<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cyber Threats Newsletter]]></title><description><![CDATA[🛡️ Do you want to stay up to date on cyber and AI?

Subscribe for free to our newsletter and never miss the latest cyber threats and innovative ideas!]]></description><link>https://www.threatnewsletter.com</link><image><url>https://substackcdn.com/image/fetch/$s_!g40J!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456b9c31-73ab-4d5d-b60d-fd927f773f81_1024x1024.png</url><title>Cyber Threats Newsletter</title><link>https://www.threatnewsletter.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 19 Apr 2026 00:43:43 GMT</lastBuildDate><atom:link href="https://www.threatnewsletter.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[threatnewsletter.com]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[threatnewsletter@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[threatnewsletter@substack.com]]></itunes:email><itunes:name><![CDATA[Alex Palazon]]></itunes:name></itunes:owner><itunes:author><![CDATA[Alex Palazon]]></itunes:author><googleplay:owner><![CDATA[threatnewsletter@substack.com]]></googleplay:owner><googleplay:email><![CDATA[threatnewsletter@substack.com]]></googleplay:email><googleplay:author><![CDATA[Alex Palazon]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[AI search engines and previews: Are they safe? We can trust them?]]></title><description><![CDATA[AI Search Is a Wild Ride. Here&#8217;s How to Keep Your Brand (and Users) From Crashing]]></description><link>https://www.threatnewsletter.com/p/ai-search-engines-and-previews-are</link><guid isPermaLink="false">https://www.threatnewsletter.com/p/ai-search-engines-and-previews-are</guid><dc:creator><![CDATA[Alex Palazon]]></dc:creator><pubDate>Sat, 31 May 2025 07:26:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Iy9X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hey there!<br></p><h3>Why I&#8217;m Writing This</h3><p>The past few month a lot of customers and lead are continuous asking to rank higher in AI search engines. </p><p>So, ofc we put hands in work to research all the techniques to rank high and create our own heavy &#8220;GEO checklist&#8221;. I&#8217;ve been geeking out over how AI answer engines (ChatGPT, Perplexity, Google AI Overviews, etc.) keep <em>stealing the top of the page</em>. But with my cyber mindset always on i found a lot of posible complications in the future when this type of searches arrive to the mainstream.  Below I wrote some reflections in the perspective of trust, security and IP.</p><div><hr></div><h3>But wait&#8230; What is GEO?</h3><blockquote><p><strong>GEO, Generative Engine Optimization = convincing large-language-model search to </strong><em><strong>quote you first</strong></em><strong>, not your competitors.</strong></p></blockquote><p>But here one thing in common is that LLMs love to hallucinate and overshare. A <strong><a href="https://www.cjr.org/tow_center/we-compared-eight-ai-search-engines-theyre-all-bad-at-citing-news.php">new study</a></strong> from Columbia Journalism Review showed that AI search engines and chatbots, such as OpenAI's ChatGPT Search, Perplexity, Deepseek Search, Microsoft Copilot, Grok and Google's Gemini, are just wrong, way too often.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Iy9X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Iy9X!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Iy9X!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Iy9X!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Iy9X!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Iy9X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg" width="1456" height="733" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:733,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Ai Search Engines Wrong Study Links&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Ai Search Engines Wrong Study Links" title="Ai Search Engines Wrong Study Links" srcset="https://substackcdn.com/image/fetch/$s_!Iy9X!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Iy9X!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Iy9X!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Iy9X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F318d42b2-4b23-4d73-88ce-08b05ef0ed0a_2150x1082.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you want to learn of how SEO change to GEO and how companies are trying to rank higher in AI Search Engines, you can read this <a href="https://armox.ai/blog/generative-engine-optimization">blog</a>!</p><p></p><h2>&#9888;&#65039; Five Risk Vectors Hiding in AI Search</h2><h3>1. Hallucination Hype &#8594; Brand &amp; Safety Damage</h3><p>When Google&#8217;s AI told users to eat a rock a day for minerals (or and the pizza-glue fiasco) it scraped decade-old joke posts from Reddit and spat them back as culinary advice. <a href="https://www.theverge.com/2024/5/23/24162896/google-ai-overview-hallucinations-glue-in-pizza?utm_source=chatgpt.com">Imagine if the source if your brand website...</a></p><p><br><strong>Mitigation:</strong> Publish concise, up-to-date FAQ blocks that AI can lift verbatim. Monitor answers weekly with some AI Search Monitoring tools.</p><p></p><h3>2. Prompt-Injection &amp; Data Spill</h3><p>Security researchers keep jail-breaking <a href="https://www.prompt.security/blog/prompt-injection-101?utm_source=chatgpt.com">Bing and ChatGPT</a> with crafty prompts, exposing hidden system messages and policy text. <br></p><p><strong>Mitigation:</strong> Treat AI crawlers like untrusted users, rate-limit unknown referrers, sanitize user-generated content, and log GPTBot traffic for anomalies. Cloudfare have the<a href="https://blog.cloudflare.com/ai-labyrinth/"> </a><strong><a href="https://blog.cloudflare.com/ai-labyrinth/">Trapping misbehaving bots in an AI Labyrinth technique.</a></strong></p><p></p><h3>3. Malicious Link Poisoning</h3><p>Cyber-crooks are already gaming answer engines: <a href="https://www.malwarebytes.com/blog/news/2025/05/fake-ai-video-generator-tools-lure-in-facebook-and-linkedin-users-to-deliver-malware?utm_source=chatgpt.com">Malwarebytes</a> found fake &#8220;AI video generators&#8221; ranking in LLM answers that redirect to info-stealers. <br></p><p><strong>Mitigation:</strong></p><ul><li><p>Enforce HTTPS and HSTS across all sub-domains.</p></li><li><p>Run a real-time threat-intel feed against outbound links you publish.</p></li><li><p>Set up Google Safe Browsing &amp; Microsoft SmartScreen API checks before you ever embed a link.</p></li></ul><p></p><h3>4. Copyright &amp; IP Minefields</h3><p>The <em><a href="https://harvardlawreview.org/blog/2024/04/nyt-v-openai-the-timess-about-face/?utm_source=chatgpt.com">New York Times</a></em><a href="https://harvardlawreview.org/blog/2024/04/nyt-v-openai-the-timess-about-face/?utm_source=chatgpt.com"> is suing OpenAI and Microsoft</a> for training models on paywalled articles. Courts haven&#8217;t decided whether ingesting your content counts as &#8220;fair use&#8221; but we will see more like these issues in the future, and as one my friends says, once it is published in internet, you can not control what people is going to do with that&#8230;<br></p><p><strong>Mitigation:</strong></p><ul><li><p>Add <code>llms.txt</code> alongside <code>robots.txt</code> to spell out what parts of your site the bots may crawl.</p></li><li><p>Watermark premium PDFs and hide them behind authentication (probably this is the only one that will mitigate and stop OpenAI).</p></li><li><p>Pick clear licenses (e.g., CC-BY-NC) for any free resources.</p></li></ul><p></p><h3>5. Compliance (EU AI Act &amp; Others)</h3><p>From February 2025 the EU AI Act starts penalizing &#8220;high-risk&#8221; AI deployments fines up to &#8364;35 million or 7 % of global turnover. Even if you <a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai?utm_source=chatgpt.com">only </a><strong><a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai?utm_source=chatgpt.com">use</a></strong><a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai?utm_source=chatgpt.com"> AI search widgets</a> on-site, you&#8217;re a &#8220;deployer&#8221; with transparency duties. <br></p><p><strong>Mitigation:</strong> Keep an AI-asset inventory, record which models touch personal data, and add a short disclosure banner for EU visitors.</p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatnewsletter.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Threats Newsletter! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cyber Threats #05 - We spent this weekend at HackBCN'24 and built Security Agents for AWS GuardDuty alerts]]></title><description><![CDATA[14 Million OpenSSH Servers Potentially Vulnerable, Mac Stealer Spreads via Arc Browser Google Ads, Sandwich Attack on LLMs and more...]]></description><link>https://www.threatnewsletter.com/p/cyber-threats-05-we-spent-this-weekend</link><guid isPermaLink="false">https://www.threatnewsletter.com/p/cyber-threats-05-we-spent-this-weekend</guid><dc:creator><![CDATA[Alex Palazon]]></dc:creator><pubDate>Tue, 02 Jul 2024 11:59:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G9qe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G9qe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G9qe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png" width="358" height="142.84437086092714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:241,&quot;width&quot;:604,&quot;resizeWidth&quot;:358,&quot;bytes&quot;:129625,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G9qe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>Welcome to the fifth edition of the Cyber Threats Newsletter</strong>. The goal is to deliver weekly updates with the latest in cyber threats, to help accelerate innovation and collaboratively build a more secure future!</p><p></p><h2>We spent this weekend at HackBCN'24 and built Security Agents for AWS GuardDuty alerts</h2><div><hr></div><p>I've just arrived in Barcelona a week ago, and I've already participated in <a href="https://twitter.com/hack_bcn">HackBCN</a>, the city's first AI Hackathon.  <a href="https://twitter.com/picsoung">Nico</a> and team did an excellent job organizing the event!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!34YI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!34YI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!34YI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!34YI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!34YI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!34YI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg" width="524" height="393" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:524,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!34YI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!34YI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!34YI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!34YI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91bead03-f09e-4291-ad47-8d1fe6634842_4032x3024.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Nico in action</figcaption></figure></div><h4>The challenge</h4><p>The hackathon's brief was open: "build something cool with AI." With such a broad scope, we decided to focus on a specific pain point in cloud security. Anyone who's used AWS GuardDuty knows the challenge that analyzing numerous alerts can be time consuming and often tedious. We set out to change that.</p><h4>What did we build in only 30h?</h4><p>We created AI agents to automate the work typically done by cloud security engineers:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aHVN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aHVN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png 424w, https://substackcdn.com/image/fetch/$s_!aHVN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png 848w, https://substackcdn.com/image/fetch/$s_!aHVN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png 1272w, https://substackcdn.com/image/fetch/$s_!aHVN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aHVN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png" width="1456" height="258" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:258,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aHVN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png 424w, https://substackcdn.com/image/fetch/$s_!aHVN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png 848w, https://substackcdn.com/image/fetch/$s_!aHVN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png 1272w, https://substackcdn.com/image/fetch/$s_!aHVN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778178f9-4dc6-4b9b-ab4f-76a8c2c0dffd_1815x322.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><ol><li><p><strong>Alert Triage</strong>: An agent to quickly assess the severity and urgency of incoming alerts.</p></li><li><p><strong>Data Enrichment</strong>: We integrated external APIs like AbuseIPDB, SecurityTrails, and ExaAI to gather additional context for each alert.</p></li><li><p><strong>Correlation and Analysis</strong>: An agent to connect the dots between different data points and identify patterns.</p></li><li><p><strong>Remediation Suggestions</strong>: Using RAG (Retrieval Augmented Generation) with AWS Playbooks for Incident Response, we created an agent to recommend actionable steps.</p></li><li><p><strong>Report Generation</strong>: Finally, an agent to compile all findings into a comprehensive, easy-to-understand report.</p><p></p></li></ol><p>We used both Mistral and GPT-4o models, but GPT-4o performed much better for our agents, thanks to its speed and larger context window.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ne3X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ne3X!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png 424w, https://substackcdn.com/image/fetch/$s_!ne3X!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png 848w, https://substackcdn.com/image/fetch/$s_!ne3X!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png 1272w, https://substackcdn.com/image/fetch/$s_!ne3X!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ne3X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png" width="490" height="302.88461538461536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/340fab30-5516-4608-b268-bfe625915c85_2960x1830.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:900,&quot;width&quot;:1456,&quot;resizeWidth&quot;:490,&quot;bytes&quot;:281333,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ne3X!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png 424w, https://substackcdn.com/image/fetch/$s_!ne3X!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png 848w, https://substackcdn.com/image/fetch/$s_!ne3X!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png 1272w, https://substackcdn.com/image/fetch/$s_!ne3X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340fab30-5516-4608-b268-bfe625915c85_2960x1830.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"> UI of Security Agents</figcaption></figure></div><h4>Next Steps</h4><p>Looking ahead, we plan to:</p><ul><li><p>Expand dynamically our RAG database</p></li><li><p>Add more use cases</p></li><li><p>Extend support to multiple cloud platforms (Azure and GCP)</p></li></ul><p>The hackathon was an exciting experience, showing the potential of Barcelona and its people.</p><h4>Here you can see the demo presentation:</h4><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;73f7a271-1cd7-432c-9f98-391622816f75&quot;,&quot;duration&quot;:null}"></div><p>And if you like these types of projects, you can take a look at the  <a href="https://openai.com/index/empowering-defenders-through-our-cybersecurity-grant-program/?utm_source=tldrsec.com&amp;utm_medium=referral&amp;utm_campaign=tl-dr-sec-237-fwd-cloudsec-videos-llm-bugfinders-burp-suite-guide">OpenAI Cybersecurity Grant Program</a> that aims to empower defenders by highlighting innovative research and AI integration in cybersecurity</p><p></p><h2>Week in review</h2><div><hr></div><h4><a href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">14 Million OpenSSH Servers Potentially Vulnerable to &#8220;regreSSHion&#8221; Bug</a></h4><p>Qualys Threat Research Unit (TRU) has identified a severe remote unauthenticated code execution (RCE) vulnerability in OpenSSH's server (sshd) affecting glibc-based Linux systems, with a potential to compromise over 14 million instances globally.</p><p>The vulnerability, now tracked as CVE-2024-6387 and dubbed &#8220;regreSSHion,&#8221; allows unauthenticated, remote attackers to execute code as root on affected systems, posing a significant security risk.</p><h4><a href="https://www.malwarebytes.com/blog/news/2024/06/poseidon-mac-stealer-distributed-via-google-ads">New Mac Stealer &#8216;Poseidon&#8217; Spreads via Arc Browser Google Ads</a></h4><p>A new Mac stealer named &#8220;Poseidon&#8221; is being distributed via malicious Google ads targeting people looking to download the popular Arc browser, according to a report by Malwarebytes. The stealer, developed by a cybercriminal known as Rodrigo4, is designed to exfiltrate sensitive information from infected devices and is actively being promoted on underground forums.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MRA7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MRA7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png 424w, https://substackcdn.com/image/fetch/$s_!MRA7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png 848w, https://substackcdn.com/image/fetch/$s_!MRA7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png 1272w, https://substackcdn.com/image/fetch/$s_!MRA7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MRA7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png" width="488" height="296.8666666666667" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:511,&quot;width&quot;:840,&quot;resizeWidth&quot;:488,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MRA7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png 424w, https://substackcdn.com/image/fetch/$s_!MRA7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png 848w, https://substackcdn.com/image/fetch/$s_!MRA7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png 1272w, https://substackcdn.com/image/fetch/$s_!MRA7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa63dc759-29dc-4951-b2a0-b1973aee2b09_840x511.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h4><strong><a href="https://www.bleepingcomputer.com/news/security/polyfillio-javascript-supply-chain-attack-impacts-over-100k-sites/">Polyfill.io JavaScript supply chain attack impacts over 100K sites</a></strong></h4><p>Cybersecurity company Sansec warned that the polyfill.io domain and service was <a href="https://web.archive.org/web/20240229113710/https://github.com/polyfillpolyfill/polyfill-service/issues/2834#issuecomment-1963842875">purchased earlier this year</a> by a Chinese company named 'Funnull' and the script has been modified to introduce malicious code on websites in a supply chain attack.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cLCr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cLCr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cLCr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cLCr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cLCr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cLCr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg" width="332" height="193.18965517241378" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:405,&quot;width&quot;:696,&quot;resizeWidth&quot;:332,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Andrew tweet&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Andrew tweet" title="Andrew tweet" srcset="https://substackcdn.com/image/fetch/$s_!cLCr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cLCr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cLCr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cLCr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4658f43a-58ac-44c4-9104-4fca3b7537bd_696x405.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2>Interesting Interviews, Tools and More</h2><div><hr></div><h4><strong><a href="http://trustnlpworkshop.github.io/papers/35.pdf">Sandwich Attack: Multi-language Mixture Adaptive Attack on LLMs</a></strong></h4><p>"we introduce a new black-box attack vector called the Sandwich Attack: a multi-language mixture attack, which manipulates state-of-theart LLMs into generating harmful and misaligned responses"</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h1A9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h1A9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png 424w, https://substackcdn.com/image/fetch/$s_!h1A9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png 848w, https://substackcdn.com/image/fetch/$s_!h1A9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png 1272w, https://substackcdn.com/image/fetch/$s_!h1A9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h1A9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png" width="1292" height="352" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:352,&quot;width&quot;:1292,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:106896,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h1A9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png 424w, https://substackcdn.com/image/fetch/$s_!h1A9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png 848w, https://substackcdn.com/image/fetch/$s_!h1A9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png 1272w, https://substackcdn.com/image/fetch/$s_!h1A9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce96fd4e-dbb6-4493-98f2-5d9d9cfe9424_1292x352.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><a href="https://proton.me/blog/safe-to-autofill-passwords">Is it safe to let your password manager autofill your password?</a></h4><p>Struggling to keep track of all your passwords? You&#8217;re not the only one. <a href="https://proton.me/blog/what-is-a-password-manager">Password managers(new window)</a> exist because it&#8217;s difficult to keep track of hundreds of logins and all their various passwords.</p><p></p><h4><a href="https://securityintelligence.com/articles/chatgpt-4-exploits-87-percent-one-day-vulnerabilities/">ChatGPT 4 can exploit 87% of one-day vulnerabilities</a></h4><p>During the study, the team used 15 one-day vulnerabilities that occurred in real life. One-day vulnerabilities refer to the time between when an issue is discovered and the patch is created, meaning it&#8217;s a known vulnerability. Cases included websites with vulnerabilities, container management software and Python packages. Because all the vulnerabilities came from the CVE database, they included the CVE description.</p><p></p><div><hr></div><p>Thanks for reading. If you want to be up to date with the last threats and news in the cybersecurity world, subscribe!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatnewsletter.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cyber Threats #04 - Hacking multi-billion dollar companies with a VSCode Extension]]></title><description><![CDATA[Breaking the internet for a while, US bans Kaspersky antivirus software due to national security risks, Scattered Spider hacker arrested in Spain and more...]]></description><link>https://www.threatnewsletter.com/p/cyber-threats-04-hacking-multi-billion</link><guid isPermaLink="false">https://www.threatnewsletter.com/p/cyber-threats-04-hacking-multi-billion</guid><dc:creator><![CDATA[Alex Palazon]]></dc:creator><pubDate>Mon, 24 Jun 2024 05:58:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G9qe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G9qe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G9qe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png" width="358" height="142.84437086092714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:241,&quot;width&quot;:604,&quot;resizeWidth&quot;:358,&quot;bytes&quot;:129625,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G9qe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>Welcome to the fourth edition of the Cyber Threats Newsletter</strong>. The goal is to deliver weekly updates with the latest in cyber threats, to help accelerate innovation and collaboratively build a more secure future!</p><p></p><h2>You can have the best security in place that 3 experts with an extension developed in 30 min can hack your company</h2><div><hr></div><p>Today, I want to take some time to analyze the<a href="https://medium.com/@amitassaraf/the-story-of-extensiontotal-how-we-hacked-the-vscode-marketplace-5c6e66a0e9d7"> blog series</a> published about how they released a malicious VSCode extension, then proceeded to analyze the marketplace to find other malicious extensions, and finally published a solution. Additionally, it covers how a company with in-house developers faces a series of specific threats.</p><p>What I most like is why they say they did it: Because they love security and love building products.</p><p>First, some facts:</p><ul><li><p>VSCode is one of Microsoft&#8217;s successful ventures embracing the open-source world.</p></li><li><p>Over 15 million monthly users.</p></li><li><p>The VSCode Marketplace hosts around 60,000 extensions from approximately 45,000 different publishers.</p></li><li><p>The average developer installs 40 extensions in their IDE.</p></li></ul><p>They decided  to take the popular Dracula theme named &#8220;Dracula Official&#8221; (with over +6,000,000 installs) and create his own copycat &#8220;Darcula Official&#8221;. Funny right? I declare myself a fan of the Dracula theme.</p><p>Only having a domain, they obtain the blue check:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!S28U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!S28U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png 424w, https://substackcdn.com/image/fetch/$s_!S28U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png 848w, https://substackcdn.com/image/fetch/$s_!S28U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png 1272w, https://substackcdn.com/image/fetch/$s_!S28U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!S28U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png" width="466" height="119.94674556213018" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:174,&quot;width&quot;:676,&quot;resizeWidth&quot;:466,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!S28U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png 424w, https://substackcdn.com/image/fetch/$s_!S28U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png 848w, https://substackcdn.com/image/fetch/$s_!S28U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png 1272w, https://substackcdn.com/image/fetch/$s_!S28U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6106a59-4686-41b3-bc7c-3c1cd3cb4d07_676x174.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h4>What they did?</h4><p>Each time a victim opens a document on the editor, they read the code and send it to their server and additionally send a beacon to the sever with information on the host machine, such as the hostname, domain, platform, number of extensions, etc&#8230;</p><p>After some days, they had hundreds of victims and what is more interesting is that some of this victims are inside multi-billion dollar companies all of which are widely known, inside one of the biggest security companies in the world, and in a certain country&#8217;s justice court network.</p><p><strong>So, after expending millions in security, these big companies were hacked by a VSCode extension developed in 30 min.</strong></p><p></p><h4>Next step: Expose malicious extension in the marketplace</h4><p>By installing an extension, this in turn means giving the extension publisher <strong>full access</strong> to the host environment.</p><p>In their investigation they found a <strong>reverse shell inside an extension claiming to be a code beautifier:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k80L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k80L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png 424w, https://substackcdn.com/image/fetch/$s_!k80L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png 848w, https://substackcdn.com/image/fetch/$s_!k80L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png 1272w, https://substackcdn.com/image/fetch/$s_!k80L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k80L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png" width="462" height="353.8637554585153" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:877,&quot;width&quot;:1145,&quot;resizeWidth&quot;:462,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!k80L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png 424w, https://substackcdn.com/image/fetch/$s_!k80L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png 848w, https://substackcdn.com/image/fetch/$s_!k80L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png 1272w, https://substackcdn.com/image/fetch/$s_!k80L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e191fcf-4ceb-408e-a108-5f704f1d87cc_1145x877.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>And some interesting numbers:</p><ul><li><p><strong>87</strong> extensions that attempt to read /etc/passwd file on the host system.</p></li><li><p><strong>8161 </strong>extensions that communicate with a hardcoded IP address from JS code.</p></li><li><p><strong>1,452 </strong>extensions that run an unknown executable binary or DLL on the host machine.</p></li><li><p><strong>145</strong> extensions&#8217; code and resources were flagged with high confidence by VirusTotal.</p></li><li><p><strong>Got a shiny new AI policy in your organization?</strong> <strong>783</strong> extensions were found to use third-party AI models as part of their functionality.</p></li></ul><p></p><h4>They create a tool: <a href="https://www.extensiontotal.com/">Extensiontotal</a></h4><p>To help assess the risk of VSCode extensions to provide a way for organizations to mitigate this risk today. Similar to VirusTotal but for the VSCode extensions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8qmO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8qmO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png 424w, https://substackcdn.com/image/fetch/$s_!8qmO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png 848w, https://substackcdn.com/image/fetch/$s_!8qmO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png 1272w, https://substackcdn.com/image/fetch/$s_!8qmO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8qmO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png" width="584" height="253.8956043956044" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:633,&quot;width&quot;:1456,&quot;resizeWidth&quot;:584,&quot;bytes&quot;:1067306,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8qmO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png 424w, https://substackcdn.com/image/fetch/$s_!8qmO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png 848w, https://substackcdn.com/image/fetch/$s_!8qmO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png 1272w, https://substackcdn.com/image/fetch/$s_!8qmO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75c971e-7664-4678-b129-7d42e6dcafe3_2962x1288.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you want to know what extensions are installed in your organization, they developed a Jamf script that by deploying on each endpoint, lists all extensions installed on VSCode and runs them through ExtensionTotal to <strong>find the risk score of all extensions inside the organization</strong>.</p><h4></h4><h4><strong>The challenge in companies with many developers</strong></h4><p>One of the biggest security design flaws in VSCode extensions is the lack of any permission model. Any extension can perform any API action without restrictions. This means VSCode extensions can spawn child processes, execute system calls, and import any NodeJS package, making them highly risky.</p><p>Having many developers in a company exposes you to a different set of threats compared to those without developers. Developers typically need more privileges on their machines, and some tools, like VSCode, often run in root mode.</p><p>Additionally, developers possess the knowledge to bypass web proxies and often handle sensitive data, such as API keys (which can be exposed in personal GitHub repositories). It becomes challenging to know what data is being shared and what isn&#8217;t.</p><p>To complicate matters further, consider the variable of AI. For example, a recent post explained how the GitHub Copilot Chat VSCode extension was vulnerable to data exfiltration via prompt injection when analyzing untrusted source code.</p><p>Understanding these risks and implementing proper security measures is crucial for companies with a significant number of developers.</p><p></p><h2>Week in review</h2><div><hr></div><h4><a href="https://x.com/bgptools/status/1802837532033569255">Breaking the internet for a while</a></h4><p>This way you can "break" the internet for a while. An ASN (AS9498 Bharti Airtel) advertises a very large IP range (96.0.0.0/3, which is 536,879,921 IP addresses) and its providers accept and propagate it. This way, traffic that wants to go up to the IP ranges 96.0.0.0 to 127.255.255.255 reaches that ASN.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LXuO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LXuO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LXuO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LXuO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LXuO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LXuO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg" width="446" height="135.28666666666666" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1200,&quot;resizeWidth&quot;:446,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!LXuO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LXuO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LXuO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LXuO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3dc7b66-7828-4f49-9d8f-72dc0603b711_1200x364.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h4><a href="https://therecord.media/suspected-scattered-spider-cybercriminal-arrested-spain">Suspected 'Scattered Spider' hacker, 22, reportedly arrested in Spain</a></h4><p>The scammer responsible for the computer attack on 45 companies in the United States. This is a young man of British nationality, 22 years old, leader of an organized group dedicated to the theft of information from companies and cryptocurrencies and managed to gain control of 391 bitcoins worth more than 27 million dollars. The arrest of the suspected Scattered Spider leader was coordinated by Spanish police and the FBI</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!M5tC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!M5tC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg 424w, https://substackcdn.com/image/fetch/$s_!M5tC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg 848w, https://substackcdn.com/image/fetch/$s_!M5tC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!M5tC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!M5tC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg" width="584" height="328.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:432,&quot;width&quot;:768,&quot;resizeWidth&quot;:584,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!M5tC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg 424w, https://substackcdn.com/image/fetch/$s_!M5tC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg 848w, https://substackcdn.com/image/fetch/$s_!M5tC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!M5tC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20226bcb-80ba-4464-a367-54fdf90d2ca8_768x432.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><strong><a href="https://securityaffairs.com/164806/hacking/solarwinds-serv-u-cve-2024-28995-exploit.html">Threat actors are actively exploiting Solarwinds Serv-U Bug CVE-2024-28995</a></strong></h4><p>Threat actors are actively exploiting<strong> </strong>a recently discovered vulnerability, tracked as <a href="https://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis">CVE-2024-28995</a>, in SolarWinds Serv-U software. The high-severity directory transversal issue allows attackers to read sensitive files on the host machine. Experts at threat intelligence firm GreyNoise reported that threat actors are actively exploiting using the public available proof-of-concept (PoC) exploit code.</p><p></p><h4><strong><a href="https://www.helpnetsecurity.com/2024/06/21/us-kaspersky-ban/">US bans Kaspersky antivirus software due to national security risks</a> </strong></h4><p>The US Department of Commerce has announced an upcoming US-wide ban of cybersecurity and antivirus software by Kaspersky, as its &#8220;ability to gather valuable US business information, including intellectual property, and to gather US persons&#8217; sensitive data for malicious use by the Russian Government pose an undue or unacceptable national security risk&#8221;.</p><p></p><h2>Interesting Interviews, Tools and More</h2><div><hr></div><h4><a href="https://github.com/OpenCTI-Platform/opencti">OpenCTI open source platform to manage cyber threat intelligence</a></h4><p>OpenCTI has been created in order to structure, store, organize and visualize technical and non-technical information about cyber threats. Also, OpenCTI can be integrated with other tools and applications such as <a href="https://github.com/MISP/MISP">MISP</a>, <a href="https://github.com/TheHive-Project/TheHive">TheHive</a>, <a href="https://github.com/mitre/cti">MITRE ATT&amp;CK</a>, etc.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iSN9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iSN9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png 424w, https://substackcdn.com/image/fetch/$s_!iSN9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png 848w, https://substackcdn.com/image/fetch/$s_!iSN9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png 1272w, https://substackcdn.com/image/fetch/$s_!iSN9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iSN9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png" width="1456" height="719" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:719,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Screenshot&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Screenshot" title="Screenshot" srcset="https://substackcdn.com/image/fetch/$s_!iSN9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png 424w, https://substackcdn.com/image/fetch/$s_!iSN9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png 848w, https://substackcdn.com/image/fetch/$s_!iSN9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png 1272w, https://substackcdn.com/image/fetch/$s_!iSN9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3aad4c7e-46c4-4faf-a363-5378725ec627_2551x1259.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h4><a href="https://hiddenlayer.com/company/newsroom/azure-ai-catalog-integration/">Hiddenlayer collaborates with Microsoft Azure AI to enhance model security</a></h4><p>HiddenLayer announced today Microsoft Azure AI as a new user of its Model Scanner. The Model Scanner will scan third-party and open-source models in the model collection curated by Azure AI, providing verification that they are free from cybersecurity vulnerabilities, malware, and other signs of tampering.</p><p></p><h4><a href="https://open.spotify.com/show/4XPl3uEEL9hvqMkoZrzbx5?si=b4c5313aa2fa4f7d">Darknet Diaries Podcast</a></h4><p>I want to personally recommend a podcast that I normally listen to and find different and recommendable, with really good guests and stories</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8ad27c58dc12f1c25fb933dd86&quot;,&quot;title&quot;:&quot;Darknet Diaries&quot;,&quot;subtitle&quot;:&quot;Jack Rhysider&quot;,&quot;description&quot;:&quot;Podcast&quot;,&quot;url&quot;:&quot;https://open.spotify.com/show/4XPl3uEEL9hvqMkoZrzbx5&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/show/4XPl3uEEL9hvqMkoZrzbx5" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><p></p><p>More:</p><ul><li><p><strong><a href="https://github.com/projectdiscovery/nuclei/releases/tag/v3.2.9">New Release of Nuclei (v3.2.9)</a></strong></p></li><li><p><strong><a href="https://securitylabs.datadoghq.com/articles/attackers-deploying-new-tactics-in-campaign-targeting-exposed-docker-apis/?utm_source=tldrsec.com&amp;utm_medium=referral&amp;utm_campaign=tl-dr-sec-236-interview-questions-securing-your-snowflake-red-teaming-llms">Attackers deploying new tactics in campaign targeting exposed Docker APIs</a></strong></p></li><li><p><strong><a href="https://proton.me/blog/proton-non-profit-foundation">Proton is transitioning towards a non-profit structure</a></strong></p></li><li><p><strong><a href="https://www.aboutamazon.com/news/aws/aws-security-cloud-generative-ai-customer-data?utm_source=tldrsec.com&amp;utm_medium=referral&amp;utm_campaign=tl-dr-sec-236-interview-questions-securing-your-snowflake-red-teaming-llms">AWS&#8217;s head of security shares 7 reasons why security will always be Amazon&#8217;s top priority</a></strong></p></li><li><p><strong><a href="https://www.digitaljournal.com/business/phishing-campaign-exploits-vulnerability-in-windows-search/article">Phishing campaign exploits vulnerability in Windows Search</a></strong></p></li></ul><div><hr></div><p>Thanks for reading. If you want to be up to date with the last threats and news in the cybersecurity world, subscribe!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatnewsletter.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cyber Threats #03 - Why it’s time to shift focus from mundane tasks to real threats?]]></title><description><![CDATA[New York Times source code stolen, Bypass In Veeam Backup, AWS unveils new and improved security features, Apple Private Cloud Compute and more...]]></description><link>https://www.threatnewsletter.com/p/cyber-threats-03-why-its-time-to</link><guid isPermaLink="false">https://www.threatnewsletter.com/p/cyber-threats-03-why-its-time-to</guid><dc:creator><![CDATA[Alex Palazon]]></dc:creator><pubDate>Mon, 17 Jun 2024 05:59:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZPgZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G9qe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G9qe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G9qe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png" width="358" height="142.84437086092714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:241,&quot;width&quot;:604,&quot;resizeWidth&quot;:358,&quot;bytes&quot;:129625,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G9qe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!G9qe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b9d4d5-f5a3-491a-bd82-4070896981d9_604x241.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>Welcome to the third edition of the Cyber Threats Newsletter</strong>. The goal is to deliver weekly updates with the latest in cyber threats, to help accelerate innovation and collaboratively build a more secure future!</p><p></p><h2>Why it&#8217;s time to shift focus from mundane tasks to real threats?</h2><div><hr></div><p>The daily day of cybersecurity teams often contrasts with the exciting image of finding advanced adversaries. Many times, their days are consumed with tasks that add little value and lead to burn-out and waste resources from real threat detection and response.</p><p>The reality is that, although teams need to prepare for high-profile incidents and APTs, most of their work is not directly related to these or gets lost among many tools with little focus.</p><p>To improve this situation, it's crucial to develop tools and strategies that automate routine tasks, optimize workflows and are driven by data, freeing up teams to focus on what really matters: proactive detection and rapid response to threats.</p><p>For example, starting with ensuring that <strong>the entire team understands the top threats their company (or clients) faces.</strong> From there, they can explore how these can be exploited, for example, using the MITRE ATT&amp;CK framework. KPIs should measure not only Mean Time to Response (MTTR) but also the coverage level over the defined top threats.</p><p>Solutions, whether in-house or commercial, should be easy to use and maintain, and should seamlessly integrate with the daily operations of security teams and data systems (like date warehouses), ultimately empowering security analysts to focus on what's important.</p><p>Because one important thing to understand is that <strong>attackers only need to find one weak point to exploit!</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZPgZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZPgZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp 424w, https://substackcdn.com/image/fetch/$s_!ZPgZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp 848w, https://substackcdn.com/image/fetch/$s_!ZPgZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp 1272w, https://substackcdn.com/image/fetch/$s_!ZPgZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZPgZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp" width="1456" height="816" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZPgZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp 424w, https://substackcdn.com/image/fetch/$s_!ZPgZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp 848w, https://substackcdn.com/image/fetch/$s_!ZPgZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp 1272w, https://substackcdn.com/image/fetch/$s_!ZPgZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c556f6a-1320-46d1-81b6-c6e180b4bc0e_2652x1486.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Years ago, while I was in the SOC of a national cybersecurity agency, we detected a Monero miner exploiting a Java remote code execution vulnerability. Many years later, I <a href="https://www.wiz.io/blog/dero-cryptojacking-campaign-adapts-to-evade-detection">read this article</a> where machines running Kubernetes are now being used to mine DERO (the initial access vector is an externally accessible Kubernetes API server with anonymous authentication enabled [<a href="https://attack.mitre.org/techniques/T1190/">T1190</a>]), and I think, if after so many years we continue with the same types of attacks without being able to react in time, it's clear that we must seek continuous processes that proactively search for cyberattacks and respond to them in real time, moving away from traditional security solutions that react only once known threats have been identified.</p><p><strong>Now you might be asking&#8230; how? The reality is that it&#8217;s not easy, but I suggest starting by rethinking Level 1 with a threat-driven mindset!</strong></p><p></p><h2>Week in review</h2><div><hr></div><h4><strong><a href="https://www.bleepingcomputer.com/news/security/new-york-times-source-code-stolen-using-exposed-github-token/">New York Times source code stolen using exposed GitHub token</a></strong></h4><p>Internal source code and data belonging to The New York Times was leaked on the 4chan message board after being stolen from the&nbsp;company's GitHub repositories in January 2024, The Times confirmed to BleepingComputer.</p><p>As first seen by <a href="https://x.com/vxunderground/status/1798856571931263480">VX-Underground</a>, the internal data was leaked on Thursday by an anonymous user who posted a torrent to a 273GB archive containing the stolen data.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_uNw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_uNw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_uNw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_uNw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_uNw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_uNw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg" width="384" height="193.658747300216" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:467,&quot;width&quot;:926,&quot;resizeWidth&quot;:384,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Leak of New York Times source code on 4chan&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Leak of New York Times source code on 4chan" title="Leak of New York Times source code on 4chan" srcset="https://substackcdn.com/image/fetch/$s_!_uNw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_uNw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_uNw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_uNw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F168fdf18-37c5-45f5-b7f1-9887a1798226_926x467.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h4><strong><a href="https://socprime.com/blog/cve-2024-29849-detection-a-critical-auth-bypass-in-veeam-backup-enterprise-manager/">A Critical Auth Bypass In Veeam Backup Enterprise Manager (CVE-2024-29849)</a></strong></h4><p>The exploit targets Veeam&#8217;s API by sending a specially crafted VMware single-sign-on (SSO) token to a vulnerable service. Then a server under the control of the attack responds positively to the validation, granting the attacker administrator access.</p><h4><strong><a href="https://www.helpnetsecurity.com/2024/06/11/cve-2024-37051/">Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051)</a></strong></h4><p>JetBrains has fixed a critical vulnerability (CVE-2024-37051) that could expose users of its integrated development environments (IDEs) to GitHub access token compromise.</p><h4><strong><a href="https://www.helpnetsecurity.com/2024/06/12/aws-security-features/">AWS unveils new and improved security features</a></strong></h4><p>At its annual re:Inforce conference, Amazon Web Services (AWS) has announced new and enhanced security features and tools. Like simplify AWS CloudTrail log analysis with natural language query generation in CloudTrail Lake.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UgfI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UgfI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png 424w, https://substackcdn.com/image/fetch/$s_!UgfI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png 848w, https://substackcdn.com/image/fetch/$s_!UgfI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png 1272w, https://substackcdn.com/image/fetch/$s_!UgfI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UgfI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png" width="512" height="407.44137022397894" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:604,&quot;width&quot;:759,&quot;resizeWidth&quot;:512,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UgfI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png 424w, https://substackcdn.com/image/fetch/$s_!UgfI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png 848w, https://substackcdn.com/image/fetch/$s_!UgfI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png 1272w, https://substackcdn.com/image/fetch/$s_!UgfI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7509e45-8243-4a0e-8df9-fbff177551b8_759x604.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Interesting Interviews, Tools and More</h2><div><hr></div><h4><strong><a href="https://security.apple.com/blog/private-cloud-compute/">Apple Private Cloud Compute: A new frontier for AI privacy in the cloud</a></strong></h4><p>Apple created Private Cloud Compute (PCC), a groundbreaking cloud intelligence system designed specifically for private AI processing. For the first time ever, Private Cloud Compute extends the industry-leading security and privacy of Apple devices into the cloud, making sure that personal user data sent to PCC isn&#8217;t accessible to anyone other than the user &#8212; not even to Apple.</p><p></p><h4><strong><a href="https://www.helpnetsecurity.com/2024/06/14/snowflake-threat-hunting/">YetiHunter: Open-source threat hunting tool for Snowflake environments</a></strong></h4><p>A threat detection and hunting tool companies can use to query their Snowflake environments for evidence of compromise.</p><p></p><h4><a href="https://www.xintra.org/labs">Emulate APTs lab</a></h4><p>Solve emulated APT-level incidents in a lab environment from reconnaissance to exfiltration. These technical labs are designed to test your incident response abilities against APT-level threats.</p><p></p><h4><a href="https://malsearch.com/">MalSearch: Malware Source Code Search Engine</a></h4><p>A dedicated place to Search, Bookmark, Copy and Download all Malware source code and projects available on the internet. By https://twitter.com/_Ghast1y</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!86gx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!86gx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg 424w, https://substackcdn.com/image/fetch/$s_!86gx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg 848w, https://substackcdn.com/image/fetch/$s_!86gx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!86gx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!86gx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg" width="1299" height="873" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:873,&quot;width&quot;:1299,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!86gx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg 424w, https://substackcdn.com/image/fetch/$s_!86gx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg 848w, https://substackcdn.com/image/fetch/$s_!86gx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!86gx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55fb96bb-5203-4ff4-a77a-61beaf1bcf54_1299x873.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div><hr></div><p>Thanks for reading. If you want to be up to date with the last threats and news in the cybersecurity world, subscribe!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatnewsletter.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cyber Threats #02 - Microsoft Recall, Paris Olympics, Malware in Routers and more.]]></title><description><![CDATA[Trojanizing a copy of the popular VSCode "Dracula Official theme" to include malicious code, LLM Agents can Autonomously Hack Websites, ...]]></description><link>https://www.threatnewsletter.com/p/threat-intelligence-02</link><guid isPermaLink="false">https://www.threatnewsletter.com/p/threat-intelligence-02</guid><dc:creator><![CDATA[Alex Palazon]]></dc:creator><pubDate>Mon, 10 Jun 2024 05:59:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ovCM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bur4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bur4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!Bur4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!Bur4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!Bur4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bur4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png" width="408" height="162.79470198675497" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:241,&quot;width&quot;:604,&quot;resizeWidth&quot;:408,&quot;bytes&quot;:98477,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Bur4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!Bur4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!Bur4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!Bur4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7b920d3-369c-45c3-95c9-0cd9b4b86ec6_604x241.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>Welcome to the second edition of the Threat Intelligence Newsletter</strong>. The goal is to deliver weekly updates with the latest in threat intelligence and cybersecurity related, to help accelerate innovation and collaboratively build a more secure future!</p><h2>Week in review</h2><div><hr></div><h4><strong><a href="https://www.securityweek.com/google-microsoft-russian-threat-actors-pose-high-risk-to-2024-paris-olympics/">Russian Threat Actors Pose High Risk to 2024 Paris Olympics</a></strong></h4><p>According to Google Cloud&#8217;s Mandiant cybersecurity team, the 2024 Paris Olympics is facing cyber threats ranging from espionage, disruption, destruction, hacktivism, influence, and financially motivated activities. </p><p></p><p></p><p></p><h4><strong><a href="https://arstechnica.com/security/2024/05/mystery-malware-destroys-600000-routers-from-a-single-isp-during-72-hour-span/">Mystery malware destroys 600,000 routers from a single ISP during 72-hour span</a></strong></h4><p>An unknown threat actor with equally unknown motives forces ISP to replace routers. According to Black Lotus Labs, the routers&#8212;conservatively estimated at a minimum of 600,000&#8212;were taken out by an unknown threat actor with equally unknown motivations. The attacker used <a href="https://news.sophos.com/en-us/2018/10/22/chalubo-botnet-wants-to-ddos-from-your-server-or-iot-device/">Chalubo</a> and perhaps used custom Lua scripts to replace/wipe the router firmware:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ovCM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ovCM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png 424w, https://substackcdn.com/image/fetch/$s_!ovCM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png 848w, https://substackcdn.com/image/fetch/$s_!ovCM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png 1272w, https://substackcdn.com/image/fetch/$s_!ovCM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ovCM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png" width="640" height="320" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:320,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ovCM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png 424w, https://substackcdn.com/image/fetch/$s_!ovCM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png 848w, https://substackcdn.com/image/fetch/$s_!ovCM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png 1272w, https://substackcdn.com/image/fetch/$s_!ovCM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5732d70-6760-4dbc-af98-2b0b86d01054_640x320.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p></p><p></p><h4><strong><a href="https://www.bleepingcomputer.com/news/security/malicious-visual-studio-code-extensions-with-millions-of-installs-discovered/">Malicious VSCode extensions with millions of installs discovered</a></strong></h4><p>A group of Israeli researchers explored the security of the Visual Studio Code marketplace and managed to "infect" over 100 organizations by trojanizing a copy of the popular 'Dracula Official theme to include risky code. Further research into the VSCode Marketplace&nbsp;found <strong>thousands</strong> of extensions with millions of installs.</p><p></p><p></p><p></p><p></p><h2>Ideas Corner</h2><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l1_O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l1_O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png 424w, https://substackcdn.com/image/fetch/$s_!l1_O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png 848w, https://substackcdn.com/image/fetch/$s_!l1_O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png 1272w, https://substackcdn.com/image/fetch/$s_!l1_O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l1_O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png" width="483" height="462" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f52bafbc-0162-4078-a40b-3464fe8af343_483x462.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:462,&quot;width&quot;:483,&quot;resizeWidth&quot;:483,&quot;bytes&quot;:473023,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!l1_O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png 424w, https://substackcdn.com/image/fetch/$s_!l1_O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png 848w, https://substackcdn.com/image/fetch/$s_!l1_O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png 1272w, https://substackcdn.com/image/fetch/$s_!l1_O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff52bafbc-0162-4078-a40b-3464fe8af343_483x462.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>Productivity, Security and Microsoft Recall</h4><p>Tools like <a href="https://www.perplexity.ai/">Perplexity</a> or <a href="https://chat.openai.com/">chatGPT</a> are integrated into my daily workflow, and I cannot imagine my life without them.</p><p>With the announcement of Copilot+PC, Microsoft also introduced Recall:</p><p>&#8220;Retrace your steps with Recall. Search across time to find the content you need, then re-engage with it. With Recall, you have an explorable timeline of your PC&#8217;s past. Just describe how you remember it, and Recall will retrieve the moment you saw it. Any photo, link, or message can be a fresh starting point.&#8221;</p><p><code>This sounds really interesting in terms of productivity but could be a nightmare in terms of information security because it is essentially a keylogger. The feature has been heavily criticized by the security community since its announcement.</code></p><p><strong>But it can get worse&#8230;</strong> Researchers have successfully developed a tool capable of locating, extracting, and displaying all data stored by Recall on any device. The tool, &#8220;<strong>TotalRecall</strong>,&#8221; available on <a href="https://github.com/xaitax/TotalRecall">Github</a>, extracts and displays data from the Recall feature, providing an easy way to access snapshots of PC activity.</p><p>Therefore, Microsoft is making some changes to its controversial Recall feature to address security concerns. This means it won't take screenshots of everything you do after all, unless you opt in.</p><p>One of the main concerns with Microsoft&#8217;s Recall function, and indeed with all AI apps and functions, is the lack of  &#8220;Security by Default&#8221;. Even though Microsoft has a <a href="https://www.microsoft.com/en-us/microsoft-cloud/resources/secure-future-initiative">Secure Future Initiative</a> in place, it's challenging to be certain of its efficacy.</p><p>The challenges these tools bring cannot be overlooked. We urgently need a viable proposal to address the security concerns inherent in data protection for tools like Microsoft's Recall.</p><p></p><p></p><p></p><h2>Interesting Interviews, Tools and More</h2><div><hr></div><h4><strong><a href="https://www.youtube.com/watch?v=OltCsagcbP4#">One Million ASUS Routers Under Control: Exploiting ASUS DDNS to MITM Admin Credentials</a></strong></h4><p>Because we talked about routers, a little more deepdive to it. This researchers discovered that these routers, whether intended or not, configured via ASUS's DDNS, are susceptible to a man-in-the-middle (MITM) attack, which we identified, enabling the theft of admin credentials....</p><h4></h4><p></p><p></p><h4><strong><a href="https://arxiv.org/pdf/2402.06664">LLM Agents can Autonomously Hack Websites</a></strong></h4><p>This paper shows that LLM agents can autonomously hack websites, performing tasks as complex as blind database schema extraction and SQL injections without human feedback. Importantly, the agent does not need to know the vulnerability beforehand.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yQdI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yQdI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png 424w, https://substackcdn.com/image/fetch/$s_!yQdI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png 848w, https://substackcdn.com/image/fetch/$s_!yQdI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png 1272w, https://substackcdn.com/image/fetch/$s_!yQdI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yQdI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png" width="396" height="215.68876080691643" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:378,&quot;width&quot;:694,&quot;resizeWidth&quot;:396,&quot;bytes&quot;:53767,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yQdI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png 424w, https://substackcdn.com/image/fetch/$s_!yQdI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png 848w, https://substackcdn.com/image/fetch/$s_!yQdI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png 1272w, https://substackcdn.com/image/fetch/$s_!yQdI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee4ffb5-9829-491b-872e-3628d54c3d46_694x378.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p></p><p></p><p></p><h4><a href="https://github.com/prompt-security/ps-fuzz">Prompt Fuzzer is an open-source tool that evaluates the security of  GenAI application&#8217;s system prompt against dynamic LLM-based threats.</a></h4><p>This interactive tool assesses the security of your GenAI application's system prompt against various dynamic LLM-based attacks. It provides a security evaluation based on the outcome of these attack simulations, enabling you to strengthen your system prompt as needed.</p><p></p><div><hr></div><p>Thanks for reading. If you want to be up to date with the last threats and news in the cybersecurity world, subscribe!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatnewsletter.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cyber Threats #01 - Snowflake, Check Point PoC, GPT-4o Vision for Threat Intel, and more...]]></title><description><![CDATA[Welcome to the first edition of the Threat Intelligence Newsletter!]]></description><link>https://www.threatnewsletter.com/p/threat-intelligence-01-snowflake</link><guid isPermaLink="false">https://www.threatnewsletter.com/p/threat-intelligence-01-snowflake</guid><dc:creator><![CDATA[Alex Palazon]]></dc:creator><pubDate>Wed, 05 Jun 2024 14:34:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9sgG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-OKY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-OKY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!-OKY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!-OKY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!-OKY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-OKY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png" width="346" height="138.0562913907285" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:241,&quot;width&quot;:604,&quot;resizeWidth&quot;:346,&quot;bytes&quot;:98477,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-OKY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png 424w, https://substackcdn.com/image/fetch/$s_!-OKY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png 848w, https://substackcdn.com/image/fetch/$s_!-OKY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png 1272w, https://substackcdn.com/image/fetch/$s_!-OKY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb643cb8c-d9d5-44bf-a90e-3acc90a07dac_604x241.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>Welcome to the first edition of the Threat Intelligence Newsletter</strong>. The goal is to deliver weekly updates with the latest in threat intelligence and cybersecurity related, to help accelerate innovation and collaboratively build a more secure future!</p><p></p><h2>Week in review</h2><div><hr></div><h4><a href="https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access?is=d73dfb4bc5ad291f5a6a43ae366044c22351f2f322103fcc91ceecb5243907cd">Snowflake breach is behind Ticketmaster and Santander</a></h4><p>It appears the cause of these breaches are client accounts with weak or compromised passwords match with a lack of Multi-Factor Authentication enabled. Santander released a statement noting that they <em>&#8220;recently became aware of an unauthorized access to a Santander database hosted by a third-party provider.&#8221; </em>CISA has added this vulnerability to its&nbsp;<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities Catalog</a>, based on evidence of active exploitation.<br></p><h1></h1><h4><strong><a href="https://www.bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/">Breach: Dell API abused to steal 49 million records</a></strong></h4><p>A threat actor known as Menelik abused a partner portal API to scrape the information of approximately 49 million Dell customer records. The stolen data included customer names, order numbers, service tags, installed locations, and more. </p><p></p><h1></h1><h4><a href="https://github.com/LucasKatashi/CVE-2024-24919">PoC for Check Point Vulnerability Released</a></h4><p>Active exploitation of this vulnerability has been observed in the wild by multiple threat actors. A PoC was publicly released on May 30, 2024. The vuln is tracked as <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24919">CVE-2024-24919</a> and could allow an unauthenticated remote attacker to read local files from the affected Security Gateway, including any exposed sensitive files such as password data, SSH keys, or other credentials.</p><p> A fast search in Fofa returns more than 45k unique IPs:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9sgG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9sgG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png 424w, https://substackcdn.com/image/fetch/$s_!9sgG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png 848w, https://substackcdn.com/image/fetch/$s_!9sgG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png 1272w, https://substackcdn.com/image/fetch/$s_!9sgG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9sgG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png" width="1223" height="763" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:763,&quot;width&quot;:1223,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:194163,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9sgG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png 424w, https://substackcdn.com/image/fetch/$s_!9sgG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png 848w, https://substackcdn.com/image/fetch/$s_!9sgG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png 1272w, https://substackcdn.com/image/fetch/$s_!9sgG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0360fc0-69c4-4291-a074-2ba950287b0b_1223x763.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><pre><code><code>Fofa Dork: 
app="Check_Point-SSL-Network-Extender"</code></code></pre><pre><code><code>Shodan Dork: 
"Server: Check Point SVN" "X-UA-Compatible: IE=EmulateIE7"</code></code></pre><h1></h1><p></p><h2>Ideas Corner</h2><div><hr></div><h4>Leveraging LLMs for Threat Intelligence</h4><p>Integrating AI into everything has become incredibly popular these days, but the question I always have in mind is <strong>how can we use the power of  GenAI to enhance Threat Intelligence or SOC efficiency, reduce response times, and focus on what's important?</strong></p><p>This example &#8220;<strong><a href="https://blog.securitybreak.io/time-series-analysis-by-leveraging-gpt-4o-vision-for-threat-intel-d0b3225a40c9">Time Series Analysis by Leveraging GPT-4o Vision for Threat Intel</a>&#8221; </strong>or this other<strong> <a href="https://medium.com/mitre-engenuity/our-tram-large-language-model-automates-ttp-identification-in-cti-reports-5bc0a30d4567">&#8220;Our TRAM Large Language Model Automates TTP Identification in CTI Reports</a></strong>&#8220; can be an answer.</p><p></p><p>One significant challenge is alert triage, burdened by alert overload and the rapid increase in cyberattacks. Why not reduce manual tasks with an efficient workflow?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CLU-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CLU-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png 424w, https://substackcdn.com/image/fetch/$s_!CLU-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png 848w, https://substackcdn.com/image/fetch/$s_!CLU-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png 1272w, https://substackcdn.com/image/fetch/$s_!CLU-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CLU-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png" width="250" height="263.6103151862464" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:698,&quot;resizeWidth&quot;:250,&quot;bytes&quot;:79189,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CLU-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png 424w, https://substackcdn.com/image/fetch/$s_!CLU-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png 848w, https://substackcdn.com/image/fetch/$s_!CLU-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png 1272w, https://substackcdn.com/image/fetch/$s_!CLU-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe9c9fa-b88c-4e0e-acfb-4a60cba9f960_698x736.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p></p><p>Of course GenAI is not magic. Monitoring responses, refining prompts, and improving data are crucial steps in leveraging this technology effectively.</p><h1></h1><p></p><h2>Interesting Interviews, Tools and More</h2><div><hr></div><h4><a href="https://youtu.be/3w7E4Hhtubw?si=l9iPZhR2uIBF52CH">The Gentlemen Hackers interview: The Grugq</a></h4><p>Many years ago that I listen the talk <a href="https://www.youtube.com/watch?v=S8GPTvq1m-w">OPSEC: Because Jail is for wuftpd </a> from <a href="https://twitter.com/thegrugq">The Grugq</a>, and now in this intersting  interview they discuss the evolution of hacking, the human aspect of hacking operations, and some skepticism towards the discovery of a potential security breach involving a half-second delay in SSH communications.</p><div id="youtube2-3w7E4Hhtubw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3w7E4Hhtubw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3w7E4Hhtubw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1></h1><p></p><h4><a href="https://geospy.ai/">Geospy.ai: Photo location prediction using AI</a></h4><p>Talking about OPSEC&#8230; I came across this tool Geospy.ai in <a href="https://x.com/itsandrewgao/status/1785888849761313206">twitter</a>,  and is really good. GeoSpy is a cutting-edge AI platform specialized in geo-estimation and location prediction, leveraging pixel data to accurately infer geographical locations</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aXvy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aXvy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png 424w, https://substackcdn.com/image/fetch/$s_!aXvy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png 848w, https://substackcdn.com/image/fetch/$s_!aXvy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png 1272w, https://substackcdn.com/image/fetch/$s_!aXvy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aXvy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png" width="472" height="232.43406593406593" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:717,&quot;width&quot;:1456,&quot;resizeWidth&quot;:472,&quot;bytes&quot;:852274,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aXvy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png 424w, https://substackcdn.com/image/fetch/$s_!aXvy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png 848w, https://substackcdn.com/image/fetch/$s_!aXvy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png 1272w, https://substackcdn.com/image/fetch/$s_!aXvy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f6afc8a-72f5-4fcd-ba40-6c495b9fe667_1818x895.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h1></h1><p></p><h4><a href="https://sherlockeye.io/">Sherlockeye.io OSINT tool</a></h4><p>Sherlockeye is a tool designed to elevate your research and analysis (on emails). By the combined power of leading search engines like Google and DuckDuckGo, alongside cutting-edge AI language models, Sherlockeye delivers unmatched insights and understanding from your data.</p><h1></h1><p></p><h4><a href="https://blog.bytebytego.com/p/api-security-best-practices">API Security Best Practices</a></h4><p>This post explains how APIs are the backbone of modern applications. They expose a very large surface area for attacks, increasing the risk of security vulnerabilities. Common threats include SQL injection, cross-site scripting, and distributed denial of service (DDoS) attacks.</p><p></p><div><hr></div><p>Thanks for reading. If you want to be up to date with the last threats and news in the cybersecurity world, subscribe!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.threatnewsletter.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p><p></p>]]></content:encoded></item></channel></rss>