News reports.
-
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
-
Skip to content .fusion-meta-info { float:left; margin-right: 5px; } – 1 min read Related Posts Page load link
-
…and introducing Sophos X-Ops’ new video channel, which provides viewers (and readers too) with a little something extra
-
As a Security Operations Center (SOC) analyst, it’s essential to be aware of various data exfiltration techniques to detect and prevent potential data breaches. Data exfiltration refers to the unauthorized transfer of data from within an organization to an external or unauthorized destination. Here are some top data exfiltration techniques that SOC analysts should be…
-
Exclusive: Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more)
-
Forty-five malicious NPM and PyPI packages have been deployed by threat actors to facilitate extensive data theft operations as part of a campaign that commenced on Sept. 12, according to BleepingComputer. Attackers behind the campaign, which was initially discovered by Sonatype researchers, distributed the malicious packages in seven or more attack waves, with the first…
-
During an Indirect Prompt Injection Attack an adversary can exfiltrate chat data from a user by instructing ChatGPT to render images and append information to the URL (Image Markdown Injection), or by tricking a user to click a hyperlink. Sending large amounts of data to a third party server via URLs might seem inconvenient or…
-
Malicious NPM packages developed by “lexi2” have been deployed in new data exfiltration attacks against software developers, reports SiliconAngle. Installation of the package prompts the automated execution of files, including the “index.js” script, which gathers operating system usernames and working directories in compromised machines that are then delivered to a predefined FTP server, according to…
-
This video highlights the various data exfiltration vulnerabilities I discovered and responsibly disclosed to Microsoft, Anthropic, ChatGPT and Plugin Developers.
-
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
-
/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to provide value to security practitioners, students, researchers, and hackers everywhere.
-
I recently worked with an enterprise customer who experienced a data exfiltration attack using the characteristics of the BazaCall campaign. BazaCall can be both a ransomware and data exfiltration attack that are used together to increase pressure on and damage to the victim. Microsoft Purview has data security capabilities that form part of a holistic…