detection-evasion

3 articles
sort: new top best
clear filter
0 3/10

Article discusses strategies for CISOs to scale phishing detection in SOCs, addressing modern phishing campaigns that use trusted infrastructure, legitimate authentication flows, and encryption to evade traditional detection.

thehackernews.com · [email protected] (The Hacker News) · 2 days ago · details
0 4/10

Attackers deliberately design phishing campaigns to overwhelm SOC analysts and extend investigation times, turning what should be a 5-minute triage into a 12-hour ordeal to create windows for breach success. The article discusses how threat actors weaponize organizational workload as a defensive evasion tactic.

thehackernews.com · [email protected] (The Hacker News) · 2 days ago · details
0 5/10

PhantomRaven is an ongoing supply-chain campaign distributing 88+ malicious npm packages using typosquatting and Remote Dynamic Dependencies (RDD) to evade detection. The malware steals CI/CD tokens, credentials, and system information from developers, exfiltrating data to attacker-controlled C2 servers.

PhantomRaven Koi Endor Labs npm Babel GraphQL Codegen GitHub GitLab Jenkins CircleCI Amazon EC2 Bill Toulas
bleepingcomputer.com · Bill Toulas · 2 days ago · details