❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Bypassing WAFs Using Oversized Requests

By: BHIS
15 October 2025 at 10:00

Many web application firewalls (WAFs) can be bypassed by simply sending large amounts of extra data in the request body along with your payload. Most WAFs will only process requests up to a certain size limit. How the WAF is configured to handle these large requests determines exploitability, but some common WAFs will allow it by default.

The post Bypassing WAFs Using Oversized Requests appeared first on Black Hills Information Security, Inc..

Chinese Cyberspies Hacked US Defense Contractors

25 September 2025 at 08:57

RedNovember has been targeting government, defense and aerospace, and legal services organizations worldwide.

The post Chinese Cyberspies Hacked US Defense Contractors appeared first on SecurityWeek.

Department of State employee sentenced for transmitting national defense information to suspected Chinese government agents

By: Dissent
4 September 2025 at 20:06
Today’s reminder of the insider threat, from the U.S. Attorney’s Office for the Eastern District of Virginia: ALEXANDRIA, Va. – A U.S. Department of State (DOS) employee was sentenced today to four years in prison for conspiring to collect and transmit national defense information to individuals he knew to be working for the government of...

Source

Google previews cyber β€˜disruption unit’ as U.S. government, industry weigh going heavier on offense

27 August 2025 at 14:26

Google says it is starting a cyber β€œdisruption unit,” a development that arrives in a potentially shifting U.S. landscape toward more offensive-oriented approaches in cyberspace.

But the contours of that larger shift are still unclear, and whether or to what extent it’s even possible. While there’s some momentum in policymaking and industry circles to put a greater emphasis on more aggressive strategies and tactics to respond to cyberattacks, there are also major barriers.

Sandra Joyce, vice president of Google Threat Intelligence Group, said at a conference Tuesday that more details of the disruption unit would be forthcoming in future months, but the company was looking for β€œlegal and ethical disruption” options as part of the unit’s work.

β€œWhat we’re doing in the Google Threat Intelligence Group is intelligence-led proactive identification of opportunities where we can actually take down some type of campaign or operation,” she said at the Center for Cybersecurity Policy and Law event, where she called for partners in the project. β€œWe have to get from a reactive position to a proactive one … if we’re going to make a difference right now.”

The boundaries in the cyber domain between actions considered β€œcyber offense” and those meant to deter cyberattacks are often unclear. The tradeoff between β€œactive defense” vs. β€œhacking back” is a common dividing line. On the less aggressive end, β€œactive defense” can include tactics like setting up honeypots designed to lure and trick attackers. At the more extreme end, β€œhacking back” would typically involve actions that attempt toΒ  deliberately destroy an attacker’s systems or networks.Β  Disruption operations might fall between the two, like Microsoft taking down botnet infrastructure in court or the Justice Department seizing stolen cryptocurrency from hackers.

Trump administration officials and some in Congress have been advocating for the U.S. government to go on offense in cyberspace, saying that foreign hackers and criminals aren’t suffering sufficient consequences. Much-criticized legislation to authorize private sector β€œhacking back” has long stalled in Congress, but some have recently pushed a version of the idea where the president would give β€œletters of marque” like those for early-U.S. sea privateers to companies authorizing them to legally conduct offensive cyber operations currently forbidden under U.S. law.

The private sector has some catching up to do if there’s to be a worthy field of firms able to focus on offense, experts say.

John Keefe, a former National Security Council official from 2022 to 2024 and National Security Agency official before that, said there had been government talks about a β€œnarrow” letters of marque approach β€œwith the private sector companies that we thought had the capabilities.” The concept was centered on ransomware, Russia and rules of the road for those companies to operate. β€œIt wasn’t going to be the Wild West,” said Keefe, now founder of Ex Astris Scientia, speaking like others in this story at Tuesday’s conference.

The companies with an emphasis on offense largely have only one customer β€” and that’s governments, said Joe McCaffrey, chief information security officer at defense tech company Anduril Industries. β€œIt’s a really tough business to be in,” he said. β€œIf you develop an exploit, you get to sell to one person legally, and then it gets burned, and you’re back again.”

By their nature, offensive cyber operations in the federal government are already very time- and manpower-intensive, said Brandon Wales, a former top official at the Cybersecurity and Infrastructure Security Agency and now vice president of cybersecurity at SentinelOne. Private sector companies could make their mark by innovating ways to speed up and expand the number of those operations, he said.

Overall, among the options of companies that could do more offensive work, the β€œindustry doesn’t exist yet, but I think it’s coming,” said Andrew McClure, managing director at Forgepoint Capital.

Certainly Congress would have to clarify what companies are able to do legally as well, Wales said.

But that’s just the industry side. There’s plenty more to weigh when stepping up offense.

β€œHowever we start, we need to make sure that we are having the ability to measure impact,” said Megan Stifel, chief strategy officer for the Institute for Security and Technology. β€œIs this working? How do we know?”

If there was a consensus at the conference it’s that the United States β€” be it the government or private sector β€” needs to do more to deter adversaries in cyberspace by going after them more in cyberspace.

One knock on that idea has been that the United States can least afford to get into a cyber shooting match, since it’s more reliant on tech than other nations and an escalation would hurt the U.S. the most by presenting more vulnerable targets for enemies. But Dmitri Alperovitch, chairman of the Silverado Policy Accelerator, said that idea was wrong for a couple reasons, among them that other nations have become just as reliant on tech, too.

And β€œthe very idea that in this current bleak state of affairs, engaging in cyber offense is escalatory, I propose to you, is laughable,” he said. β€œAfter all, what are our adversaries going to escalate to in response? Ransom more of our hospitals, penetrate more of our water and electric utilities, steal even more of our IP and financial assets?”

Alperovitch continued: β€œNot only is engaging in thoughtful and careful cyber offense not escalatory, but not doing so is.”

The post Google previews cyber β€˜disruption unit’ as U.S. government, industry weigh going heavier on offense appeared first on CyberScoop.

China accuses US of exploiting Microsoft zero-day in cyberattack

1 August 2025 at 10:05

U.S. intelligence agencies launched cyberattacks on two Chinese military enterprises dating back to 2022, in one case exploiting a Microsoft zero-day, China alleged Friday.

The Cyber Security Association of China said that in the first case, U.S. agencies from July of 2022 to July of 2023 β€œexploited a zero-day vulnerability in Microsoft Exchange Mail to attack and control the mail server of a major Chinese military enterprise for nearly a year,” according to a Google translation of the statement. They then used that access to steal data, the statement continues.

In the second case, the association said the U.S. agencies β€œlaunched a cyberattack against a Chinese military enterprise in the communications and satellite internet sectors” from July to November of last year by exploiting vulnerabilities in electronic file systems, where they also stole information. The statement didn’t name either enterprise.

While Chinese allegations of U.S. government hacking have become increasingly common β€” including a batch of allegations in April and in December of last year β€” the latest accusation is notable for its assertion that the agencies exploited a zero-day, or previously unknown and unpatched vulnerability, at U.S.-headquarted Microsoft.

Last week, Microsoft accused Chinese government-linked hackers of exploiting zero-days in its Sharepoint product in its own most recent finger-pointing at Beijing.

The Office of the Director of National Intelligence did not immediately respond to a request for comment Friday.

Asked on Fox News in June about Chinese hacking and theft of U.S. intellectual property, President Donald Trump answered bluntly.

β€œYou don’t think we do that to them? We do. We do a lot of things,” Trump said. β€œThat’s the way the world works. It’s a nasty world.”

China has also alleged cyberattacks from other governments, particularly from Taiwan, even as it has focused much of its attention on the United States. It tallied 600 foreign government-level attacks in 2024 alone.

β€œHacker groups, particularly those affiliated with US intelligence agencies, leverage established cyberattack teams, extensive supporting engineering systems, a standardized attack equipment arsenal, and robust vulnerability analysis and discovery capabilities to conduct attacks and infiltration against [China’s] critical information infrastructure, important information systems, and key personnel, posing a serious threat to national cybersecurity,” the Friday statement reads.

The post China accuses US of exploiting Microsoft zero-day in cyberattack appeared first on CyberScoop.

WEBCAST: CredDefense Toolkit

By: BHIS
4 October 2017 at 10:16

Beau Bullock, Brian Fehrman, & Derek Banks // Pentesting organizations as your day-to-day job quickly reveals commonalities among environments. Although each test is a bit unique, there’s a typical path […]

The post WEBCAST: CredDefense Toolkit appeared first on Black Hills Information Security, Inc..

❌
❌