Aggregator
Beware of the Shadowbunny - Using virtual machines to persist and evade detections
This was also presented at BSides Singapore 2020. The slides are here and YouTube link is here.
The origins of the ShadowbunnyA few years ago, around 2016, I went on a relaxing two weeklong vacation. It was great to disconnect from work. I traveled to Austria, enjoying hiking in the mountains, and exploring Vienna.
When I came back to the office, the team had placed a giant bunny teddy into my chair. In retrospect, it seemed a legitimate replacement for the manager, as hardly anyone seemed to have noticed my absence.
Career change? Cybersecurity companies are hiring.
Career change? Cybersecurity companies are hiring. If you’re thinking career change or career shift, there’s a field that has an...
The post Career change? Cybersecurity companies are hiring. appeared first on McAfee Blog.
JWT: A How Not to Guide
JWT: A How Not to Guide
开源信息收集周报#58
开源信息收集周报#58
Participating in the Microsoft Machine Learning Security Evasion Competition - Bypassing malware models by signing binaries
This year one of my goals was to learn about machine learning and artificial intelligence.
I wrote about my journey before - including what classes I took and books I read, the models and systems I built and operationalized, threat modeling it to learn about practical attacks and defenses. My goal is to be knowledge enough in the AI/ML space enough to be able to help bridge the gap between research and operational red teaming - by doing practical things with life systems.
Smart DNS for the New Network Edge
VIPKID受邀参加国家网络安全宣传周 “青少年网络信息安全”主题论坛
VIPKID受邀参加国家网络安全宣传周 “青少年网络信息安全”主题论坛
VIPKID受邀参加国家网络安全宣传周 “青少年网络信息安全”主题论坛
New and improved Security Update Guide!
New and improved Security Update Guide!
How to Start Growing and Never Stop
2020 CISCN 华东北赛区 WEB Writeup
一共 6 题 WEB, 我一个人拿了 4 个一血, 还有一题全场 0 解. 然而没有 pwn 爷爷依旧被吊打, 而且题目质量是真的差, 明年再打国赛我是傻逼.
Machine Learning Attack Series: Backdooring models
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
- Overview: How Husky AI was built, threat modeled and operationalized
- Attacks: The attacks I want to investigate, learn about, and try out
- Mitigations: Ways to prevent and detect the backdooring threat
During threat modeling we identified that an adversary might tamper with model files. From a technical point of view this means an adversary gained access to the model file used in production and is able overwrite it.