Forwarded from DailyCVE
🔴 Craft CMS Remote Code Execution Vulnerability (Critical)
https://dailycve.com/craft-cms-remote-code-execution-vulnerability-critical/
@Daily_CVE
https://dailycve.com/craft-cms-remote-code-execution-vulnerability-critical/
@Daily_CVE
DailyCVE
Craft CMS Remote Code Execution Vulnerability (Critical) - DailyCVE
2024-12-18 : A critical remote code execution (RCE) vulnerability has been discovered in Craft CMS versions prior to 5.5.2 and […]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Benchmarking Arabic and English LLMs for Retrieval-Augmented Question Answering: Introducing SILMA RAGQA V10
https://undercodenews.com/benchmarking-arabic-and-english-llms-for-retrieval-augmented-question-answering-introducing-silma-ragqa-v10/
@Undercode_News
https://undercodenews.com/benchmarking-arabic-and-english-llms-for-retrieval-augmented-question-answering-introducing-silma-ragqa-v10/
@Undercode_News
UNDERCODE NEWS
Benchmarking Arabic and English LLMs for Retrieval-Augmented Question Answering: Introducing SILMA RAGQA V10 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 Chat with #ChatGPT on #WhatsApp or Call it on Your Phone - #AI Goes Retro for Wider Reach
https://undercodenews.com/chat-with-chatgpt-on-whatsapp-or-call-it-on-your-phone-ai-goes-retro-for-wider-reach/
@Undercode_News
https://undercodenews.com/chat-with-chatgpt-on-whatsapp-or-call-it-on-your-phone-ai-goes-retro-for-wider-reach/
@Undercode_News
UNDERCODE NEWS
Chat with ChatGPT on WhatsApp or Call it on Your Phone - AI Goes Retro for Wider Reach - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🤖 The Looming Shadow of Ads on #AI #Chatbots
https://undercodenews.com/the-looming-shadow-of-ads-on-ai-chatbots/
@Undercode_News
https://undercodenews.com/the-looming-shadow-of-ads-on-ai-chatbots/
@Undercode_News
UNDERCODE NEWS
The Looming Shadow of Ads on AI Chatbots - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Hunters #Ransomware Targets Archetype Group
https://undercodenews.com/hunters-ransomware-targets-archetype-group/
@Undercode_News
https://undercodenews.com/hunters-ransomware-targets-archetype-group/
@Undercode_News
UNDERCODE NEWS
Hunters Ransomware Targets Archetype Group - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🕵️ Level Up Your Fitness Journey with the Feature-Packed #Samsung #Galaxy Watch 7
https://undercodenews.com/level-up-your-fitness-journey-with-the-feature-packed-samsung-galaxy-watch-7/
@Undercode_News
https://undercodenews.com/level-up-your-fitness-journey-with-the-feature-packed-samsung-galaxy-watch-7/
@Undercode_News
UNDERCODE NEWS
Level Up Your Fitness Journey with the Feature-Packed Samsung Galaxy Watch 7 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Microsoft's New Ads in #Windows 11: A Closer Look
https://undercodenews.com/microsofts-new-ads-in-windows-11-a-closer-look/
@Undercode_News
https://undercodenews.com/microsofts-new-ads-in-windows-11-a-closer-look/
@Undercode_News
UNDERCODE NEWS
Microsoft's New Ads in Windows 11: A Closer Look - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #ChatGPT Goes Mobile: #OpenAI Expands Accessibility with Phone and #WhatsApp Integration
https://undercodenews.com/chatgpt-goes-mobile-openai-expands-accessibility-with-phone-and-whatsapp-integration/
@Undercode_News
https://undercodenews.com/chatgpt-goes-mobile-openai-expands-accessibility-with-phone-and-whatsapp-integration/
@Undercode_News
UNDERCODE NEWS
ChatGPT Goes Mobile: OpenAI Expands Accessibility with Phone and WhatsApp Integration - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE TESTING
🦑Chatgpt Hack:
Official Repo of ChatGPT "DAN" (and other "Jailbreaks"):
https://github.com/0xk1h0/ChatGPT_DAN
Official Repo of ChatGPT "DAN" (and other "Jailbreaks"):
https://github.com/0xk1h0/ChatGPT_DAN
GitHub
GitHub - 0xk1h0/ChatGPT_DAN: ChatGPT DAN, Jailbreaks prompt
ChatGPT DAN, Jailbreaks prompt. Contribute to 0xk1h0/ChatGPT_DAN development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🎮 #Windows 11 24H2: A Buggy #Update for Gamers
https://undercodenews.com/windows-11-24h2-a-buggy-update-for-gamers/
@Undercode_News
https://undercodenews.com/windows-11-24h2-a-buggy-update-for-gamers/
@Undercode_News
UNDERCODE NEWS
Windows 11 24H2: A Buggy Update for Gamers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔐 Apache Struts Flaw Under Active Attack: Urgent Patching Needed
https://undercodenews.com/apache-struts-flaw-under-active-attack-urgent-patching-needed/
@Undercode_News
https://undercodenews.com/apache-struts-flaw-under-active-attack-urgent-patching-needed/
@Undercode_News
UNDERCODE NEWS
Apache Struts Flaw Under Active Attack: Urgent Patching Needed - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Russia's Undesirable Label: A Badge of Honor for Recorded Future
https://undercodenews.com/russias-undesirable-label-a-badge-of-honor-for-recorded-future/
@Undercode_News
https://undercodenews.com/russias-undesirable-label-a-badge-of-honor-for-recorded-future/
@Undercode_News
UNDERCODE NEWS
Russia's Undesirable Label: A Badge of Honor for Recorded Future - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Hunters #Ransomware Targets Microvision
https://undercodenews.com/hunters-ransomware-targets-microvision/
@Undercode_News
https://undercodenews.com/hunters-ransomware-targets-microvision/
@Undercode_News
UNDERCODE NEWS
Hunters Ransomware Targets Microvision - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Hunters #Ransomware Targets Trev Deeley Motorcycles, Another Victim Falls Prey
https://undercodenews.com/hunters-ransomware-targets-trev-deeley-motorcycles-another-victim-falls-prey/
@Undercode_News
https://undercodenews.com/hunters-ransomware-targets-trev-deeley-motorcycles-another-victim-falls-prey/
@Undercode_News
UNDERCODE NEWS
Hunters Ransomware Targets Trev Deeley Motorcycles, Another Victim Falls Prey - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ Pushing the Boundaries: Fitness, Fire Safety, and Life Support Advancements on the International Space Station
https://undercodenews.com/pushing-the-boundaries-fitness-fire-safety-and-life-support-advancements-on-the-international-space-station/
@Undercode_News
https://undercodenews.com/pushing-the-boundaries-fitness-fire-safety-and-life-support-advancements-on-the-international-space-station/
@Undercode_News
UNDERCODE NEWS
Pushing the Boundaries: Fitness, Fire Safety, and Life Support Advancements on the International Space Station - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑What is Honeypot: Simplified
Follow Santosh Nandakumar for daily simplified infosec learnings.
A honeypot is a security mechanism designed to detect, deflect, or study hacking attempts by acting as a decoy system. It looks like a legitimate target but is isolated from the actual network to gather intelligence on attackers.
Example
Imagine you’re protecting a house (your network) from burglars. You set up a fake house nearby, filled with dummy valuables. Burglars are attracted to this fake house, thinking it’s the real one. You monitor their actions to learn their techniques and better secure your actual house.
Technical Example
You deploy a honeypot server within your corporate network that mimics a database server. It contains no real data but appears authentic to attackers. When an attacker tries to access it, their activities (such as IP, methods, and tools) are logged for analysis.
Types of Honeypots
1. Production Honeypot
Used to improve overall security by distracting attackers from real systems.
Example: A fake customer login page for a banking website.
2. Research Honeypot
Used for studying attack methods and gathering intelligence.
Example: A honeypot server that simulates IoT devices to study botnet attacks.
Usage
- Intrusion Detection: Identify unauthorized access attempts.
- Threat Intelligence: Understand attackers' tools, techniques, and goals.
- Deception Strategy: Divert attackers away from real resources.
- Vulnerability Testing: Study how attackers exploit weaknesses.
Benefits
1. Early Threat Detection: Identifies threats before they reach critical systems.
2. Data Collection: Offers valuable insights into attack patterns and behaviors.
3. Improved Defense: Helps in identifying security gaps and improving defenses.
4. Resource Efficiency: Reduces the workload on actual systems by diverting attacks.
5. Training Ground: Useful for security teams to practice handling real-world threats.
Limitations
1. Limited Scope: Cannot detect attacks on systems outside the honeypot.
2. Risk of Exploitation: If not properly isolated, attackers could use the honeypot to attack real systems.
3. Resource Intensive: Requires setup, monitoring, and maintenance.
Ref: Santosh Nandakumar
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Follow Santosh Nandakumar for daily simplified infosec learnings.
A honeypot is a security mechanism designed to detect, deflect, or study hacking attempts by acting as a decoy system. It looks like a legitimate target but is isolated from the actual network to gather intelligence on attackers.
Example
Imagine you’re protecting a house (your network) from burglars. You set up a fake house nearby, filled with dummy valuables. Burglars are attracted to this fake house, thinking it’s the real one. You monitor their actions to learn their techniques and better secure your actual house.
Technical Example
You deploy a honeypot server within your corporate network that mimics a database server. It contains no real data but appears authentic to attackers. When an attacker tries to access it, their activities (such as IP, methods, and tools) are logged for analysis.
Types of Honeypots
1. Production Honeypot
Used to improve overall security by distracting attackers from real systems.
Example: A fake customer login page for a banking website.
2. Research Honeypot
Used for studying attack methods and gathering intelligence.
Example: A honeypot server that simulates IoT devices to study botnet attacks.
Usage
- Intrusion Detection: Identify unauthorized access attempts.
- Threat Intelligence: Understand attackers' tools, techniques, and goals.
- Deception Strategy: Divert attackers away from real resources.
- Vulnerability Testing: Study how attackers exploit weaknesses.
Benefits
1. Early Threat Detection: Identifies threats before they reach critical systems.
2. Data Collection: Offers valuable insights into attack patterns and behaviors.
3. Improved Defense: Helps in identifying security gaps and improving defenses.
4. Resource Efficiency: Reduces the workload on actual systems by diverting attacks.
5. Training Ground: Useful for security teams to practice handling real-world threats.
Limitations
1. Limited Scope: Cannot detect attacks on systems outside the honeypot.
2. Risk of Exploitation: If not properly isolated, attackers could use the honeypot to attack real systems.
3. Resource Intensive: Requires setup, monitoring, and maintenance.
Ref: Santosh Nandakumar
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Your #Instagram Profile: A #Digital Business Card
https://undercodenews.com/your-instagram-profile-a-digital-business-card/
@Undercode_News
https://undercodenews.com/your-instagram-profile-a-digital-business-card/
@Undercode_News
UNDERCODE NEWS
Your Instagram Profile: A Digital Business Card - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Interpol Calls for a More Humane Term for Romance Scams
https://undercodenews.com/interpol-calls-for-a-more-humane-term-for-romance-scams/
@Undercode_News
https://undercodenews.com/interpol-calls-for-a-more-humane-term-for-romance-scams/
@Undercode_News
UNDERCODE NEWS
Interpol Calls for a More Humane Term for Romance Scams - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑AI-SOC. Radiant Security AI.
I have had many conversations (and still have) about Security for AI, especially about how AI-SOC can affect and help the SOC team and processes. At the same time, We have been (xTriage) running Radiant Security AI as AI-SOC (and more) for over a year, and the results arrived on time with HUGH successes!
During the AI-SOC journey with Radiant Security AI, we found many advantages about it. Below are some of them (in a nutshell):
1️⃣ Proactive Threat Hunting: AI-SOC leverages real-time data analysis and threat intelligence to proactively detect emerging threats, even before they appear in known threat databases.
2️⃣ Precision in Incident Detection: AI models analyze massive datasets and correlate events across multiple layers (network, endpoints, cloud, identities), reducing detection blind spots.
3️⃣ Scalability: AI-SOC can handle the massive influx of security alerts and scale effortlessly with an organization's growth without requiring linear increases in human resources.
4️⃣ Behavioral Anomaly Detection: AI identifies subtle deviations from normal behavior patterns that traditional systems often overlook, ensuring early detection of insider threats and zero-day exploits.
5️⃣ Hyperautomation: Combining AI with SOAR platforms enables faster and smarter incident response. Automated workflows triage and contain incidents without waiting for human intervention.
6️⃣ Continuous Learning and Adaptation: AI algorithms evolve with each new threat encountered, continuously improving their accuracy and relevance in detecting sophisticated attacks.
7️⃣ Enhanced Collaboration: AI-SOC tools facilitate collaboration across security tiers (T1-T3), presenting data and insights in clear, actionable formats tailored to the expertise level of the analyst.
8️⃣ Integrated Multi-Vendor Ecosystem: With support for seamless integration into existing ecosystems (e.g., XDR tools, SIEMs, SOAR), AI-SOC ensures minimal workflow disruption.
9️⃣ Reduction in False Positives: By understanding context and correlating events, AI dramatically reduces false positives, allowing analysts to focus on genuine threats.
🔟 Cost Efficiency: By automating repetitive tasks and reducing the need for manual intervention, AI-SOC optimizes resource utilization and lowers the overall cost of operations.
In the end, T1/T2 is not chasing after massive FPs or useless alerts - They are now doing advanced tasks.
Ref: Elli Shlomo
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
I have had many conversations (and still have) about Security for AI, especially about how AI-SOC can affect and help the SOC team and processes. At the same time, We have been (xTriage) running Radiant Security AI as AI-SOC (and more) for over a year, and the results arrived on time with HUGH successes!
During the AI-SOC journey with Radiant Security AI, we found many advantages about it. Below are some of them (in a nutshell):
1️⃣ Proactive Threat Hunting: AI-SOC leverages real-time data analysis and threat intelligence to proactively detect emerging threats, even before they appear in known threat databases.
2️⃣ Precision in Incident Detection: AI models analyze massive datasets and correlate events across multiple layers (network, endpoints, cloud, identities), reducing detection blind spots.
3️⃣ Scalability: AI-SOC can handle the massive influx of security alerts and scale effortlessly with an organization's growth without requiring linear increases in human resources.
4️⃣ Behavioral Anomaly Detection: AI identifies subtle deviations from normal behavior patterns that traditional systems often overlook, ensuring early detection of insider threats and zero-day exploits.
5️⃣ Hyperautomation: Combining AI with SOAR platforms enables faster and smarter incident response. Automated workflows triage and contain incidents without waiting for human intervention.
6️⃣ Continuous Learning and Adaptation: AI algorithms evolve with each new threat encountered, continuously improving their accuracy and relevance in detecting sophisticated attacks.
7️⃣ Enhanced Collaboration: AI-SOC tools facilitate collaboration across security tiers (T1-T3), presenting data and insights in clear, actionable formats tailored to the expertise level of the analyst.
8️⃣ Integrated Multi-Vendor Ecosystem: With support for seamless integration into existing ecosystems (e.g., XDR tools, SIEMs, SOAR), AI-SOC ensures minimal workflow disruption.
9️⃣ Reduction in False Positives: By understanding context and correlating events, AI dramatically reduces false positives, allowing analysts to focus on genuine threats.
🔟 Cost Efficiency: By automating repetitive tasks and reducing the need for manual intervention, AI-SOC optimizes resource utilization and lowers the overall cost of operations.
In the end, T1/T2 is not chasing after massive FPs or useless alerts - They are now doing advanced tasks.
Ref: Elli Shlomo
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁