Newsletter Subject

Last chance for LastPass?

From

packtpub.com

Email Address

austinm@packtpub.com

Sent On

Fri, Mar 24, 2023 04:05 PM

Email Preheader Text

A look at LastPass's apology, implementing obfuscation, and another APT group! SecPro #93: Last chan

A look at LastPass's apology, implementing obfuscation, and another APT group! [View this email in your browser]( SecPro #93: Last chance for LastPass? Hello! Now that spring is finally rolling around, I thought it was about time to add a little cybersecurity-focused fashion to my wardrobe. I'm sure you can imagine my excitement when this shirt popped up online - both fashionable and educational! After last week's laser focus on the Windows Patch Tuesday update, we thought we'd get back to basics. That's why we've brought you three different articles this week, dealing with code obfuscation, an update on LastPass's security nightmare, and a look at another APT. Also, we're keen to find out what you think about ChatGPT - the dawn of a Brave New World, something a bit more sinister, or just a passing fad? Tell us in the survey below! Cheers! [Austin Miller]( Editor in Chief [TELL US WHAT YOU THINK!]( This week's highlights: - [Why is code obfuscation important for cybersecurity?]( - [LastPass in the Spotlight]( - [APT #5 - Cozy Bear]( - [The Machine Learning for Cybersecurity Cookbook]( - [This Week's Survey]( And with that - on with the show! [_secpro]( [Packt _secpro Newsletter]( [The _secpro Website]( Reading from the UK or the US? Check out our offers on [Amazon.com]( and [Amazon.co.uk]( [JOIN US ON DISCORD!]( This Week's Editorial Article [Why is code obfuscation important for cybersecurity?]( Code obfuscation is where a machine code or source code is purposefully designed to be difficult for humans and computers to read. Do you understand obfuscated code when you see it? [LastPass in the Spotlight]( A lot of the time, security breaches are a matter of “when” and not “if”. The adversary is always sitting in wait, ready to exploit any tiny weakness that has found its way into the open. Has LastPass answered some difficult questions yet? [APT #5 - Cozy Bear]( The group is believed to be based in Russia and has been linked to a number of high-profile cyber attacks against governments, companies, and other organizations. But do you know who they are? Cybersecurity Fundamentals [Machine Learning for Cybersecurity Cookbook]( We're back with another excerpt from the [Machine Learning for Cybersecurity Cookbook]( This time, we're taking a look at how to tackle packed malware. For a full rundown on how to stuck into this problem, check out the book. [LIKE WHAT YOU SEE? CLICK HERE]( MalGAN – creating evasive malware Using Generative Adversarial Networks (GANs), we can create adversarial malware samples to train and improve our detection methodology, as well as to identify gaps before an adversary does. The code here is based on j40903272/MalConv-keras. The adversarial malware samples are malware samples that have been modified by padding them with a small, but carefully calculated, sequence of bytes, selected so as to fool the neural network (in this case, MalConv) being used to classify the samples. Getting ready Preparation for this recipe involves installing the pandas, keras, tensorflow, and scikit-learn packages in pip. The command is as follows: pip install pandas keras tensorflow sklearn The associated code and resource files for MalGan have been included in the repository for this book, in the MalGan directory. In addition, assemble a collection of PE samples and then place their paths in the first column of the file: "MalGAN_input/samplesIn.csv" In the second column, type in these samples' verdicts (1 for benign and 0 for malicious). Preparation for this recipe involves installing the pandas, keras, tensorflow, and scikit-learn packages in pip. The command is as follows: pip install pandas keras tensorflow sklearn The associated code and resource files for MalGan have been included in the repository for this book, in the MalGan directory. In addition, assemble a collection of PE samples and then place their paths in the first column of the file: "MalGAN_input/samplesIn.csv" In the second column, type in these samples' verdicts (1 for benign and 0 for malicious). How to do it... In this recipe, you will learn how to create adversarial malware: - Begin by importing the code for MalGAN, as well as some utility libraries. import os import pandas as pd from keras.models import load_model import MalGAN_utils import MalGAN_gen_adv_examples - Specify the input and output paths: save_path = "MalGAN_output" model_path = "MalGAN_input/malconv.h5" log_path = "MalGAN_output/adversarial_log.csv" pad_percent = 0.1 threshold = 0.6 step_size = 0.01 limit = 0. input_samples = "MalGAN_input/samplesIn.csv" - Set whether you'd like to use a GPU for adversarial sample generation: MalGAN_utils.limit_gpu_memory(limit) - Read in the csv file containing the names and labels of your samples into a data frame: df = pd.read_csv(input_samples, header=None) fn_list = df[0].values - Load the pre-computed MalConv model: model = load_model(model_path) - Use the Fast Gradient Step Method (FGSM) to generate adversarial malware: adv_samples, log = MalGAN_gen_adv_examples.gen_adv_samples (model, fn_list, pad_percent, step_size, threshold) - Save a log of the results and write the samples to disk: log.save(log_path) for fn, adv in zip(fn_list, adv_samples): _fn = fn.split('/')[-1] dst = os.path.join(save_path, _fn) print(dst) with open(dst, 'wb') as f: f.write(adv) Want to find out how it works? Check out the book on [packtpub.com]( ! Have You Tried...? Obfscuation is a valuable skill, so here's a few simple pieces to help you up your game. Especially useful for Windows users. - [danielbohannon/Invoke-Obfuscation]( - Obfuscation tool for PowerShell. - [danielbohannon/Revoke-Obfuscation]( - The blue team equivalent to Invoke Obfuscation. - [obfuscar/obfuscar]( - Need an obfuscation tool for .NET? Check this one out. - [mandiant/flare-floss]( - A simple tool for identifying and detangling obfuscated code in malware. [FORWARDED THIS EMAIL? SIGN UP HERE]( [NOT FOR YOU? UNSUBSCRIBE HERE]( Copyright © 2023 Packt Publishing, All rights reserved. As a GDPR-compliant company, we want you to know why you’re getting this email. The _secpro team, as a part of Packt Publishing, believes that you have a legitimate interest in our newsletter and the products associated with it. Our research shows that you opted-in for communication with Packt Publishing in the past and we think that your previous interest warrants our appropriate communication. If you do not feel that you should have received this or are no longer interested in _secpro, you can opt out of our emails using the unsubscribe link below. Our mailing address is: Packt Publishing Livery Place, 35 Livery StreetBirmingham, West Midlands, B3 2PB United Kingdom [Add us to your address book]( Want to change how you receive these emails? You can [update your preferences]( or [unsubscribe from this list](.

Marketing emails from packtpub.com

View More
Sent On

02/06/2024

Sent On

31/05/2024

Sent On

30/05/2024

Sent On

28/05/2024

Sent On

23/05/2024

Sent On

08/04/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2024 SimilarMail.