• Generative AI vs Machine Learning: Key Differences and Use Cases

    Updated: 2024-09-30 23:25:26
    Generative AI is a form of artificial intelligence designed to generate content such as text, images, video, and music. It uses large language models and algorithms to analyze patterns in datasets and mimic the style or structure of specific content types. Machine learning (ML), on the other hand, helps computers learn tasks and actions using […] The post Generative AI vs Machine Learning: Key Differences and Use Cases appeared first on eWEEK.

  • Video Tutorial: Installing NetworkMiner Professional

    Updated: 2024-09-30 23:25:22
    This video tutorial covers how to install NetworkMiner Professional. Use the official 7-zip tool to extract the password protected 7zip archive. Recommended locations for NetworkMiner: DesktopMy DocumentsC:\Users\{user}\AppData\Local\Programs\USB flash drive See our NetworkMiner Professional tutoria[...]

  • Opening capture files with NetworkMiner Professional

    Updated: 2024-09-30 23:25:22
    This video tutorial demonstrates how to open capture files with NetworkMiner Professional The analyzed pcap-ng file is github.pcapng from CloudShark. More info about this capture file can be found in our blog post Forensics of Chinese MITM on GitHub. See our NetworkMiner Professional tutorial videos[...]

  • CapLoader 1.9.7 Released

    Updated: 2024-09-30 23:25:22
    A new release of CapLoader has been published! Some of the changes can be seen directly in the user interface, such as Community ID values for flows and a few other new columns in the Flows and Services tabs. Other improvements are more subtle, like improved detection of remote management protocols[...]

  • Tool update: mac-robber.py and le-hex-to-ip.py, (Mon, Sep 30th)

    Updated: 2024-09-30 23:25:21
    : Internet Storm Center Sign In Sign Up SANS Network Security : Las Vegas Sept 4-9. Handler on Duty : Jim Clausing Threat Level : green previous My next : class LINUX Incident Response and Threat Hunting Online Japan Standard Time Oct 21st Oct 26th 2024 Tool update : mac-robber.py and le-hex-to-ip.py Published 2024-09-30. Last Updated 2024-09-30 17:13:05 UTC by Jim Clausing Version : 1 0 comment(s One of the problems I've had since I originally wrote mac-robber.py 1 2 3 seven years ago is that because of the underlying os.stat python library we couldn't get file creation times B-times Since the release of GNU coreutils 8.32 or so the statx( call has been available on Linux to provide the B-time , but Python out of the box doesn't yet support that call . Recently , though , I did some

  • ISC Stormcast For Monday, September 30th, 2024 https://isc.sans.edu/podcastdetail/9158, (Mon, Sep 30th)

    Updated: 2024-09-30 23:25:21
    , , : Internet Storm Center Sign In Sign Up SANS Network Security : Las Vegas Sept 4-9. Handler on Duty : Jim Clausing Threat Level : green previous next My next : class Application Security : Securing Web Apps , APIs , and Microservices Denver Oct 2nd Oct 7th 2024 ISC Stormcast For Monday , September 30th , 2024 https : isc.sans.edu podcastdetail 9158 My next : class Application Security : Securing Web Apps , APIs , and Microservices Denver Oct 2nd Oct 7th 2024 previous next Comments Login here to join the . discussion Top of page Ø Diary Archives Homepage Diaries Podcasts Jobs Data TCP UDP Port Activity Port Trends SSH Telnet Scanning Activity Weblogs Threat Feeds Activity Threat Feeds Map Useful InfoSec Links Presentations Papers Research Papers API Tools DShield Sensor DNS Looking

  • ISC Stormcast For Friday, September 27th, 2024 https://isc.sans.edu/podcastdetail/9156, (Fri, Sep 27th)

    Updated: 2024-09-30 23:25:21
    , , : Internet Storm Center Sign In Sign Up SANS Network Security : Las Vegas Sept 4-9. Handler on Duty : Jim Clausing Threat Level : green previous next My next : class Application Security : Securing Web Apps , APIs , and Microservices Denver Oct 2nd Oct 7th 2024 ISC Stormcast For Friday , September 27th , 2024 https : isc.sans.edu podcastdetail 9156 My next : class Application Security : Securing Web Apps , APIs , and Microservices Denver Oct 2nd Oct 7th 2024 previous next Comments Login here to join the . discussion Top of page Ø Diary Archives Homepage Diaries Podcasts Jobs Data TCP UDP Port Activity Port Trends SSH Telnet Scanning Activity Weblogs Threat Feeds Activity Threat Feeds Map Useful InfoSec Links Presentations Papers Research Papers API Tools DShield Sensor DNS Looking

  • Patch for Critical CUPS vulnerability: Don't Panic, (Thu, Sep 26th)

    Updated: 2024-09-30 23:25:21
    These last two days, a lot has been talked about a "Doomsday 9.9 RCE bug&#;x26;#;39;" in Linux [1]. We now have some additional details from Simone Margaritelli, who discovered and reported the vulnerabilities.

  • ISC Stormcast For Thursday, September 26th, 2024 https://isc.sans.edu/podcastdetail/9154, (Thu, Sep 26th)

    Updated: 2024-09-30 23:25:21
    These last two days, a lot has been talked about a "Doomsday 9.9 RCE bug&#;x26;#;39;" in Linux [1]. We now have some additional details from Simone Margaritelli, who discovered and reported the vulnerabilities.

  • DNS Reflection Update and Odd Corrupted DNS Requests, (Wed, Sep 25th)

    Updated: 2024-09-30 23:25:21
    Occasionally, I tend to check in on what reflective DNS denial of service attacks are doing. We usually see steady levels of attacks. Usually, they attempt to use spoofed requests for ANY records to achieve the highest possible amplification. Currently, I am seeing these two records used (among others):

  • ISC Stormcast For Wednesday, September 25th, 2024 https://isc.sans.edu/podcastdetail/9152, (Wed, Sep 25th)

    Updated: 2024-09-30 23:25:21
    Occasionally, I tend to check in on what reflective DNS denial of service attacks are doing. We usually see steady levels of attacks. Usually, they attempt to use spoofed requests for ANY records to achieve the highest possible amplification. Currently, I am seeing these two records used (among others):

  • Exploitation of RAISECOM Gateway Devices Vulnerability CVE-2024-7120, (Tue, Sep 24th)

    Updated: 2024-09-30 23:25:21
    Late in July, a researcher using the alias "NETSECFISH" published a blog post revealing a vulnerability in RASIECOM gateway devices [1]. The vulnerability affects the "vpn/list_base_Config.php" endpoint and allows for unauthenticated remote code execution. According to Shodan, about 25,000 vulnerable devices are exposed to the internet.

  • ISC Stormcast For Tuesday, September 24th, 2024 https://isc.sans.edu/podcastdetail/9150, (Tue, Sep 24th)

    Updated: 2024-09-30 23:25:21
    Late in July, a researcher using the alias "NETSECFISH" published a blog post revealing a vulnerability in RASIECOM gateway devices [1]. The vulnerability affects the "vpn/list_base_Config.php" endpoint and allows for unauthenticated remote code execution. According to Shodan, about 25,000 vulnerable devices are exposed to the internet.

Current Feed Items | Previous Months Items

Aug 2024 | Jul 2024 | Jun 2024 | May 2024 | Apr 2024 | Mar 2024