Если речь о межконтинентальных системах, цена неверного распознавания становится выше.
4 часа назад @ securitylab.ru
ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
Attackers are no longer just breaking in — they're blending in, hijacking everyday tools, trusted apps, and even AI assistants.
What used to feel like clear-cut "hacker stories" now looks more like a mirror of the systems we all use.
The newest campaigns don't shout for attention — they whisper through familiar interfaces, fake updates, and polished code.
ThreatsDay pulls these threads together — from corporate networks to consumer tech — revealing how quiet manipulation and automation are reshaping the threat landscape.
Every exploit, fake lure, or AI twist is a sign of systems being tested in real time.
5 days, 9 hours назад @ thehackernews.com
Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack
The Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem compromises observed recently.
In defending against threats like Shai-Hulud 2.0, organizations benefit significantly from the layered protection from Microsoft Defender, which provides security coverage from code, to posture management, to runtime.
This blog provides a high-level overview of Shai‑Hulud 2.0, the attack mechanisms, potential attack propagation paths, customized hunting queries, and the actions Microsoft Defender is taking to enhance detection, attack-path analysis, credential scanning, and supply chain hardening.
Tactic Observed activity Microsoft Defender coverage Execution S…
3 weeks назад @ microsoft.com
Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack
The Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem compromises observed recently.
In defending against threats like Shai-Hulud 2.0, organizations benefit significantly from the layered protection from Microsoft Defender, which provides security coverage from code, to posture management, to runtime.
This blog provides a high-level overview of Shai‑Hulud 2.0, the attack mechanisms, potential attack propagation paths, customized hunting queries, and the actions Microsoft Defender is taking to enhance detection, attack-path analysis, credential scanning, and supply chain hardening.
Tactic Observed activity Microsoft Defender coverage Execution S…
3 weeks назад @ microsoft.com
How Pixel and Android are bringing a new level of trust to your images with C2PA Content Credentials
At Made by Google 2025, we announced that the new Google Pixel 10 phones will support C2PA Content Credentials in Pixel Camera and Google Photos.
Pixel Camera attaches Content Credentials to any JPEG photo capture, with the appropriate description as defined by the Content Credentials specification for each capture mode.
attaches Content Credentials to any JPEG photo capture, with the appropriate description as defined by the Content Credentials specification for each capture mode.
Google Photos attaches Content Credentials to JPEG images that already have Content Credentials and are edited using AI or non-AI tools, and also to any images that are edited using AI tools.
Building a More Trus…
3 months, 3 weeks назад @ security.googleblog.com