A threat actor that has been using known old FortiOS vulnerabilities to breach FortiGate devices for years has also been leveraging a clever trick to maintain undetected read-only access to them after the original access vector was locked down.
LLMs' tendency to "hallucinate" code packages that don't exist could become the basis for a new type of supply chain attack dubbed "slopsquatting".
When participating in a Zoom call, you can grant remote control of your computer to others. While this feature may come in handy when dealing with trusted family, friends and colleagues, threat actors have started abusing it to install malware on targets' computer.
Get our news via e-mail Subscribe to get regular updates from Help Net Security. Choose between our daily and weekly newsletters, or you can also opt for specialized newsletters:
Breaking news – sent for major events
Cybersecurity jobs – sent weekly
Open-source cybersecurity tools – sent monthly
Open-source tools you should check out
SWE-agent- A tool that uses LLMs to fix issues in GitHub repositories
Hawk Eye- A scanner that uncovers secrets and PII across platforms
Attack Flow- Learn how cyber adversaries combine and sequence offensive techniques
No comments:
Post a Comment