labs.withsecure.com
Open in
urlscan Pro
2a02:26f0:7100::210:141
Public Scan
Submitted URL: https://labs.withsecure.com/
Effective URL: https://labs.withsecure.com/home
Submission Tags: falconsandbox
Submission: On November 10 via api from US — Scanned from DE
Effective URL: https://labs.withsecure.com/home
Submission Tags: falconsandbox
Submission: On November 10 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
JavaScript is disabled in your web browser For full functionality of this site it is necessary to enable JavaScript. Instructions how to enable JavaScript in your web browser. * Careers * Research * Expertise * Tools * Advisories * Contact Us WITHSECURE™ LABS: WITH GREAT RESEARCH COMES GREAT RESPONSIBILITY Research, development, updates and tooling you can use. LATEST PUBLICATION Read all publications 31. Oktober 2024 A BITWISE ANALYSIS OF AWS ACCESS KEY IDENTIFIERS AWS access keys have been the subject of research over the past few years. This page documents the findings, observations and open questions from our analysis into the access key ID component of an AWS access key. Read more 21. Oktober 2024 FINE-TUNING LLMS TO RESIST INDIRECT PROMPT INJECTION ATTACKS We fine-tuned Llama3-8B to improve its resistance to indirect prompt injection attacks on question/answer tasks involving emails and articles. Reproducible fine-tuning scripts, along with the model and a quantized version, are available on Hugging Face and Ollama for testing and experimentation. Read more 22. August 2024 RANSOMWARE LANDSCAPE H1/2024 This comprehensive analysis uncovers the business mechanics of ransomware groups, their ecosystems, and how they interact. The report not only provides a clear picture of the current ransomware situation but also reveals some unexpected trends. Read more 15. Juli 2024 OLYMPICS – CYBER THREATS TO PARIS 2024 In our latest research paper, Tim West, W/Intelligence’s Director of Threat Intelligence and Outreach, has looked into the cyber threats facing the Paris 2024 Olympics. As one of the world’s greatest events, there is always going to be unwanted interest, but how much should we worry and who are the main antagonists? Read more 12. Juni 2024 MASS EXPLOITATION: THE VULNERABLE EDGE OF ENTERPRISE SECURITY This report will explore the trend of mass exploitation of Edge Services and Infrastructure and will put forward several theories as to why they have been so heavily and successfully targeted by attackers. Read more 4. Juni 2024 WHEN YOUR AI ASSISTANT HAS AN EVIL TWIN We demonstrate how Google’s Gemini Advanced can be coerced into performing a social engineering attack. By sending a malicious email, attackers can manipulate Gemini's responses when analyzing the user's mailbox, causing it to display convincing messages that trick the user into revealing confidential information from other emails. Read more 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263 LATEST ADVISORIES Find out all advisories November 6, 2024 PROMPT INJECTION IN JETBRAINS RIDER AI ASSISTANT Read more -------------------------------------------------------------------------------- October 26, 2023 OPTIMIZELY CMS ADMIN PANEL DOM XSS Read more -------------------------------------------------------------------------------- October 23, 2023 IOS SINGLE APP MODE ESCAPE Read more -------------------------------------------------------------------------------- September 25, 2023 FUJITSU MPOLLUX FOR MACOS MULTIPLE VULNERABILITIES Read more -------------------------------------------------------------------------------- September 7, 2023 SQL INJECTION IN ZTE 4G ROUTERS AND MODEMS Read more -------------------------------------------------------------------------------- September 5, 2023 MEND.IO CROSS-TENANT ACCESS VIA VULNERABLE SAML IMPLEMENTATION Read more -------------------------------------------------------------------------------- August 21, 2023 SYNOLOGY ROUTER MANAGER REFLECTED XSS Read more FEATURED TOOLS Check out all tools August 30, 2024 ENCAP-ATTACK A tool to break into encapsulated networks by exploiting absent overlaps between host and overlay firewalls in Kubernetes deployments. Read more November 2, 2023 DEJECT: MALWARE REVERSE ENGINEERING TOOLBOX Deject is a commandline tool for reverse engineers to quickly analyse memory dumps and executable files. Read more August 30, 2022 GARBAGEMAN: DUMPSTER-DIVING THE .NET HEAP GarbageMan is a set of tools for analyzing .NET binaries through heap analysis. These tools - researched and developed by Jarkko Turkulainen from W/Intel. Read more July 21, 2022 DETECTREE: DETECTION VISUALISATION FOR BLUE TEAMS Detectree is a tool for visualising cyber security events and their relationships. Read more June 8, 2022 DROZER drozer allows you to assume the role of an Android app and interact with other apps. It can do anything that an installed application can do, such as make use of Android’s Inter-Process Communication (IPC) mechanism and interact with the underlying operating system. Read more October 20, 2021 CAT-SCALE LINUX INCIDENT RESPONSE COLLECTION On 30 September 2019, Joani Green and John Rogers gave a talk titled "Performing Linux Investigations at Scale" at the SANS DFIR Summit in Prague. Read more With Great Research Comes Great Responsibility. Resources * Research * Expertise * Tools * Advisories Find Labs * Contact us * GitHub WithSecure™ Company * Contact WithSecure™ * Careers at WithSecure™ WithSecure™ Newsletter * Vulnerability Disclosure Policy WithSecure™ Labs Home © WithSecure 2024 Cookies Button WE VALUE YOUR PRIVACY We need your consent so that we can access cookies, unique identifiers, personal data, and information on your browsing behavior on this device. By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. You can change your preferences at any time by clicking on the 'Advanced Settings’ icon located at the bottom left of any page.Privacy Policy Accept All Cookies Reject All Advanced Settings Your Opt Out Preference Signal is Honored PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices