10 links
tagged with all of: detection + security
Click any tag below to further narrow down your results
Links
ghbuster is a tool that identifies potentially malicious or inauthentic GitHub repositories and users through heuristics. It provides methods to detect suspicious activities such as unlinked email commits and coordinated stargazing, helping to maintain the integrity of the GitHub ecosystem. Users can easily install and run the tool with specific commands and can also generate documentation and run tests.
Detection engineering requires an understanding of how attackers exploit subtle flaws in detection rules. The article highlights five common pitfalls that can lead to missed threats, including parameter variations, command chaining, double spaces, obfuscation techniques, and unaudited commands. By addressing these issues, detection engineers can improve their rule-writing to better catch malicious activity.
The article provides insights into detecting privilege escalation vulnerabilities in Active Directory Certificate Services (ADCS). It outlines various techniques and tools that can be employed to identify and mitigate these security risks effectively. The content emphasizes the importance of proactive security measures in safeguarding sensitive systems.
The article discusses advancements in artificial intelligence aimed at defending against deepfake technology, which poses significant risks to personal and organizational security. It emphasizes the importance of developing robust detection methods to identify manipulated media and protect against misinformation. Additionally, the piece highlights the need for ongoing research and collaboration in this evolving field.
Cloudflared is a tunneling application that allows secure remote access to hosts and deployment of web applications without exposing them to the internet. However, it has also been misused by ransomware groups for maintaining unauthorized access within compromised environments. The article discusses various detection methods for identifying malicious Cloudflared instances, including analyzing account IDs and monitoring for anomalous activities.
AutoPwnKey is a framework designed to enhance security awareness regarding the risks of AutoHotKey and AutoIT in red team engagements. It aims to equip red teams with tools to effectively test and assess security postures against evasive tactics used by adversaries, while encouraging ethical participation and contributions to improve detection capabilities. The ultimate goal is to make such attack vectors obsolete by advancing detection logic.
Call stacks enhance malware detection by providing detailed insights into who is executing specific activities on Windows systems. By utilizing execution tracing features and enriching call stack data, Elastic's approach improves the ability to identify and respond to malicious behavior more effectively. The article emphasizes the importance of accurately analyzing call stacks to expose the lies malware authors use to conceal their actions.
Bots can perform beneficial tasks but can also disrupt services and steal data. This guide provides strategies for detecting and stopping malicious bots, including monitoring traffic patterns, using bot detection tools, implementing honeypots, and applying rate limiting to control excessive requests.
AIDR-Bastion is a GenAI protection system that employs multiple detection engines to analyze user inputs and safeguard against malicious activity. It supports various detection rules, integrates with popular platforms for enhanced functionality, and features a flexible architecture that allows for extensibility and real-time analysis. The system is designed to provide comprehensive defense against adversarial prompt engineering and other AI-related threats.
BamboozlEDR is an Event Tracing for Windows (ETW) tool designed for generating realistic security events to test EDR detection capabilities and security monitoring solutions. It features a TUI interface, supports multiple Windows ETW providers, and includes advanced features such as event obfuscation to protect against static analysis. The tool is intended for research and testing purposes and requires user interaction to minimize misuse.