5 links
tagged with all of: security + evasion
Click any tag below to further narrow down your results
Links
Detection engineering requires an understanding of how attackers exploit subtle flaws in detection rules. The article highlights five common pitfalls that can lead to missed threats, including parameter variations, command chaining, double spaces, obfuscation techniques, and unaudited commands. By addressing these issues, detection engineers can improve their rule-writing to better catch malicious activity.
The blog discusses the resurgence of the Konfety mobile threat, highlighting its new evasion techniques that make it more challenging for security systems to detect. The article emphasizes the importance of staying updated on mobile threats to ensure device security.
The repository chronicles the author's development of a stealthy in-memory loader aimed at understanding malware evasion techniques and enhancing skills in offensive security and low-level programming. The project consists of multiple sub-projects, focusing on tasks such as memory allocation, downloading payloads to memory, and executing machine code directly from memory, with future plans to incorporate encryption and advanced evasion techniques. It serves as an educational resource for penetration testers and security researchers, emphasizing ethical usage.
Elastic Security Labs reports on the misuse of SHELLTER, a commercial evasion framework, by threat groups for infostealer campaigns since April 2025. The framework's advanced capabilities allow malicious actors to evade detection by anti-malware solutions, prompting the release of a dynamic unpacker by Elastic Security Labs to analyze SHELLTER-protected binaries. Key features include polymorphic obfuscation, payload encryption, and mechanisms to bypass detection systems.
The article discusses the concept of CloudTrail logging evasion in AWS, emphasizing the importance of policy size when creating effective logging mechanisms. It highlights how attackers can exploit insufficiently sized policies to avoid detection and the need for robust configurations to enhance security.