306
20
submitted 1 week ago by Pro@programming.dev to c/world@lemmy.world
-9
submitted 1 week ago* (last edited 1 week ago) by Pro@programming.dev to c/technology@lemmy.world

Using public information and making small tweaks, an alpha-seeking AI fund manager outperformed 93% of mutual fund managers by an average of 600%.

313
1
122
5
submitted 1 week ago* (last edited 1 week ago) by Pro@programming.dev to c/cybersecurity@infosec.pub
  • Check Point Research (CPR) discovered a new campaign conducted by the APT group Stealth Falcon. The attack used a .url file that exploited a zero-day vulnerability (CVE-2025-33053) to execute malware from an actor-controlled WebDAV server. CVE-2025-33053 allows remote code execution through manipulation of the working directory. Following CPR’s responsible disclosure, Microsoft today, June 10, 2025, released a patch as part of their June Patch Tuesday updates.
  • Stealth Falcon’s activities are largely focused on the Middle East and Africa, with high-profile targets in the government and defense sectors observed in Turkey, Qatar, Egypt, and Yemen.
  • Stealth Falcon continues to use spear-phishing emails as an infection method, often including links or attachments that utilize WebDAV and LOLBins to deploy malware.
  • Stealth Falcon deploys custom implants based on open-source red team framework Mythic, which are either derived from existing agents or a private variant we dubbed Horus Agent. The customization not only introduce anti-analysis and anti-detection measures but also validate target systems before ultimately delivering more advanced payloads.
  • In addition, the threat group employs multiple previously undisclosed custom payloads and modules, including keyloggers, passive backdoors, and a DC Credential Dumper.
10
submitted 1 week ago* (last edited 1 week ago) by Pro@programming.dev to c/cybersecurity@sh.itjust.works
  • Check Point Research (CPR) discovered a new campaign conducted by the APT group Stealth Falcon. The attack used a .url file that exploited a zero-day vulnerability (CVE-2025-33053) to execute malware from an actor-controlled WebDAV server. CVE-2025-33053 allows remote code execution through manipulation of the working directory. Following CPR’s responsible disclosure, Microsoft today, June 10, 2025, released a patch as part of their June Patch Tuesday updates.
  • Stealth Falcon’s activities are largely focused on the Middle East and Africa, with high-profile targets in the government and defense sectors observed in Turkey, Qatar, Egypt, and Yemen.
  • Stealth Falcon continues to use spear-phishing emails as an infection method, often including links or attachments that utilize WebDAV and LOLBins to deploy malware.
  • Stealth Falcon deploys custom implants based on open-source red team framework Mythic, which are either derived from existing agents or a private variant we dubbed Horus Agent. The customization not only introduce anti-analysis and anti-detection measures but also validate target systems before ultimately delivering more advanced payloads.
  • In addition, the threat group employs multiple previously undisclosed custom payloads and modules, including keyloggers, passive backdoors, and a DC Credential Dumper.
88
submitted 1 week ago by Pro@programming.dev to c/canada@lemmy.ca
31
104
submitted 1 week ago* (last edited 1 week ago) by Pro@programming.dev to c/canada@lemmy.ca
71
Android 16 is here (blog.google)
submitted 1 week ago* (last edited 1 week ago) by Pro@programming.dev to c/technology@lemmy.world
view more: ‹ prev next ›

Pro

joined 1 month ago