Aggregator
CVE-2023-53853 | Linux Kernel up to 6.3.3 netlink netlink_recvmsg privilege escalation (Nessus ID 298924)
CVE-2023-54198 | Linux Kernel up to 6.2.4 tty tty_driver_lookup_tty null pointer dereference (Nessus ID 298924 / WID-SEC-2025-2941)
CVE-2023-46015 | code-projects Blood Bank 1.0 index.php msg cross site scripting (EUVD-2023-50277)
CVE-2023-46016 | code-projects Blood Bank 1.0 abs.php Search cross site scripting (EUVD-2023-50278)
CVE-2023-46017 | code-projects Blood Bank 1.0 receiverLogin.php rpassword sql injection (EUVD-2023-50279)
CVE-2023-46014 | code-projects Blood Bank 1.0 hospitalLogin.php hemail/hpassword sql injection (EUVD-2023-50276)
New NCSC-Led OT Security Guidance for Nuclear Reactors
OT weaknesses are compounding across utilities, with 22% of critical infrastructure firms reporting OT incidents and external access driving half of breaches. U.K. NCSC's new guidance outlines connectivity principles that utilities can embed to avoid costly retrofits and compliance issues.
India's E-Rupee Leads the Secure Adoption of CBDCs
CBDCs are expanding, with 90% of central banks exploring them. India's e-rupee pilot shows strong adoption, backed by RBI standards and HSM-secure transactions. Ruchin Kumar, VP for South Asia at Futurex, underscores awareness, interoperability and encryption as keys to CBDC success and PQC readiness.
Alert: 'Severe Cyberthreat' to Critical Infrastructure
Following Poland's energy grid being targeted by Russian nation-state attackers, Britain has issued a "severe cyberthreat" alert to its domestic critical national infrastructure operators, urging them to refine their defensive and resilience posture ahead of any unexpected escalation in targeting.
State Hackers Turn Google AI Into Attack Acceleration Tool
State-backed hackers weaponized Google's artificial intelligence model Gemini to accelerate cyberattacks, using the productivity tool as an offensive asset for reconnaissance, social engineering and malware development. Google said it has disabled accounts and strengthened defenses.
NDSS 2025 – Automated Mass Malware Factory
Session 12B: Malware
Authors, Creators & Presenters: Heng Li (Huazhong University of Science and Technology), Zhiyuan Yao (Huazhong University of Science and Technology), Bang Wu (Huazhong University of Science and Technology), Cuiying Gao (Huazhong University of Science and Technology), Teng Xu (Huazhong University of Science and Technology), Wei Yuan (Huazhong University of Science and Technology), Xiapu Luo (The Hong Kong Polytechnic University)
PAPER
Automated Mass Malware Factory: The Convergence of Piggybacking and Adversarial Example in Android Malicious Software Generation
Adversarial example techniques have been demonstrated to be highly effective against Android malware detection systems, enabling malware to evade detection with minimal code modifications. However, existing adversarial example techniques overlook the process of malware generation, thus restricting the applicability of adversarial example techniques. In this paper, we investigate piggybacked malware, a type of malware generated in bulk by piggybacking malicious code into popular apps, and combine it with adversarial example techniques. Given a malicious code segment (i.e., a rider), we can generate adversarial perturbations tailored to it and insert them into any carrier, enabling the resulting malware to evade detection. Through exploring the mechanism by which adversarial perturbation affects piggybacked malware code, we propose an adversarial piggybacked malware generation method, which comprises three modules: Malicious Rider Extraction, Adversarial Perturbation Generation, and Benign Carrier Selection. Extensive experiments have demonstrated that our method can efficiently generate a large volume of malware in a short period, and significantly increase the likelihood of evading detection. Our method achieved an average attack success rate (ASR) of 88.3% on machine learning-based detection models (e.g., Drebin and MaMaDroid), and an ASR of 76% and 92% on commercial engines Microsoft and Kingsoft, respectively. Furthermore, we have explored potential defenses against our adversarial piggybacked malware.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – Automated Mass Malware Factory appeared first on Security Boulevard.