mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#cybersecurity

492 Beiträge224 Beteiligte8 Beiträge heute

🤷‍♀️ Ok, we might be a day late for #AIAppreciationDay — but it's never too late to talk about AI development... especially when #Graylog's Jim Nitterauer is quoted on the topic, in AI Business! 👏 In fact, several industry luminaries weighed in on the conversation, in this article by Berenice Baker.

See what these experts (in addition to our own Jim Nitterauer) have to say about AI development, breakthroughs in generative models, agentic AI, ethical AI frameworks, human-machine collaboration, and more:
👉 Charles Herring, CEO and co-founder, WitFoo
👉 Ariful Huq, co-founder and head of product, Exaforce Inc.
👉 Ian Cameron, vice president, product management, March Networks
👉 Shai Gabay – co-founder and CEO, Trustmi
👉 Evan Reiss, vice president, head of marketing, Foxit
👉 Mike Kiersey, global vice president of solution consulting, Workato
👉 Ezzeldin Hussein, senior director, solutions engineering at SentinelOne
👉 Mehdi Goodarzi, global head – generative AI consulting, Hexaware Technologies
👉 Vivek Behl, VP Strategy, WalkMe™
👉 Spencer Kimball, CEO and co-founder, Cockroach Labs
👉 Rosaria Silipo, head of data science evangelism, KNIME
👉 Justin Silver, principal AI strategist, PROS

As Jim says, "AI isn't just transforming workflows. It is redefining the boundaries of trust, privacy and accountability." And we're excited to see where it goes from here!

aibusiness.com/generative-ai/a #artificialintelligence #AIsecurity #cybersecurity

This guide for embedded and IoT engineers covers secure system design from the ground up: cryptographic implementation, secure identity, memory protection, secure boot, system monitoring, and more.

Includes real-world case studies like AppArmor, MQTT, and firmware update strategies using SWUpdate. Designed for those who want to secure connected devices—without losing performance.

nostarch.com/engineering-secur

DNS: A Small but Effective C2 system

This analysis explores the exploitation of DNS for command-and-control operations and data exfiltration. It details how cybercriminals leverage DNS tunneling to create covert communication channels, bypassing traditional security measures. The article examines various DNS tunneling families, including Cobalt Strike, DNSCat2, and Iodine, discussing their prevalence and unique characteristics. It also highlights Infoblox's Threat Insight machine learning algorithms, which can detect and block tunneling domains within minutes. The study provides insights into the detection rates of different tunneling families and discusses the challenges in differentiating between legitimate and malicious DNS traffic.

Pulse ID: 6878f6e5d14da64ae460ad61
Pulse Link: otx.alienvault.com/pulse/6878f
Pulse Author: AlienVault
Created: 2025-07-17 13:13:08

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

SVG Smuggling - Image Embedded JavaScript Redirect Attacks

Threat actors are increasingly using Scalable Vector Graphics (SVG) files to deliver JavaScript-based redirect attacks. These SVGs contain embedded, obfuscated JavaScript that initiates browser redirects to attacker-controlled infrastructure. The campaign uses email spoofing and impersonation to deliver the SVGs, bypassing traditional file-based detection. The embedded code uses XOR encryption and reconstructs the redirect command at runtime. The attack targets B2B Service Providers, including those handling corporate financial and employee data. Mitigation strategies include implementing DMARC policies, blocking SVG attachments, and enhancing email security measures. The campaign demonstrates a shift towards smuggling techniques that avoid triggering traditional security alerts.

Pulse ID: 6878f6e6ce9d5286edc46238
Pulse Link: otx.alienvault.com/pulse/6878f
Pulse Author: AlienVault
Created: 2025-07-17 13:13:10

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
#Browser#CyberSecurity#Email