Fal.Con 2024 wasn’t just about product innovation — it was about delivering an unforgettable experience with countless opportunities to connect, learn and engage. From expert-led breakout sessions and hands-on workshops to SOC Survivor Games and live demos, Fal.Con solidified its place as the premier cybersecurity event of the year. Recognized by Analysts, Trusted by … [Read more...] about CrowdStrike Falcon Next-Gen SIEM’s First Year Transforming the SOC
AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case
Dec 23, 2024Ravie LakshmananMachine Learning / Threat Analysis Cybersecurity researchers have found that it's possible to use large language models (LLMs) to generate new variants of malicious JavaScript code at scale in a manner that can better evade detection. "Although LLMs struggle to create malware from scratch, criminals can easily use them to rewrite or obfuscate … [Read more...] about AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case
Crypto scam: seed phrases shared publicly
“I have a question. I have USDT stored in my wallet, and I have the seed phrase. How to transfer my funds to another wallet?” — we found a comment like this under a finance-related video on YouTube. And the seed phrase was revealed in full in the comment. This looked suspicious: even a complete cryptocurrency beginner should know better than to share their seed phrase with the … [Read more...] about Crypto scam: seed phrases shared publicly
LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages
A dual Russian and Israeli national has been charged in the United States for allegedly being the developer of the now-defunct LockBit ransomware-as-a-service (RaaS) operation since its inception in or around 2019 through at least February 2024. Rostislav Panev, 51, was arrested in Israel earlier this August and is currently awaiting extradition, the U.S. Department of Justice … [Read more...] about LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages
Best Practices for Resilient Containers
Docker has revolutionized how applications are developed and delivered by enhancing the efficiency and scaling of containerization. However, the rapid proliferation and wide adoption of Docker technology has increased a number of serious security vulnerabilities. The items below enumerate some key approaches towards optimal security in Docker containers. Key security areas … [Read more...] about Best Practices for Resilient Containers
Detection Logic for Pre-Deployment Malware Scanning
As organizations embrace DevOps practices and CI/CD pipelines to accelerate software delivery, their greater dependency on third-party components can introduce security risks. Because malware can infiltrate an environment during development, it’s important to check for it ahead of deployment. CrowdStrike Falcon® Cloud Security now applies its award-winning sensor … [Read more...] about Detection Logic for Pre-Deployment Malware Scanning
Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
The Lazarus Group, an infamous threat actor linked to the Democratic People's Republic of Korea (DPRK), has been observed leveraging a "complex infection chain" targeting at least two employees belonging to an unnamed nuclear-related organization within the span of one month in January 2024. The attacks, which culminated in the deployment of a new modular backdoor referred to … [Read more...] about Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
Dec 20, 2024Ravie LakshmananMalware / Supply Chain Attack The developers of Rspack have revealed that two of their npm packages, @rspack/core and @rspack/cli, were compromised in a software supply chain attack that allowed a malicious actor to publish malicious versions to the official package registry with cryptocurrency mining malware. Following the discovery, versions … [Read more...] about Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
Assessing Misconfigurations with Falcon Exposure Management
As most security teams know, vulnerabilities often steal the limelight with sensational headlines and zero-day exploits. However, lurking beneath the surface are misconfigurations — overlooked risks that can leave even well-protected systems exposed. Addressing these configuration errors is essential. Security configuration assessment (SCA), also known as configuration … [Read more...] about Assessing Misconfigurations with Falcon Exposure Management
Thousands Download Malicious npm Libraries Impersonating Legitimate Tools
Dec 19, 2024Ravie LakshmananSupply Chain / Software Security Threat actors have been observed uploading malicious typosquats of legitimate npm packages such as typescript-eslint and @types/node that have racked up thousands of downloads on the package registry. The counterfeit versions, named @typescript_eslinter/eslint and types-node, are engineered to download a trojan and … [Read more...] about Thousands Download Malicious npm Libraries Impersonating Legitimate Tools