sgadagin commited on
Commit
6f6032c
·
verified ·
1 Parent(s): 839af80

Add new SentenceTransformer model

Browse files
1_Pooling/config.json ADDED
@@ -0,0 +1,10 @@
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "word_embedding_dimension": 384,
3
+ "pooling_mode_cls_token": false,
4
+ "pooling_mode_mean_tokens": true,
5
+ "pooling_mode_max_tokens": false,
6
+ "pooling_mode_mean_sqrt_len_tokens": false,
7
+ "pooling_mode_weightedmean_tokens": false,
8
+ "pooling_mode_lasttoken": false,
9
+ "include_prompt": true
10
+ }
README.md ADDED
@@ -0,0 +1,1638 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ tags:
3
+ - sentence-transformers
4
+ - sentence-similarity
5
+ - feature-extraction
6
+ - generated_from_trainer
7
+ - dataset_size:3742
8
+ - loss:SoftmaxLoss
9
+ base_model: sentence-transformers/all-MiniLM-L6-v2
10
+ widget:
11
+ - source_sentence: 'As the year draws to a close, we have seen the number of emerging
12
+ threats like advance phishing attacks from the Syrian Electronic Army, financial
13
+ malware and exploit kits, Cryptolocker ransomware infections, massive Bitcoin
14
+ theft, extensive privacy breach from NSA and many more.
15
+
16
+
17
+ The financial malware''s were the most popular threat this year. Money is always
18
+ a perfect motivation for attackers and cyber criminals who are continually targeting
19
+ financial institutions.
20
+
21
+ On Tuesday, Antivirus firm Symantec has released a Threat report, called "The
22
+ State of Financial Trojans: 2013", which revealed that over 1,400 financial institutions
23
+ have been targeted and compromised millions of computers around the globe and
24
+ the most targeted banks are in the US with 71.5% of all analyzed Trojans.
25
+
26
+
27
+ Financial institutions have been fighting against malware for the last ten years
28
+ to protect their customers and online transactions from threat. Over the time
29
+ the attackers adapted to these countermeasures and sophisticated banking Trojans
30
+ began to emerge.
31
+
32
+
33
+ According to the report, the number of infections of the most common financial
34
+ Trojans grew to 337 percent in the first nine months of 2013. Nearly 1,500 institutions
35
+ in 88 countries were potential targets during 2013.
36
+
37
+ The financial fraud marketplace is also increasingly organized and Cyber criminals
38
+ are using advanced Trojans to commit large scale attacks.
39
+
40
+ Attackers of all skill levels can enter the arena of financial fraud, as the underground
41
+ marketplace is a service industry that provides an abundance of resources. Those
42
+ who lack expertise can simply purchase what they need. For as little as $100,
43
+ an attacker can avail of a leaked Zeus or Spyeye equipped with Web-injects.
44
+
45
+ The modern financial Trojan is extremely flexible, supporting a range of functionality
46
+ designed to facilitate fraudulent transactions across a variety of services.
47
+
48
+
49
+ Two dominant attack strategies are:
50
+
51
+ Focused attack: This approach suits attackers with limited resources but also
52
+ scales well to larger operations. If the distribution is accurate and the target
53
+ institution has a sizeable client base, a focused attack can provide an adequate
54
+ supply of targets. Shylock, Bebloh and Tilon all use this approach exclusively.
55
+
56
+ Broad strokes: In this attack strategy, Trojans are set to target large numbers
57
+ of institutions. Tilon, Cridex, and Gameover adopt these tactics and Zeus also
58
+ uses this approach in its default configuration.
59
+
60
+ According to Symantec, the main reason for the surge is weak authentication practices:
61
+
62
+
63
+ Unfortunately, in many situations, security implementations adopted by financial
64
+ institutions are inadequate to defend against the modern financial Trojan. Institutions
65
+ are starting to adopt strong security measures like chipTAN, but the adoption
66
+ rate is slow. Institutions that persist with weaker security measures will continue
67
+ to be exploited by attackers.
68
+
69
+ They need to maintain constant vigilance, apply software updates, maintain an
70
+ awareness of new threats and deploy complementary security solutions that can
71
+ defend against evolving malware attacks.
72
+
73
+
74
+ '
75
+ sentences:
76
+ - 'As the year draws to a close, we have seen the number of emerging threats like
77
+ advance phishing attacks from the Syrian Electronic Army, financial malware and
78
+ exploit kits, Cryptolocker ransomware infections, massive Bitcoin theft, extensive
79
+ privacy breach from NSA and many more.
80
+
81
+
82
+ The financial malware''s were the most popular threat this year. Money is always
83
+ a perfect motivation for attackers and cyber criminals who are continually targeting
84
+ financial institutions.
85
+
86
+ On Tuesday, Antivirus firm Symantec has released a Threat report, called "The
87
+ State of Financial Trojans: 2013", which revealed that over 1,400 financial institutions
88
+ have been targeted and compromised millions of computers around the globe and
89
+ the most targeted banks are in the US with 71.5% of all analyzed Trojans.
90
+
91
+
92
+ Financial institutions have been fighting against malware for the last ten years
93
+ to protect their customers and online transactions from threat. Over the time
94
+ the attackers adapted to these countermeasures and sophisticated banking Trojans
95
+ began to emerge.
96
+
97
+
98
+ According to the report, the number of infections of the most common financial
99
+ Trojans grew to 337 percent in the first nine months of 2013. Nearly 1,500 institutions
100
+ in 88 countries were potential targets during 2013.
101
+
102
+ The financial fraud marketplace is also increasingly organized and Cyber criminals
103
+ are using advanced Trojans to commit large scale attacks.
104
+
105
+ Attackers of all skill levels can enter the arena of financial fraud, as the underground
106
+ marketplace is a service industry that provides an abundance of resources. Those
107
+ who lack expertise can simply purchase what they need. For as little as $100,
108
+ an attacker can avail of a leaked Zeus or Spyeye equipped with Web-injects.
109
+
110
+ The modern financial Trojan is extremely flexible, supporting a range of functionality
111
+ designed to facilitate fraudulent transactions across a variety of services.
112
+
113
+
114
+ Two dominant attack strategies are:
115
+
116
+ Focused attack: This approach suits attackers with limited resources but also
117
+ scales well to larger operations. If the distribution is accurate and the target
118
+ institution has a sizeable client base, a focused attack can provide an adequate
119
+ supply of targets. Shylock, Bebloh and Tilon all use this approach exclusively.
120
+
121
+ Broad strokes: In this attack strategy, Trojans are set to target large numbers
122
+ of institutions. Tilon, Cridex, and Gameover adopt these tactics and Zeus also
123
+ uses this approach in its default configuration.
124
+
125
+ According to Symantec, the main reason for the surge is weak authentication practices:
126
+
127
+
128
+ Unfortunately, in many situations, security implementations adopted by financial
129
+ institutions are inadequate to defend against the modern financial Trojan. Institutions
130
+ are starting to adopt strong security measures like chipTAN, but the adoption
131
+ rate is slow. Institutions that persist with weaker security measures will continue
132
+ to be exploited by attackers.
133
+
134
+ They need to maintain constant vigilance, apply software updates, maintain an
135
+ awareness of new threats and deploy complementary security solutions that can
136
+ defend against evolving malware attacks.
137
+
138
+
139
+ '
140
+ - 'While Windows users are currently in fear of getting their systems hijacked by
141
+ the WannaCry ransomware outbreak, Apple users are sitting relaxed, thinking that
142
+ malware attacks are something that happens to Windows users, and not Apple.
143
+
144
+
145
+ But you are mistaken – Apple products are also not immune to the hack attacks
146
+ and malware infections, as an ebook can hack your Mac, iPhone, and iPad.
147
+
148
+
149
+ Apple on Monday pushed out software updates for iOS, macOS, Safari, tvOS, iCloud,
150
+ iTunes, and watchOS to fix a total of 67 unique security vulnerabilities, many
151
+ of which allows attackers to perform remote code execution on an affected system.
152
+
153
+
154
+ iOS is 10.3.2 for iPhone, iPad, and iPod
155
+
156
+
157
+ Apple''s mobile operating system iOS 10.3.2 for the iPhone, iPad and iPod touch
158
+ addresses 41 security flaws, 23 of which resides in WebKit, including 17 remote
159
+ code execution and 5 cross-site scripting (XSS) vulnerabilities.
160
+
161
+
162
+ Besides this, iOS 10.3.2 also addresses a pair of flaws in iBooks for iOS (CVE-2017-2497,
163
+ CVE-2017-6981) that could allow e-books to open arbitrary websites and execute
164
+ malicious code with root privileges.
165
+
166
+
167
+ Other flaws addressed in iOS 10.3.2 include a memory corruption issue in AVE Video
168
+ Encoder that could allow a malicious application to gain kernel-level privileges,
169
+ and a certificate validation issue in the certificate trust policy for handling
170
+ of untrusted certificates.
171
+
172
+
173
+ Apple users can install iOS 10.3.2 by connecting their iOS devices to iTunes or
174
+ downloading it directly by going to the Settings → General → Software Update.
175
+
176
+
177
+ macOS Sierra 10.12.5 for El Capitan and Yosemite
178
+
179
+
180
+ Apple''s Mac operating system macOS Sierra 10.12.5 addresses a total of 37 vulnerabilities,
181
+ including a pair of bugs in iBook that allow the execution of arbitrary code with
182
+ root privileges, and a separate bug in iBook that allows an application to escape
183
+ its secure sandbox.
184
+
185
+
186
+ Other flaws addressed in macOS Sierra 10.12.5 include a Wi-Fi networking issue
187
+ that allows the theft of network credentials, elevation of privilege bugs in both
188
+ the Intel and Nvidia graphics drivers, and four different arbitrary code execution
189
+ flaws in SQLite.
190
+
191
+
192
+ Mac users can download the update through the App Store → Updates. Alternatively,
193
+ macOS Sierra users can be download Sierra 10.12.5 as a stand-alone update, OS
194
+ X El Capitan users can download the update here, and OS X Yosemite users can get
195
+ the security update here.
196
+
197
+
198
+ Safari 10.1.1 for Apple Browser
199
+
200
+
201
+ Safari 10.1.1 addresses a total of 26 security issues, 23 of which resides in
202
+ WebKit, many of which are also patched in the iOS 10.3.2.
203
+
204
+
205
+ Rest three vulnerabilities are patched in the Safari browser itself.
206
+
207
+
208
+ The Safari 10.1.1 update can be downloaded by going to the App Store → Updates
209
+ on El Capitan and Yosemite systems.
210
+
211
+
212
+ watchOS 3.2.2 for Apple Watch
213
+
214
+
215
+ Apple Watch users should install watchOS 3.2.2 that patches a total of 12 security
216
+ vulnerabilities, four of which could be used by attackers to execute remote code
217
+ execution on the affected device.
218
+
219
+
220
+ Users of Apple Watch can download watchOS 3.2.2 by connecting their watch to its
221
+ charger, and opening the Apple Watch app → My Watch tab → General → Software Update
222
+ on their iPhone.
223
+
224
+
225
+ tvOS 10.2.1 for Apple TV
226
+
227
+
228
+ Apple has also released tvOS 10.2.1 to patch a total of 23 vulnerabilities, 12
229
+ of which resides in WebKit engine that could allow an attacker to perform cross-site
230
+ scripting and remote code execution attacks on a target device.
231
+
232
+
233
+ The tvOS 10.2.1 update can be downloaded directly from the Apple TV by going to
234
+ Settings → System → Update Software.
235
+
236
+
237
+ iTunes 12.6.1 for Windows and iCloud for Windows 6.2.1
238
+
239
+
240
+ Meanwhile, Apple also released patches for Windows users using iTunes and iCloud.
241
+ Both iTunes 12.6.1 and iCloud 6.2.1 patches a single remote code execution bug
242
+ in WebKit for Windows 7 and later.
243
+
244
+
245
+ Apple users are recommended to update all their operating systems for Apple products
246
+ and Safari as soon as possible before cyber criminals exploited them. Patches
247
+ are available through automatic updates.
248
+
249
+
250
+ '
251
+ - 'A really bad year for the world''s second-largest email service provider, Yahoo
252
+ Mail! The company announced today, ''we identified a coordinated effort to gain
253
+ unauthorized access to Yahoo Mail accounts'', user names and passwords of its
254
+ email customers have been stolen and are used to access multiple accounts.
255
+
256
+
257
+ Yahoo did not say how many accounts have been affected, and neither they are sure
258
+ about the source of the leaked users'' credentials. It appears to have come from
259
+ a third party database being compromised, and not an infiltration of Yahoo''s
260
+ own servers.
261
+
262
+
263
+ "We have no evidence that they were obtained directly from Yahoo''s systems. Our
264
+ ongoing investigation shows that malicious computer software used the list of
265
+ usernames and passwords to access Yahoo Mail accounts. The information sought
266
+ in the attack seems to be names and email addresses from the affected accounts''
267
+ most recent sent emails."
268
+
269
+
270
+ For now, Yahoo is taking proactive actions to protect their affected users, "We
271
+ are resetting passwords on impacted accounts and we are using second sign-in verification
272
+ to allow users to re-secure their accounts. Impacted users will be prompted (if
273
+ not, already) to change their password and may receive an email notification or
274
+ an SMS text if they have added a mobile number to their account."
275
+
276
+
277
+ People frequently use the same passwords on multiple accounts, so possibly hackers
278
+ are brute-forcing Yahoo accounts with the user credentials stolen from other data
279
+ breaches.
280
+
281
+
282
+ Yahoo users can prevent account hijacks by using a strong and unique password.
283
+ You can use ''Random strong password generator'' feature of DuckDuckGo search
284
+ engine to get a unique & strong password.
285
+
286
+
287
+ Users are also recommended to enable two-factor authentication, which requires
288
+ a code texted to the legitimate user''s mobile phone whenever a login attempt
289
+ is made from a new computer.
290
+
291
+
292
+ Yahoo! was hacked in July 2012, with attackers stealing 450,000 email addresses
293
+ and passwords from a Yahoo! contributor network.
294
+
295
+
296
+ Readers can also download two free Whitepaper related to the Email and account
297
+ security:
298
+
299
+ Cloud-Based Email Archiving
300
+
301
+ Email Data Loss Prevention
302
+
303
+ Well, Yahoo is now working with federal law enforcement as a part of its investigation.
304
+
305
+
306
+ '
307
+ - source_sentence: 'Security researchers have spotted a new malware campaign in the
308
+ wild that spreads an advanced botnet malware by leveraging at least three recently
309
+ disclosed vulnerabilities in Microsoft Office.
310
+
311
+
312
+ Dubbed Zyklon, the fully-featured malware has resurfaced after almost two years
313
+ and primarily found targeting telecommunications, insurance and financial services.
314
+
315
+
316
+ Active since early 2016, Zyklon is an HTTP botnet malware that communicates with
317
+ its command-and-control servers over Tor anonymising network and allows attackers
318
+ to remotely steal keylogs, sensitive data, like passwords stored in web browsers
319
+ and email clients.
320
+
321
+
322
+ Zyklon malware is also capable of executing additional plugins, including secretly
323
+ using infected systems for DDoS attacks and cryptocurrency mining.
324
+
325
+
326
+ Different versions of the Zyklon malware has previously been found being advertised
327
+ on a popular underground marketplace for $75 (normal build) and $125 ( Tor-enabled
328
+ build).
329
+
330
+
331
+ According to a recently published report by FireEye, the attackers behind the
332
+ campaign are leveraging three following vulnerabilities in Microsoft Office that
333
+ execute a PowerShell script on the targeted computers to download the final payload
334
+ from its C&C server.
335
+
336
+
337
+ 1) .NET Framework RCE Vulnerability (CVE-2017-8759)—this remote code execution
338
+ vulnerability exists when Microsoft .NET Framework processes untrusted input,
339
+ allowing an attacker to take control of an affected system by tricking victims
340
+ into opening a specially crafted malicious document file sent over an email. Microsoft
341
+ already released a security patch for this flaw in September updates.
342
+
343
+
344
+ 2) Microsoft Office RCE Vulnerability (CVE-2017-11882)—it''s a 17-year-old memory
345
+ corruption flaw that Microsoft patched in November patch update allows a remote
346
+ attacker to execute malicious code on the targeted systems without requiring any
347
+ user interaction after opening a malicious document.
348
+
349
+
350
+ 3) Dynamic Data Exchange Protocol (DDE Exploit)—this technique allows attackers
351
+ to leverage a built-in feature of Microsoft Office, called DDE, to perform code
352
+ execution on the targeted device without requiring Macros to be enabled or memory
353
+ corruption.
354
+
355
+
356
+ As explained by the researchers, attackers are actively exploiting these three
357
+ vulnerabilities to deliver Zyklon malware using spear phishing emails, which typically
358
+ arrives with an attached ZIP file containing a malicious Office doc file.
359
+
360
+
361
+ Once opened, the malicious doc file equipped with one of these vulnerabilities
362
+ immediately runs a PowerShell script, which eventually downloads the final payload,
363
+ i.e., Zyklon HTTP malware, onto the infected computer.
364
+
365
+ "In all these techniques, the same domain is used to download the next level payload
366
+ (Pause.ps1), which is another PowerShell script that is Base64 encoded," the FireEye
367
+ researchers said.
368
+
369
+ "The Pause.ps1 script is responsible for resolving the APIs required for code
370
+ injection. It also contains the injectable shellcode."
371
+
372
+ "The injected code is responsible for downloading the final payload from the server.
373
+ The final stage payload is a PE executable compiled with .Net framework."
374
+
375
+ Interestingly, the PowerShell script connects to a dotless IP address (example:
376
+ https://3627732942) to download the final payload.
377
+
378
+
379
+ What is Dotless IP Address? If you are unaware, dotless IP addresses, sometimes
380
+ referred as ''Decimal Address,'' are decimal values of IPv4 addresses (represented
381
+ as dotted-quad notation). Almost all modern web browsers resolve decimal IP address
382
+ to its equivalent IPV4 address when opened with "https://" following the decimal
383
+ value.
384
+
385
+
386
+ For example, Google''s IP address 216.58.207.206 can also be represented as https://3627732942
387
+ in decimal values (Try this online converter).
388
+
389
+
390
+ The best way to protect yourself and your organisation from such malware attacks
391
+ are always to be suspicious of any uninvited document sent via an email and never
392
+ click on links inside those documents unless adequately verifying the source.
393
+
394
+
395
+ Most importantly, always keep your software and systems up-to-date, as threat
396
+ actors incorporate recently discovered, but patched, vulnerabilities in popular
397
+ software—Microsoft Office, in this case—to increase the potential for successful
398
+ infections.
399
+
400
+
401
+ '
402
+ sentences:
403
+ - 'India-linked highly targeted mobile malware campaign, first unveiled two weeks
404
+ ago, has been found to be part of a broader campaign targeting multiple platforms,
405
+ including windows devices and possibly Android as well.
406
+
407
+
408
+ As reported in our previous article, earlier this month researchers at Talos threat
409
+ intelligence unit discovered a group of Indian hackers abusing mobile device management
410
+ (MDM) service to hijack and spy on a few targeted iPhone users in India.
411
+
412
+
413
+ Operating since August 2015, the attackers have been found abusing MDM service
414
+ to remotely install malicious versions of legitimate apps, including Telegram,
415
+ WhatsApp, and PrayTime, onto targeted iPhones.
416
+
417
+
418
+ These modified apps have been designed to secretly spy on iOS users, and steal
419
+ their real-time location, SMS, contacts, photos and private messages from third-party
420
+ chatting applications.
421
+
422
+
423
+ During their ongoing investigation, Talos researchers identified a new MDM infrastructure
424
+ and several malicious binaries – designed to target victims running Microsoft
425
+ Windows operating systems – hosted on the same infrastructure used in previous
426
+ campaigns.
427
+
428
+ Ios-update-whatsapp[.]com (new)
429
+
430
+ Wpitcher[.]com
431
+
432
+ Ios-certificate-update.com
433
+
434
+ "We know that the MDM and the Windows services were up and running on the same
435
+ C2 server in May 2018," researchers said in a blog post published today.
436
+
437
+
438
+ "Some of the C2 servers are still up and running at this time. The Apache setup
439
+ is very specific, and perfectly matched the Apache setup of the malicious IPA
440
+ apps."
441
+
442
+
443
+ Possible Connections with "Bahamut Hacking Group"
444
+
445
+ Besides this, researchers also found some potential similarities that link this
446
+ campaign with an old hacking group, dubbed "Bahamut," an advanced threat actor
447
+ who was previously targeting Android devices using similar MDM technique as used
448
+ in the latest iOS malware campaign.
449
+
450
+
451
+ The newly identified MDM infrastructure, which was created in January 2018, and
452
+ used from January to March of this year, targeted two Indian devices and one located
453
+ in Qatar with a British phone number.
454
+
455
+
456
+ According to the researchers, Bahamut also targeted similar Qatar-based individuals
457
+ during their Android malware campaign, as detailed by Bellingcat in a blog post.
458
+
459
+ "Bahamut shared a domain name with one of the malicious iOS applications mentioned
460
+ in our previous post," researchers said.
461
+
462
+
463
+ "The new MDM platform we identified has similar victimology with Middle Eastern
464
+ targets, namely Qatar, using a U.K. mobile number issued from LycaMobile. Bahamut
465
+ targeted similar Qatar-based individuals during their campaign."
466
+
467
+ Apart from distributing modified Telegram and WhatsApp apps with malicious functionalities,
468
+ the newly-identified server also distributes modified versions of Safari browser
469
+ and IMO video chatting app to steal more personal information on victims.
470
+
471
+
472
+ Attackers Using Malicious Safari Browser to Steal Login Credentials
473
+
474
+ According to the researchers, the malicious Safari browser has been pre-configured
475
+ to automatically exfiltrate the username and the password of the users for a variety
476
+ of other web services, Yahoo, Rediff, Amazon, Google, Reddit, Baidu, ProtonMail,
477
+ Zoho, Tutanota and more.
478
+
479
+ "The malware continuously monitors a web page, seeking out the HTML form fields
480
+ that hold the username and password as the user types them in to steal credentials.
481
+ The names of the inspected HTML fields are embedded into the app alongside the
482
+ domain names," the researchers said.
483
+
484
+ The malicious browser contains three malicious plugins—Add Bookmark, Add To Favourites,
485
+ and Add to Reading List—that just like the other apps, send stolen data to a remote
486
+ attacker-controlled server.
487
+
488
+
489
+ At this time, it''s unclear who is behind the campaign, who was targeted in the
490
+ campaign, and what were the motives behind the attack, but the technical elements
491
+ suggest the attackers are operating from India, and are well-funded.
492
+
493
+
494
+ Researchers said that those infected with this kind of malware need to enroll
495
+ their devices, which means "they should be on the lookout at all times to avoid
496
+ accidental enrollment."
497
+
498
+
499
+ The best way to avoid being a victim to such attacks is to always download apps
500
+ from official app store.
501
+
502
+
503
+ '
504
+ - 'Security researchers have spotted a new malware campaign in the wild that spreads
505
+ an advanced botnet malware by leveraging at least three recently disclosed vulnerabilities
506
+ in Microsoft Office.
507
+
508
+
509
+ Dubbed Zyklon, the fully-featured malware has resurfaced after almost two years
510
+ and primarily found targeting telecommunications, insurance and financial services.
511
+
512
+
513
+ Active since early 2016, Zyklon is an HTTP botnet malware that communicates with
514
+ its command-and-control servers over Tor anonymising network and allows attackers
515
+ to remotely steal keylogs, sensitive data, like passwords stored in web browsers
516
+ and email clients.
517
+
518
+
519
+ Zyklon malware is also capable of executing additional plugins, including secretly
520
+ using infected systems for DDoS attacks and cryptocurrency mining.
521
+
522
+
523
+ Different versions of the Zyklon malware has previously been found being advertised
524
+ on a popular underground marketplace for $75 (normal build) and $125 ( Tor-enabled
525
+ build).
526
+
527
+
528
+ According to a recently published report by FireEye, the attackers behind the
529
+ campaign are leveraging three following vulnerabilities in Microsoft Office that
530
+ execute a PowerShell script on the targeted computers to download the final payload
531
+ from its C&C server.
532
+
533
+
534
+ 1) .NET Framework RCE Vulnerability (CVE-2017-8759)—this remote code execution
535
+ vulnerability exists when Microsoft .NET Framework processes untrusted input,
536
+ allowing an attacker to take control of an affected system by tricking victims
537
+ into opening a specially crafted malicious document file sent over an email. Microsoft
538
+ already released a security patch for this flaw in September updates.
539
+
540
+
541
+ 2) Microsoft Office RCE Vulnerability (CVE-2017-11882)—it''s a 17-year-old memory
542
+ corruption flaw that Microsoft patched in November patch update allows a remote
543
+ attacker to execute malicious code on the targeted systems without requiring any
544
+ user interaction after opening a malicious document.
545
+
546
+
547
+ 3) Dynamic Data Exchange Protocol (DDE Exploit)—this technique allows attackers
548
+ to leverage a built-in feature of Microsoft Office, called DDE, to perform code
549
+ execution on the targeted device without requiring Macros to be enabled or memory
550
+ corruption.
551
+
552
+
553
+ As explained by the researchers, attackers are actively exploiting these three
554
+ vulnerabilities to deliver Zyklon malware using spear phishing emails, which typically
555
+ arrives with an attached ZIP file containing a malicious Office doc file.
556
+
557
+
558
+ Once opened, the malicious doc file equipped with one of these vulnerabilities
559
+ immediately runs a PowerShell script, which eventually downloads the final payload,
560
+ i.e., Zyklon HTTP malware, onto the infected computer.
561
+
562
+ "In all these techniques, the same domain is used to download the next level payload
563
+ (Pause.ps1), which is another PowerShell script that is Base64 encoded," the FireEye
564
+ researchers said.
565
+
566
+ "The Pause.ps1 script is responsible for resolving the APIs required for code
567
+ injection. It also contains the injectable shellcode."
568
+
569
+ "The injected code is responsible for downloading the final payload from the server.
570
+ The final stage payload is a PE executable compiled with .Net framework."
571
+
572
+ Interestingly, the PowerShell script connects to a dotless IP address (example:
573
+ https://3627732942) to download the final payload.
574
+
575
+
576
+ What is Dotless IP Address? If you are unaware, dotless IP addresses, sometimes
577
+ referred as ''Decimal Address,'' are decimal values of IPv4 addresses (represented
578
+ as dotted-quad notation). Almost all modern web browsers resolve decimal IP address
579
+ to its equivalent IPV4 address when opened with "https://" following the decimal
580
+ value.
581
+
582
+
583
+ For example, Google''s IP address 216.58.207.206 can also be represented as https://3627732942
584
+ in decimal values (Try this online converter).
585
+
586
+
587
+ The best way to protect yourself and your organisation from such malware attacks
588
+ are always to be suspicious of any uninvited document sent via an email and never
589
+ click on links inside those documents unless adequately verifying the source.
590
+
591
+
592
+ Most importantly, always keep your software and systems up-to-date, as threat
593
+ actors incorporate recently discovered, but patched, vulnerabilities in popular
594
+ software—Microsoft Office, in this case—to increase the potential for successful
595
+ infections.
596
+
597
+
598
+ '
599
+ - 'Attention WordPress users!
600
+
601
+
602
+ Your website could easily get hacked if you are using "Ultimate Addons for Beaver
603
+ Builder," or "Ultimate Addons for Elementor" and haven''t recently updated them
604
+ to the latest available versions.
605
+
606
+
607
+ Security researchers have discovered a critical yet easy-to-exploit authentication
608
+ bypass vulnerability in both widely-used premium WordPress plugins that could
609
+ allow remote attackers to gain administrative access to sites without requiring
610
+ any password.
611
+
612
+
613
+ What''s more worrisome is that opportunistic attackers have already started exploiting
614
+ this vulnerability in the wild within 2 days of its discovery in order to compromise
615
+ vulnerable WordPress websites and install a malicious backdoor for later access.
616
+
617
+
618
+ Both vulnerable plugins, made by software development company Brainstorm Force,
619
+ are currently powering over hundreds of thousands of WordPress websites using
620
+ Elementor and Beaver Builder frameworks, helping website admins and designers
621
+ extend the functionality of their websites with more widgets, modules, page templates.
622
+
623
+
624
+ Discovered by researchers at web security service MalCare, the vulnerability resides
625
+ in the way both plugins let WordPress account holders, including administrators,
626
+ authenticate via Facebook and Google login mechanisms.
627
+
628
+
629
+ Image credit: WebARX
630
+
631
+
632
+ According to the vulnerability''s advisory, due to lack of checks in the authentication
633
+ method when a user login via Facebook or Google, vulnerable plugins can be tricked
634
+ into allowing malicious users to login as any other targeted user without requiring
635
+ any password.
636
+
637
+
638
+ "However, the Facebook and Google authentication methods did not verify the token
639
+ returned by Facebook and Google, and since they don''t require a password, there
640
+ was no password check," explained WebARX researchers, who also analysed the flaw
641
+ and confirmed its active exploitation.
642
+
643
+
644
+ "To exploit the vulnerability, the hacker needs to use the email ID of an admin
645
+ user of the site. In most cases, this information can be retrieved fairly easily,"
646
+ MalCare said.
647
+
648
+
649
+ In an email to The Hacker News, WebARX confirmed that attackers are abusing this
650
+ flaw to install a fake SEO stats plugin after uploading a tmp.zip file on the
651
+ targeted WordPress server, which eventually drops a wp-xmlrpc.php backdoor file
652
+ to the root directory of the vulnerable site.
653
+
654
+
655
+ MalCare discovered this vulnerability on Wednesday that affects below-listed versions
656
+ of the plugins and reported it to the developers on the same day, who then quickly
657
+ addressed the issue and released patched versions of both within just 7 hours.
658
+
659
+
660
+
661
+ Ultimate Addons for Elementor <= 1.20.0
662
+
663
+ Ultimate Addons for Beaver Builder <= 1.24.0
664
+
665
+
666
+
667
+ The authentication bypass vulnerability has been patched with the release of "Ultimate
668
+ Addons for Elementor version 1.20.1" and "Ultimate Addons for Beaver Builder version
669
+ 1.24.1," which affected websites are highly recommended to install as soon as
670
+ possible.
671
+
672
+
673
+ '
674
+ - source_sentence: 'Exclusive — If you have not updated your website to the latest
675
+ WordPress version 5.0.3, it''s a brilliant idea to upgrade the content management
676
+ software of your site now. From now, I mean immediately.
677
+
678
+
679
+ Cybersecurity researchers at RIPS Technologies GmbH today shared their latest
680
+ research with The Hacker News, revealing the existence of a critical remote code
681
+ execution vulnerability that affects all previous versions of WordPress content
682
+ management software released in the past 6 years.
683
+
684
+
685
+ The remote code execution attack, discovered and reported to the WordPress security
686
+ team late last year, can be exploited by a low privileged attacker with at least
687
+ an "author" account using a combination of two separate vulnerabilities—Path Traversal
688
+ and Local File Inclusion—that reside in the WordPress core.
689
+
690
+
691
+ The requirement of at least an author account reduces the severity of this vulnerability
692
+ to some extent, which could be exploited by a rogue content contributor or an
693
+ attacker who somehow manages to gain author''s credential using phishing, password
694
+ reuse or other attacks.
695
+
696
+ "An attacker who gains access to an account with at least author privileges on
697
+ a target WordPress site can execute arbitrary PHP code on the underlying server,
698
+ leading to a full remote takeover," Scannell says.
699
+
700
+
701
+ Video Demonstration — Here''s How the Attack Works
702
+
703
+ According to Simon Scannell, a researcher at RIPS Technologies GmbH, the attack
704
+ takes advantage of the way WordPress image management system handles Post Meta
705
+ entries used to store description, size, creator, and other meta information of
706
+ uploaded images.
707
+
708
+
709
+ Scannell found that a rogue or compromised author account can modify any entries
710
+ associated with an image and set them to arbitrary values, leading to the Path
711
+ Traversal vulnerability.
712
+
713
+ "The idea is to set _wp_attached_file to evil.jpg?shell.php, which would lead
714
+ to an HTTP request being made to the following URL: https://targetserver.com/wp-content/uploads/evil.jpg?shell.php,"
715
+ Scannell explains.
716
+
717
+ And, "it is still possible to plant the resulting image into any directory by
718
+ using a payload such as evil.jpg?/../../evil.jpg."
719
+
720
+ The Path Traversal flaw in combination with a local file inclusion flaw in theme
721
+ directory could then allow the attacker to execute arbitrary code on the targeted
722
+ server.
723
+
724
+
725
+ The attack, as shown in the proof-of-concept video shared by the researcher, can
726
+ be executed within seconds to gain complete control over a vulnerable WordPress
727
+ blog.
728
+
729
+
730
+ According to Scannell, the code execution attack became non-exploitable in WordPress
731
+ versions 5.0.1 and 4.9.9 after patch for another vulnerability was introduced
732
+ which prevented unauthorized users from setting arbitrary Post Meta entries.
733
+
734
+
735
+ However, the Path Traversal flaw is still unpatched even in the latest WordPress
736
+ version and can be exploited if any installed 3rd-party plugin incorrectly handles
737
+ Post Meta entries.
738
+
739
+
740
+ Scannell confirmed that the next release of WordPress would include a fix to completely
741
+ address the issue demonstrated by the researcher.
742
+
743
+
744
+ '
745
+ sentences:
746
+ - 'Exclusive — If you have not updated your website to the latest WordPress version
747
+ 5.0.3, it''s a brilliant idea to upgrade the content management software of your
748
+ site now. From now, I mean immediately.
749
+
750
+
751
+ Cybersecurity researchers at RIPS Technologies GmbH today shared their latest
752
+ research with The Hacker News, revealing the existence of a critical remote code
753
+ execution vulnerability that affects all previous versions of WordPress content
754
+ management software released in the past 6 years.
755
+
756
+
757
+ The remote code execution attack, discovered and reported to the WordPress security
758
+ team late last year, can be exploited by a low privileged attacker with at least
759
+ an "author" account using a combination of two separate vulnerabilities—Path Traversal
760
+ and Local File Inclusion—that reside in the WordPress core.
761
+
762
+
763
+ The requirement of at least an author account reduces the severity of this vulnerability
764
+ to some extent, which could be exploited by a rogue content contributor or an
765
+ attacker who somehow manages to gain author''s credential using phishing, password
766
+ reuse or other attacks.
767
+
768
+ "An attacker who gains access to an account with at least author privileges on
769
+ a target WordPress site can execute arbitrary PHP code on the underlying server,
770
+ leading to a full remote takeover," Scannell says.
771
+
772
+
773
+ Video Demonstration — Here''s How the Attack Works
774
+
775
+ According to Simon Scannell, a researcher at RIPS Technologies GmbH, the attack
776
+ takes advantage of the way WordPress image management system handles Post Meta
777
+ entries used to store description, size, creator, and other meta information of
778
+ uploaded images.
779
+
780
+
781
+ Scannell found that a rogue or compromised author account can modify any entries
782
+ associated with an image and set them to arbitrary values, leading to the Path
783
+ Traversal vulnerability.
784
+
785
+ "The idea is to set _wp_attached_file to evil.jpg?shell.php, which would lead
786
+ to an HTTP request being made to the following URL: https://targetserver.com/wp-content/uploads/evil.jpg?shell.php,"
787
+ Scannell explains.
788
+
789
+ And, "it is still possible to plant the resulting image into any directory by
790
+ using a payload such as evil.jpg?/../../evil.jpg."
791
+
792
+ The Path Traversal flaw in combination with a local file inclusion flaw in theme
793
+ directory could then allow the attacker to execute arbitrary code on the targeted
794
+ server.
795
+
796
+
797
+ The attack, as shown in the proof-of-concept video shared by the researcher, can
798
+ be executed within seconds to gain complete control over a vulnerable WordPress
799
+ blog.
800
+
801
+
802
+ According to Scannell, the code execution attack became non-exploitable in WordPress
803
+ versions 5.0.1 and 4.9.9 after patch for another vulnerability was introduced
804
+ which prevented unauthorized users from setting arbitrary Post Meta entries.
805
+
806
+
807
+ However, the Path Traversal flaw is still unpatched even in the latest WordPress
808
+ version and can be exploited if any installed 3rd-party plugin incorrectly handles
809
+ Post Meta entries.
810
+
811
+
812
+ Scannell confirmed that the next release of WordPress would include a fix to completely
813
+ address the issue demonstrated by the researcher.
814
+
815
+
816
+ '
817
+ - 'Android Security Squad, the China-based group that uncovered a second Android
818
+ master key vulnerability that might be abused to modify smartphone apps without
819
+ breaking their digital signatures.
820
+
821
+
822
+ The whole point of digitally signing a document or file is to prove the file hasn''t
823
+ been modified. The process uses a form of public-key cryptography. In Chinese
824
+ version of hacking attack, malicious code can be added into the file headers,
825
+ but the method is limited because targeted files need to be smaller than 64K in
826
+ size.
827
+
828
+
829
+
830
+ APK files are packed using a version of the widespread ZIP archiving algorithm.
831
+ Most ZIP implementations won''t permit two same-named files in one archive, but
832
+ the algorithm itself doesn''t forbid that possibility. So basically, two versions
833
+ of the classes.dex file are placed inside of the package, the original and a hacked
834
+ alternative.
835
+
836
+
837
+ When checking an app''s digital signature, the Android OS looks at the first matching
838
+ file, but when actually executing and launching the file, it grabs the last one.
839
+ To Trojanize an app, then, all you need to do is shoehorn your malicious code
840
+ into it using a name that already exists within the app.
841
+
842
+
843
+ The flaw is very similar to the first master key vulnerability recently announced
844
+ by researchers from mobile security firm Bluebox Security. According to BlueBox,
845
+ 99% of Android devices are vulnerable to this attack. Google has already patched
846
+ the flaw and posted it to the Android Open Source Project (AOSP).
847
+
848
+
849
+ You can use ReKey, a free mobile app that''s designed to patch the Android master
850
+ key vulnerability that''s present in an estimated 900 million devices that run
851
+ Android and that could be exploited by attackers to take full control of a device.
852
+
853
+
854
+ Always get your apps from legitimate sources, always check to make sure the developer
855
+ name is valid, and configure your phone so it doesn''t permit installing apps
856
+ from unknown sources.
857
+
858
+
859
+ '
860
+ - 'Cyber criminals are using popular note-taking app Evernote as Command-and-Control
861
+ Server to give commands to the malware installed on infected PCs using botnets.
862
+
863
+
864
+ TrendMicro uncovered a malware detected as "BKDR_VERNOT.A" tried to communicate
865
+ with Command-and-Control Server using Evernote.
866
+
867
+
868
+
869
+ Malware delivered via an executable file that installs the malware as a dynamic-link
870
+ library. The installer then ties the DLL into a legitimate running process, hiding
871
+ it from casual detection. Once installed, BKDR_VERNOT.A can perform several backdoor
872
+ commands such as downloading, executing, and renaming files. It then gathers information
873
+ from the infected system, including details about its OS, timezone, user name,
874
+ computer name, registered owner and organization.
875
+
876
+ Researchers also pointed out that the backdoor may have also used Evernote as
877
+ a location to upload stolen data. "Unfortunately, during our testing, it was not
878
+ able to login using the credentials embedded in the malware. This is possibly
879
+ a security measure imposed by Evernote following its recent hacking issue."
880
+
881
+
882
+ "Though this is a clever maneuver to avoid detection, this is not the first time
883
+ that a legitimate service like Evernote was used as a method of evasion."
884
+
885
+
886
+ Like Evernote, Google Docs, Twitter and others have been misused in the past.
887
+
888
+
889
+ '
890
+ - source_sentence: 'U.S. has the top Security Agencies like NSA, FBI to tackle cyber
891
+ crime and terrorism with their high profile surveillance technologies, but even
892
+ after that U.S is proudly hosting 44% of the entire cloud based malware distribution.
893
+
894
+
895
+ With the enhancement in Internet technology, Cloud computing has shown the possibility
896
+ of existence and now has become an essential gradient for any Internet Identity.
897
+
898
+
899
+ Cloud services are designed in such a way that it is easy to maintain, use, configure
900
+ and can be scaled depending upon the requirement of the service being provided
901
+ using the CLOUD technology with cost effective manner.
902
+
903
+
904
+ Due to the Easy and Cost effective alternative of traditional computing, Malware
905
+ writers are using the big cloud hosting platforms to quickly and effectively serve
906
+ malware to Internet users, allowing them to bypass detection and geographic blacklisting
907
+ by serving from a trusted provider.
908
+
909
+
910
+ Hiding behind trusted domains and names is not something new. According to recently
911
+ published SERT Q4 2013 Threat Intelligence Report, the malware distributors are
912
+ using Cloud Services from Amazon, GoDaddy and Google like a legitimate customer,
913
+ allowing them to infect millions of computers and vast numbers of enterprise systems.
914
+
915
+
916
+ The Cloud-based hosting services let malware distributors to avoid the detection
917
+ because repeatedly changes IP addresses and domain names to avoid detection. Amazon
918
+ and GoDaddy were identified as the top malware-hosting providers, with a 16 percent
919
+ and a 14 percent share, respectively.
920
+
921
+ Major Additional findings include:
922
+
923
+ United States hosts 4.6 times more malware than the next leading country.
924
+
925
+ 58% of malicious files obtained were identified as HTML files, 26% were directly
926
+ executable.
927
+
928
+ Many malware developers and distributors are utilizing social engineering tactics,
929
+ including the use of trusted keywords and services, to evade detection and increase
930
+ potential infection counts.
931
+
932
+ A single malicious domain was spread across 20 countries, 67 providers and 199
933
+ unique IPs evade detection.
934
+
935
+ The SERT Research team collected a large number of samples from more than 12,000
936
+ Registrars, 22,000 ISPs (Internet Service Providers) and tested all malicious
937
+ packages with more than 40 antivirus engines, output of which is concluded below:
938
+
939
+ The majority of the top malware sites is domains commonly associated with the
940
+ Potentially Unwanted Applications (PUA), more commonly known as adware, type of
941
+ malware distributions.
942
+
943
+ "Researchers found that a significant portion of the malware sampled consisted
944
+ of Microsoft Windows 32-bit Portable Executable (PE32) files being used to distribute
945
+ pay-per-install applications known as potentially unwanted applications (PUAs)."
946
+
947
+ The report claimed that these malware is undetectable from over 40 anti-virus
948
+ engines, that can act as a gateway for exploits and more than half of malware
949
+ found being distributed by HTML web pages.
950
+
951
+
952
+ '
953
+ sentences:
954
+ - 'U.S. has the top Security Agencies like NSA, FBI to tackle cyber crime and terrorism
955
+ with their high profile surveillance technologies, but even after that U.S is
956
+ proudly hosting 44% of the entire cloud based malware distribution.
957
+
958
+
959
+ With the enhancement in Internet technology, Cloud computing has shown the possibility
960
+ of existence and now has become an essential gradient for any Internet Identity.
961
+
962
+
963
+ Cloud services are designed in such a way that it is easy to maintain, use, configure
964
+ and can be scaled depending upon the requirement of the service being provided
965
+ using the CLOUD technology with cost effective manner.
966
+
967
+
968
+ Due to the Easy and Cost effective alternative of traditional computing, Malware
969
+ writers are using the big cloud hosting platforms to quickly and effectively serve
970
+ malware to Internet users, allowing them to bypass detection and geographic blacklisting
971
+ by serving from a trusted provider.
972
+
973
+
974
+ Hiding behind trusted domains and names is not something new. According to recently
975
+ published SERT Q4 2013 Threat Intelligence Report, the malware distributors are
976
+ using Cloud Services from Amazon, GoDaddy and Google like a legitimate customer,
977
+ allowing them to infect millions of computers and vast numbers of enterprise systems.
978
+
979
+
980
+ The Cloud-based hosting services let malware distributors to avoid the detection
981
+ because repeatedly changes IP addresses and domain names to avoid detection. Amazon
982
+ and GoDaddy were identified as the top malware-hosting providers, with a 16 percent
983
+ and a 14 percent share, respectively.
984
+
985
+ Major Additional findings include:
986
+
987
+ United States hosts 4.6 times more malware than the next leading country.
988
+
989
+ 58% of malicious files obtained were identified as HTML files, 26% were directly
990
+ executable.
991
+
992
+ Many malware developers and distributors are utilizing social engineering tactics,
993
+ including the use of trusted keywords and services, to evade detection and increase
994
+ potential infection counts.
995
+
996
+ A single malicious domain was spread across 20 countries, 67 providers and 199
997
+ unique IPs evade detection.
998
+
999
+ The SERT Research team collected a large number of samples from more than 12,000
1000
+ Registrars, 22,000 ISPs (Internet Service Providers) and tested all malicious
1001
+ packages with more than 40 antivirus engines, output of which is concluded below:
1002
+
1003
+ The majority of the top malware sites is domains commonly associated with the
1004
+ Potentially Unwanted Applications (PUA), more commonly known as adware, type of
1005
+ malware distributions.
1006
+
1007
+ "Researchers found that a significant portion of the malware sampled consisted
1008
+ of Microsoft Windows 32-bit Portable Executable (PE32) files being used to distribute
1009
+ pay-per-install applications known as potentially unwanted applications (PUAs)."
1010
+
1011
+ The report claimed that these malware is undetectable from over 40 anti-virus
1012
+ engines, that can act as a gateway for exploits and more than half of malware
1013
+ found being distributed by HTML web pages.
1014
+
1015
+
1016
+ '
1017
+ - 'Windows 8 will be challenge for Malware writers
1018
+
1019
+ Microsoft™s security researcher believe that upcoming operating system, Windows
1020
+ 8 is a step forward in security and Windows 8 will be far better at protecting
1021
+ against malware than it''s predecessors.
1022
+
1023
+
1024
+ Chris Valasek, a senior security research scientist at development testing firm
1025
+ Coverity, began examining the security features of Windows 8 last autumn, before
1026
+ the consumer previews of the upcoming revamp of the new Microsoft OS came out.
1027
+
1028
+
1029
+ "There are always going to be vulnerabilities but you can make it difficult to
1030
+ leverage vulnerabilities to write exploits." One major change between Windows
1031
+ 7 and 8 is the addition of more exploit-mitigation technologies, however. Windows
1032
+ Memory Managers (specifically the Windows Heap Manager and Windows Kernel Pool
1033
+ Allocator) are designed to make it far harder for attackers to exploit buffer-overflow
1034
+ vulnerabilities and the like to push malware onto vulnerable systems.
1035
+
1036
+
1037
+ The "security sandbox" for applications for Windows 8 will also be a great step
1038
+ forward. "These new Windows 8 Apps will be contained by a much more restrictive
1039
+ security sandbox, which is a mechanism to prevent programs from performing certain
1040
+ actions," Valasek explains.
1041
+
1042
+
1043
+ "This new App Container provides the operating system with a way to make more
1044
+ fine-grained decisions on what actions certain applications can perform, instead
1045
+ of relying on the more broad ''Integrity Levels'' that debuted in Windows Vista/7.
1046
+
1047
+
1048
+ Windows 8 also comes with a new version of Internet Explorer, Microsoft''s browser
1049
+ software. Internet Explorer 10 will come with a mode that disables support for
1050
+ third-party plug-ins such as Flash and Java.
1051
+
1052
+
1053
+ '
1054
+ - 'Ransomware, a threat to internet users that continues to grow in popularity with
1055
+ cyber criminals due to its success and monetary potential. This is nothing new
1056
+ and to be expected. I have noticed many discussions on underground hacking forums
1057
+ about "How to create Ransomware like Cryptolocker malware" or "Malware - hacking
1058
+ tool-kit with ransomware features".
1059
+
1060
+ Security intelligence provider, IntelCrawler has discovered a new ransomware variant
1061
+ called Locker that demands $150 (£92) to restore files that it has encrypted.
1062
+
1063
+
1064
+ Like Cryptolocker, this new ransomware is also nasty because infected users are
1065
+ in danger of losing their personal files forever.
1066
+
1067
+
1068
+ Locker mainly spreads by drive-by downloads from compromised websites, disguised
1069
+ itself as MP3 files and use system software vulnerabilities to infect the end
1070
+ user.
1071
+
1072
+
1073
+ Once it has infected a system, malware first checks the infected machine has an
1074
+ internet connection or not. Then it deletes any original files from the victim''s
1075
+ computer after using AES-CTR for encrypting the files on infected devices and
1076
+ add ". perfect" extension to them.
1077
+
1078
+
1079
+ Locker''s encryption is based on an open source tool called ''TurboPower LockBox''
1080
+ library. After encrypting all files, the malware place a "CONTACT.TXT" file in
1081
+ each directory, which provides contact details of the author to buy the decryption
1082
+ key and once the ransom is paid, each victim gets a key to unscramble files.
1083
+
1084
+
1085
+ The good news is that the researchers are working on the universal decryption
1086
+ software in order to help the victims. "It appears that the hackers are simply
1087
+ comparing the list of infected IP addresses of users, along with their host names,"
1088
+ according IntelCrawler.
1089
+
1090
+
1091
+ IntelCrawler had discovered 50 different builds of the malware, which are being
1092
+ sold in underground markets for pay-per install programs. One builds had just
1093
+ under 6,000 infected machines. ZdNet reported.
1094
+
1095
+
1096
+ Malware will encrypt all drives visible on an infected system, so you must be
1097
+ sure that your backups are stored remotely or in a location that is not simply
1098
+ another drive partition or mapping to another location.
1099
+
1100
+
1101
+ The malware infects users from the United States, Turkey, Russia, Germany and
1102
+ the Netherlands. Users should remain vigilant about their security. Please double
1103
+ check the legitimacy of links received in emails and ensure you have your antivirus
1104
+ up to date to help protect against such threats.
1105
+
1106
+
1107
+ '
1108
+ - source_sentence: 'Security Event : Hack In Paris (16-17 June, 2011)
1109
+
1110
+
1111
+
1112
+ Hack In Paris is an international and corporate security event that will take
1113
+ place in Disneyland Paris® fromJune 16th to 17th of 2011. Please refer to the
1114
+ homepage to get up-to-date information about the event.
1115
+
1116
+
1117
+ Topics
1118
+
1119
+ The following list contains major topics the conference will cover. Please consider
1120
+ submitting even if the subject of your research is not listed here.
1121
+
1122
+ Advances in reverse engineering
1123
+
1124
+ Vulnerability research and exploitation
1125
+
1126
+ Penetration testing and security assessment
1127
+
1128
+ Malware analysis and new trends in malicous codes
1129
+
1130
+ Forensics, IT crime & law enforcement
1131
+
1132
+ Privacy issues: LOPPSI, HADOPI, …
1133
+
1134
+ Low-level hacking (console security & mobile devices)
1135
+
1136
+ Risk management and ISO 27001
1137
+
1138
+ Dates
1139
+
1140
+ January 20: CFP announced
1141
+
1142
+ March 30: Submission deadline
1143
+
1144
+ April 15: Notification sent to authors
1145
+
1146
+ April 17: Program announcement
1147
+
1148
+ June 16-17: Hack In Paris
1149
+
1150
+ June 18: Nuit du Hack
1151
+
1152
+ More Information: https://hackinparis.com
1153
+
1154
+
1155
+ '
1156
+ sentences:
1157
+ - 'It''s just two weeks into the Trump presidency, but his decisions have caused
1158
+ utter chaos around the country.
1159
+
1160
+
1161
+ One such order signed by the president was banning both refugees and visa holders
1162
+ from seven Muslim-majority countries (Iraq, Iran, Libya, Yemen, Somalia, Syria,
1163
+ and Sudan) from entering the United States, resulting in unexpectedly arrest of
1164
+ some travelers at airports.
1165
+
1166
+
1167
+ Now, it seems like some anti-Trump protesters have publically declared their fight
1168
+ against the president by exploiting a known flaw in low power FM (LPFM) radio
1169
+ transmitters to play a song the radio stations didn''t intend to broadcast.
1170
+
1171
+
1172
+ Radio stations in South Carolina, Indiana, Texas, Tennessee and Kentucky, were
1173
+ hacked recently to broadcast the Bompton-based rapper YG and Nipsey Hussle''s
1174
+ anti-Trump song "Fuck Donald Trump," which was already a radio hit in some parts
1175
+ of the country last year, several sources report.
1176
+
1177
+
1178
+ The song was repeatedly played on Monday night, according to the RadioInsight,
1179
+ and the news of the incident began emerging shortly after Trump''s inauguration
1180
+ on January 20, eight days before hackers hacked 70 percent of the police CCTV
1181
+ cameras in Washington DC.
1182
+
1183
+
1184
+ Hackers gained access to the radio stations by exploiting known vulnerabilities
1185
+ in Barix Exstreamer devices which can decode audio file formats and send them
1186
+ along for LPFM transmission.
1187
+
1188
+
1189
+ Over a dozen radio stations experienced the hack in recent weeks, though some
1190
+ of them shut down their airwaves as quickly as possible in an attempt to avoid
1191
+ playing the inflammatory "FDT (Fuck Donald Trump)" song on loop.
1192
+
1193
+
1194
+ The hackers or group of hackers behind the cyber attack is still unknown. The
1195
+ affected stations so far include:
1196
+
1197
+ 105.9 WFBS-LP Salem, S.C.
1198
+
1199
+ Radio 810 WMGC/96.7 W244CW Murfreesboro TN
1200
+
1201
+ 101.9 Pirate Seattle
1202
+
1203
+ 100.9 WCHQ-LP Louisville
1204
+
1205
+ 100.5 KCGF-LP San Angelo TX
1206
+
1207
+ However, there are unconfirmed reports from radio stations in California, Indiana,
1208
+ and Washington State that are believed to be affected as well.
1209
+
1210
+
1211
+ Has any of the radio stations you listen to been hit by the hackers? Let us know
1212
+ in the comments!
1213
+
1214
+
1215
+ '
1216
+ - 'Google is going to shut down its social media network Google+ after the company
1217
+ suffered a massive data breach that exposed the private data of hundreds of thousands
1218
+ of Google Plus users to third-party developers.
1219
+
1220
+
1221
+ According to the tech giant, a security vulnerability in one of Google+''s People
1222
+ APIs allowed third-party developers to access data for more than 500,000 users,
1223
+ including their usernames, email addresses, occupation, date of birth, profile
1224
+ photos, and gender-related information.
1225
+
1226
+
1227
+ Since Google+ servers do not keep API logs for more than two weeks, the company
1228
+ cannot confirm the number of users impacted by the vulnerability.
1229
+
1230
+
1231
+ However, Google assured its users that the company found no evidence that any
1232
+ developer was aware of this bug, or that the profile data was misused by any of
1233
+ the 438 developers that could have had access.
1234
+
1235
+ "However, we ran a detailed analysis over the two weeks prior to patching the
1236
+ bug, and from that analysis, the Profiles of up to 500,000 Google+ accounts were
1237
+ potentially affected. Our analysis showed that up to 438 applications may have
1238
+ used this API," Google said in blog post published today.
1239
+
1240
+ The vulnerability was open since 2015 and fixed after Google discovered it in
1241
+ March 2018, but the company chose not to disclose the breach to the public—at
1242
+ the time when Facebook was being roasted for Cambridge Analytica scandal.
1243
+
1244
+
1245
+ Though Google has not revealed the technical details of the security vulnerability,
1246
+ the nature of the flaw seems to be something very similar to Facebook API flaw
1247
+ that recently allowed unauthorized developers to access private data from Facebook
1248
+ users.
1249
+
1250
+
1251
+ Besides admitting the security breach, Google also announced that the company
1252
+ is shutting down its social media network, acknowledging that Google+ failed to
1253
+ gain broad adoption or significant traction with consumers.
1254
+
1255
+ "The consumer version of Google+ currently has low usage and engagement: 90 percent
1256
+ of Google+ user sessions are less than five seconds," Google said.
1257
+
1258
+ In response, the company has decided to shut down Google+ for consumers by the
1259
+ end of August 2019. However, Google+ will continue as a product for Enterprise
1260
+ users.
1261
+
1262
+
1263
+ Google Introduces New Privacy Controls Over Third-Party App Permissions
1264
+
1265
+
1266
+ As part of its "Project Strobe," Google engineers also reviewed third-party developer
1267
+ access to Google account and Android device data; and has accordingly now introduced
1268
+ some new privacy controls.
1269
+
1270
+
1271
+ When a third-party app prompts users for access to their Google account data,
1272
+ clicking "Allow" button approves all requested permissions at once, leaving an
1273
+ opportunity for malicious apps to trick users into giving away powerful permissions.
1274
+
1275
+ But now Google has updated its Account Permissions system that asks for each requested
1276
+ permission individually rather than all at once, giving users more control over
1277
+ what type of account data they choose to share with each app.
1278
+
1279
+
1280
+ Since APIs can also allow developers to access users'' extremely sensitive data,
1281
+ like that of Gmail account, Google has limited access to Gmail API only for apps
1282
+ that directly enhance email functionality—such as email clients, email backup
1283
+ services and productivity services.
1284
+
1285
+
1286
+ Google shares fell over 2 percent to $1134.23 after the data breach reports.
1287
+
1288
+
1289
+ '
1290
+ - 'Security Event : Hack In Paris (16-17 June, 2011)
1291
+
1292
+
1293
+
1294
+ Hack In Paris is an international and corporate security event that will take
1295
+ place in Disneyland Paris® fromJune 16th to 17th of 2011. Please refer to the
1296
+ homepage to get up-to-date information about the event.
1297
+
1298
+
1299
+ Topics
1300
+
1301
+ The following list contains major topics the conference will cover. Please consider
1302
+ submitting even if the subject of your research is not listed here.
1303
+
1304
+ Advances in reverse engineering
1305
+
1306
+ Vulnerability research and exploitation
1307
+
1308
+ Penetration testing and security assessment
1309
+
1310
+ Malware analysis and new trends in malicous codes
1311
+
1312
+ Forensics, IT crime & law enforcement
1313
+
1314
+ Privacy issues: LOPPSI, HADOPI, …
1315
+
1316
+ Low-level hacking (console security & mobile devices)
1317
+
1318
+ Risk management and ISO 27001
1319
+
1320
+ Dates
1321
+
1322
+ January 20: CFP announced
1323
+
1324
+ March 30: Submission deadline
1325
+
1326
+ April 15: Notification sent to authors
1327
+
1328
+ April 17: Program announcement
1329
+
1330
+ June 16-17: Hack In Paris
1331
+
1332
+ June 18: Nuit du Hack
1333
+
1334
+ More Information: https://hackinparis.com
1335
+
1336
+
1337
+ '
1338
+ pipeline_tag: sentence-similarity
1339
+ library_name: sentence-transformers
1340
+ ---
1341
+
1342
+ # SentenceTransformer based on sentence-transformers/all-MiniLM-L6-v2
1343
+
1344
+ This is a [sentence-transformers](https://www.SBERT.net) model finetuned from [sentence-transformers/all-MiniLM-L6-v2](https://huggingface.co/sentence-transformers/all-MiniLM-L6-v2). It maps sentences & paragraphs to a 384-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more.
1345
+
1346
+ ## Model Details
1347
+
1348
+ ### Model Description
1349
+ - **Model Type:** Sentence Transformer
1350
+ - **Base model:** [sentence-transformers/all-MiniLM-L6-v2](https://huggingface.co/sentence-transformers/all-MiniLM-L6-v2) <!-- at revision fa97f6e7cb1a59073dff9e6b13e2715cf7475ac9 -->
1351
+ - **Maximum Sequence Length:** 256 tokens
1352
+ - **Output Dimensionality:** 384 dimensions
1353
+ - **Similarity Function:** Cosine Similarity
1354
+ <!-- - **Training Dataset:** Unknown -->
1355
+ <!-- - **Language:** Unknown -->
1356
+ <!-- - **License:** Unknown -->
1357
+
1358
+ ### Model Sources
1359
+
1360
+ - **Documentation:** [Sentence Transformers Documentation](https://sbert.net)
1361
+ - **Repository:** [Sentence Transformers on GitHub](https://github.com/UKPLab/sentence-transformers)
1362
+ - **Hugging Face:** [Sentence Transformers on Hugging Face](https://huggingface.co/models?library=sentence-transformers)
1363
+
1364
+ ### Full Model Architecture
1365
+
1366
+ ```
1367
+ SentenceTransformer(
1368
+ (0): Transformer({'max_seq_length': 256, 'do_lower_case': False}) with Transformer model: BertModel
1369
+ (1): Pooling({'word_embedding_dimension': 384, 'pooling_mode_cls_token': False, 'pooling_mode_mean_tokens': True, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True})
1370
+ (2): Normalize()
1371
+ )
1372
+ ```
1373
+
1374
+ ## Usage
1375
+
1376
+ ### Direct Usage (Sentence Transformers)
1377
+
1378
+ First install the Sentence Transformers library:
1379
+
1380
+ ```bash
1381
+ pip install -U sentence-transformers
1382
+ ```
1383
+
1384
+ Then you can load this model and run inference.
1385
+ ```python
1386
+ from sentence_transformers import SentenceTransformer
1387
+
1388
+ # Download from the 🤗 Hub
1389
+ model = SentenceTransformer("sgadagin/fine_tuned_sbert")
1390
+ # Run inference
1391
+ sentences = [
1392
+ 'Security Event : Hack In Paris (16-17 June, 2011)\n\n\nHack In Paris is an international and corporate security event that will take place in Disneyland Paris® fromJune 16th to 17th of 2011. Please refer to the homepage to get up-to-date information about the event.\n\nTopics\nThe following list contains major topics the conference will cover. Please consider submitting even if the subject of your research is not listed here.\nAdvances in reverse engineering\nVulnerability research and exploitation\nPenetration testing and security assessment\nMalware analysis and new trends in malicous codes\nForensics, IT crime & law enforcement\nPrivacy issues: LOPPSI, HADOPI, …\nLow-level hacking (console security & mobile devices)\nRisk management and ISO 27001\nDates\nJanuary 20: CFP announced\nMarch 30: Submission deadline\nApril 15: Notification sent to authors\nApril 17: Program announcement\nJune 16-17: Hack In Paris\nJune 18: Nuit du Hack\nMore Information: https://hackinparis.com\n\n',
1393
+ 'Security Event : Hack In Paris (16-17 June, 2011)\n\n\nHack In Paris is an international and corporate security event that will take place in Disneyland Paris® fromJune 16th to 17th of 2011. Please refer to the homepage to get up-to-date information about the event.\n\nTopics\nThe following list contains major topics the conference will cover. Please consider submitting even if the subject of your research is not listed here.\nAdvances in reverse engineering\nVulnerability research and exploitation\nPenetration testing and security assessment\nMalware analysis and new trends in malicous codes\nForensics, IT crime & law enforcement\nPrivacy issues: LOPPSI, HADOPI, …\nLow-level hacking (console security & mobile devices)\nRisk management and ISO 27001\nDates\nJanuary 20: CFP announced\nMarch 30: Submission deadline\nApril 15: Notification sent to authors\nApril 17: Program announcement\nJune 16-17: Hack In Paris\nJune 18: Nuit du Hack\nMore Information: https://hackinparis.com\n\n',
1394
+ 'Google is going to shut down its social media network Google+ after the company suffered a massive data breach that exposed the private data of hundreds of thousands of Google Plus users to third-party developers.\n\nAccording to the tech giant, a security vulnerability in one of Google+\'s People APIs allowed third-party developers to access data for more than 500,000 users, including their usernames, email addresses, occupation, date of birth, profile photos, and gender-related information.\n\nSince Google+ servers do not keep API logs for more than two weeks, the company cannot confirm the number of users impacted by the vulnerability.\n\nHowever, Google assured its users that the company found no evidence that any developer was aware of this bug, or that the profile data was misused by any of the 438 developers that could have had access.\n"However, we ran a detailed analysis over the two weeks prior to patching the bug, and from that analysis, the Profiles of up to 500,000 Google+ accounts were potentially affected. Our analysis showed that up to 438 applications may have used this API," Google said in blog post published today.\nThe vulnerability was open since 2015 and fixed after Google discovered it in March 2018, but the company chose not to disclose the breach to the public—at the time when Facebook was being roasted for Cambridge Analytica scandal.\n\nThough Google has not revealed the technical details of the security vulnerability, the nature of the flaw seems to be something very similar to Facebook API flaw that recently allowed unauthorized developers to access private data from Facebook users.\n\nBesides admitting the security breach, Google also announced that the company is shutting down its social media network, acknowledging that Google+ failed to gain broad adoption or significant traction with consumers.\n"The consumer version of Google+ currently has low usage and engagement: 90 percent of Google+ user sessions are less than five seconds," Google said.\nIn response, the company has decided to shut down Google+ for consumers by the end of August 2019. However, Google+ will continue as a product for Enterprise users.\n\nGoogle Introduces New Privacy Controls Over Third-Party App Permissions\n\nAs part of its "Project Strobe," Google engineers also reviewed third-party developer access to Google account and Android device data; and has accordingly now introduced some new privacy controls.\n\nWhen a third-party app prompts users for access to their Google account data, clicking "Allow" button approves all requested permissions at once, leaving an opportunity for malicious apps to trick users into giving away powerful permissions.\nBut now Google has updated its Account Permissions system that asks for each requested permission individually rather than all at once, giving users more control over what type of account data they choose to share with each app.\n\nSince APIs can also allow developers to access users\' extremely sensitive data, like that of Gmail account, Google has limited access to Gmail API only for apps that directly enhance email functionality—such as email clients, email backup services and productivity services.\n\nGoogle shares fell over 2 percent to $1134.23 after the data breach reports.\n\n',
1395
+ ]
1396
+ embeddings = model.encode(sentences)
1397
+ print(embeddings.shape)
1398
+ # [3, 384]
1399
+
1400
+ # Get the similarity scores for the embeddings
1401
+ similarities = model.similarity(embeddings, embeddings)
1402
+ print(similarities.shape)
1403
+ # [3, 3]
1404
+ ```
1405
+
1406
+ <!--
1407
+ ### Direct Usage (Transformers)
1408
+
1409
+ <details><summary>Click to see the direct usage in Transformers</summary>
1410
+
1411
+ </details>
1412
+ -->
1413
+
1414
+ <!--
1415
+ ### Downstream Usage (Sentence Transformers)
1416
+
1417
+ You can finetune this model on your own dataset.
1418
+
1419
+ <details><summary>Click to expand</summary>
1420
+
1421
+ </details>
1422
+ -->
1423
+
1424
+ <!--
1425
+ ### Out-of-Scope Use
1426
+
1427
+ *List how the model may foreseeably be misused and address what users ought not to do with the model.*
1428
+ -->
1429
+
1430
+ <!--
1431
+ ## Bias, Risks and Limitations
1432
+
1433
+ *What are the known or foreseeable issues stemming from this model? You could also flag here known failure cases or weaknesses of the model.*
1434
+ -->
1435
+
1436
+ <!--
1437
+ ### Recommendations
1438
+
1439
+ *What are recommendations with respect to the foreseeable issues? For example, filtering explicit content.*
1440
+ -->
1441
+
1442
+ ## Training Details
1443
+
1444
+ ### Training Dataset
1445
+
1446
+ #### Unnamed Dataset
1447
+
1448
+ * Size: 3,742 training samples
1449
+ * Columns: <code>sentence_0</code>, <code>sentence_1</code>, and <code>label</code>
1450
+ * Approximate statistics based on the first 1000 samples:
1451
+ | | sentence_0 | sentence_1 | label |
1452
+ |:--------|:-------------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------|:--------------------------------------------------------------------------------------|
1453
+ | type | string | string | int |
1454
+ | details | <ul><li>min: 37 tokens</li><li>mean: 252.46 tokens</li><li>max: 256 tokens</li></ul> | <ul><li>min: 37 tokens</li><li>mean: 252.46 tokens</li><li>max: 256 tokens</li></ul> | <ul><li>0: ~35.20%</li><li>1: ~10.30%</li><li>2: ~17.90%</li><li>3: ~36.60%</li></ul> |
1455
+ * Samples:
1456
+ | sentence_0 | sentence_1 | label |
1457
+ |:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:---------------|
1458
+ | <code>U.S. online fashion retailer SHEIN has admitted that the company has suffered a significant data breach after unknown hackers stole personally identifiable information (PII) of almost 6.5 million customers.<br><br>Based in North Brunswick and founded in 2008, SHEIN has become one of the largest online fashion retailers that ships to more than 80 countries worldwide. The site has been initially designed to produce "affordable" and trendy fashion clothing for women.<br><br>SHEIN revealed last weekend that its servers had been targeted by a "concerted criminal cyber-attack" that began in June this year and lasted until August 22, when the company was finally made aware of the potential theft.<br><br>Soon after that, the company scanned its servers to remove all possible backdoored entry points, leveraging which hackers could again infiltrate the servers. SHEIN assured its customers that the website is now safe to visit.<br><br>Hackers Stole Over 6.42 Million SHEIN Customers' Data<br><br>Although details about the inci...</code> | <code>U.S. online fashion retailer SHEIN has admitted that the company has suffered a significant data breach after unknown hackers stole personally identifiable information (PII) of almost 6.5 million customers.<br><br>Based in North Brunswick and founded in 2008, SHEIN has become one of the largest online fashion retailers that ships to more than 80 countries worldwide. The site has been initially designed to produce "affordable" and trendy fashion clothing for women.<br><br>SHEIN revealed last weekend that its servers had been targeted by a "concerted criminal cyber-attack" that began in June this year and lasted until August 22, when the company was finally made aware of the potential theft.<br><br>Soon after that, the company scanned its servers to remove all possible backdoored entry points, leveraging which hackers could again infiltrate the servers. SHEIN assured its customers that the website is now safe to visit.<br><br>Hackers Stole Over 6.42 Million SHEIN Customers' Data<br><br>Although details about the inci...</code> | <code>1</code> |
1459
+ | <code>A location based Social Networking platform with 45 million users,'Foursquare' was vulnerable to the primary email address disclosed.<br><br>Foursquare is a Smartphone application that gives you details of nearby cafes, bars, shops, parks using GPS location and also tells about your friends nearby.<br><br>According to a Penetration tester and hacker 'Jamal Eddine', an attacker can extract email addresses of all 45 million users just by using a few lines of scripting tool.<br><br>Basically the flaw exists in the Invitation system of the Foursquare app. While testing the app, he found that invitation received on the recipient's end actually disclosing the sender's email address, as shown above.<br><br>Invitation URL:<br>https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=64761059&sig=mmlx96RwGrQ2fJAg4OWZhAWnDvc%3D<br>Where 'uid' parameter represents the sender's profile ID.<br><br>Hacker noticed that the parameter in the Invitation URL can be modified in order to spoof the sender profile i...</code> | <code>A location based Social Networking platform with 45 million users,'Foursquare' was vulnerable to the primary email address disclosed.<br><br>Foursquare is a Smartphone application that gives you details of nearby cafes, bars, shops, parks using GPS location and also tells about your friends nearby.<br><br>According to a Penetration tester and hacker 'Jamal Eddine', an attacker can extract email addresses of all 45 million users just by using a few lines of scripting tool.<br><br>Basically the flaw exists in the Invitation system of the Foursquare app. While testing the app, he found that invitation received on the recipient's end actually disclosing the sender's email address, as shown above.<br><br>Invitation URL:<br>https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=64761059&sig=mmlx96RwGrQ2fJAg4OWZhAWnDvc%3D<br>Where 'uid' parameter represents the sender's profile ID.<br><br>Hacker noticed that the parameter in the Invitation URL can be modified in order to spoof the sender profile i...</code> | <code>1</code> |
1460
+ | <code>Earlier this week Dropbox team unveiled details of three critical vulnerabilities in Apple macOS operating system, which altogether could allow a remote attacker to execute malicious code on a targeted Mac computer just by convincing a victim into visiting a malicious web page.<br><br>The reported vulnerabilities were originally discovered by Syndis, a cybersecurity firm hired by Dropbox to conduct simulated penetration testing attacks as Red Team on the company's IT infrastructure, including Apple software used by Dropbox.<br><br>The vulnerabilities were discovered and disclosed to Apple security team in February this year, which were then patched by Apple just over one month later with the release of its March security updates. DropBox applauded Apple for its quick response to its bug report.<br><br>According to DropBox, the vulnerabilities discovered by Syndis didn't just affect its macOS fleet, but also affected all Safari users running the latest version of the web browser and operating system at t...</code> | <code>Earlier this week Dropbox team unveiled details of three critical vulnerabilities in Apple macOS operating system, which altogether could allow a remote attacker to execute malicious code on a targeted Mac computer just by convincing a victim into visiting a malicious web page.<br><br>The reported vulnerabilities were originally discovered by Syndis, a cybersecurity firm hired by Dropbox to conduct simulated penetration testing attacks as Red Team on the company's IT infrastructure, including Apple software used by Dropbox.<br><br>The vulnerabilities were discovered and disclosed to Apple security team in February this year, which were then patched by Apple just over one month later with the release of its March security updates. DropBox applauded Apple for its quick response to its bug report.<br><br>According to DropBox, the vulnerabilities discovered by Syndis didn't just affect its macOS fleet, but also affected all Safari users running the latest version of the web browser and operating system at t...</code> | <code>3</code> |
1461
+ * Loss: [<code>SoftmaxLoss</code>](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#softmaxloss)
1462
+
1463
+ ### Training Hyperparameters
1464
+ #### Non-Default Hyperparameters
1465
+
1466
+ - `multi_dataset_batch_sampler`: round_robin
1467
+
1468
+ #### All Hyperparameters
1469
+ <details><summary>Click to expand</summary>
1470
+
1471
+ - `overwrite_output_dir`: False
1472
+ - `do_predict`: False
1473
+ - `eval_strategy`: no
1474
+ - `prediction_loss_only`: True
1475
+ - `per_device_train_batch_size`: 8
1476
+ - `per_device_eval_batch_size`: 8
1477
+ - `per_gpu_train_batch_size`: None
1478
+ - `per_gpu_eval_batch_size`: None
1479
+ - `gradient_accumulation_steps`: 1
1480
+ - `eval_accumulation_steps`: None
1481
+ - `torch_empty_cache_steps`: None
1482
+ - `learning_rate`: 5e-05
1483
+ - `weight_decay`: 0.0
1484
+ - `adam_beta1`: 0.9
1485
+ - `adam_beta2`: 0.999
1486
+ - `adam_epsilon`: 1e-08
1487
+ - `max_grad_norm`: 1
1488
+ - `num_train_epochs`: 3
1489
+ - `max_steps`: -1
1490
+ - `lr_scheduler_type`: linear
1491
+ - `lr_scheduler_kwargs`: {}
1492
+ - `warmup_ratio`: 0.0
1493
+ - `warmup_steps`: 0
1494
+ - `log_level`: passive
1495
+ - `log_level_replica`: warning
1496
+ - `log_on_each_node`: True
1497
+ - `logging_nan_inf_filter`: True
1498
+ - `save_safetensors`: True
1499
+ - `save_on_each_node`: False
1500
+ - `save_only_model`: False
1501
+ - `restore_callback_states_from_checkpoint`: False
1502
+ - `no_cuda`: False
1503
+ - `use_cpu`: False
1504
+ - `use_mps_device`: False
1505
+ - `seed`: 42
1506
+ - `data_seed`: None
1507
+ - `jit_mode_eval`: False
1508
+ - `use_ipex`: False
1509
+ - `bf16`: False
1510
+ - `fp16`: False
1511
+ - `fp16_opt_level`: O1
1512
+ - `half_precision_backend`: auto
1513
+ - `bf16_full_eval`: False
1514
+ - `fp16_full_eval`: False
1515
+ - `tf32`: None
1516
+ - `local_rank`: 0
1517
+ - `ddp_backend`: None
1518
+ - `tpu_num_cores`: None
1519
+ - `tpu_metrics_debug`: False
1520
+ - `debug`: []
1521
+ - `dataloader_drop_last`: False
1522
+ - `dataloader_num_workers`: 0
1523
+ - `dataloader_prefetch_factor`: None
1524
+ - `past_index`: -1
1525
+ - `disable_tqdm`: False
1526
+ - `remove_unused_columns`: True
1527
+ - `label_names`: None
1528
+ - `load_best_model_at_end`: False
1529
+ - `ignore_data_skip`: False
1530
+ - `fsdp`: []
1531
+ - `fsdp_min_num_params`: 0
1532
+ - `fsdp_config`: {'min_num_params': 0, 'xla': False, 'xla_fsdp_v2': False, 'xla_fsdp_grad_ckpt': False}
1533
+ - `fsdp_transformer_layer_cls_to_wrap`: None
1534
+ - `accelerator_config`: {'split_batches': False, 'dispatch_batches': None, 'even_batches': True, 'use_seedable_sampler': True, 'non_blocking': False, 'gradient_accumulation_kwargs': None}
1535
+ - `deepspeed`: None
1536
+ - `label_smoothing_factor`: 0.0
1537
+ - `optim`: adamw_torch
1538
+ - `optim_args`: None
1539
+ - `adafactor`: False
1540
+ - `group_by_length`: False
1541
+ - `length_column_name`: length
1542
+ - `ddp_find_unused_parameters`: None
1543
+ - `ddp_bucket_cap_mb`: None
1544
+ - `ddp_broadcast_buffers`: False
1545
+ - `dataloader_pin_memory`: True
1546
+ - `dataloader_persistent_workers`: False
1547
+ - `skip_memory_metrics`: True
1548
+ - `use_legacy_prediction_loop`: False
1549
+ - `push_to_hub`: False
1550
+ - `resume_from_checkpoint`: None
1551
+ - `hub_model_id`: None
1552
+ - `hub_strategy`: every_save
1553
+ - `hub_private_repo`: None
1554
+ - `hub_always_push`: False
1555
+ - `gradient_checkpointing`: False
1556
+ - `gradient_checkpointing_kwargs`: None
1557
+ - `include_inputs_for_metrics`: False
1558
+ - `include_for_metrics`: []
1559
+ - `eval_do_concat_batches`: True
1560
+ - `fp16_backend`: auto
1561
+ - `push_to_hub_model_id`: None
1562
+ - `push_to_hub_organization`: None
1563
+ - `mp_parameters`:
1564
+ - `auto_find_batch_size`: False
1565
+ - `full_determinism`: False
1566
+ - `torchdynamo`: None
1567
+ - `ray_scope`: last
1568
+ - `ddp_timeout`: 1800
1569
+ - `torch_compile`: False
1570
+ - `torch_compile_backend`: None
1571
+ - `torch_compile_mode`: None
1572
+ - `dispatch_batches`: None
1573
+ - `split_batches`: None
1574
+ - `include_tokens_per_second`: False
1575
+ - `include_num_input_tokens_seen`: False
1576
+ - `neftune_noise_alpha`: None
1577
+ - `optim_target_modules`: None
1578
+ - `batch_eval_metrics`: False
1579
+ - `eval_on_start`: False
1580
+ - `use_liger_kernel`: False
1581
+ - `eval_use_gather_object`: False
1582
+ - `average_tokens_across_devices`: False
1583
+ - `prompts`: None
1584
+ - `batch_sampler`: batch_sampler
1585
+ - `multi_dataset_batch_sampler`: round_robin
1586
+
1587
+ </details>
1588
+
1589
+ ### Training Logs
1590
+ | Epoch | Step | Training Loss |
1591
+ |:------:|:----:|:-------------:|
1592
+ | 1.0684 | 500 | 1.2186 |
1593
+ | 2.1368 | 1000 | 1.145 |
1594
+
1595
+
1596
+ ### Framework Versions
1597
+ - Python: 3.12.9
1598
+ - Sentence Transformers: 3.4.1
1599
+ - Transformers: 4.49.0
1600
+ - PyTorch: 2.6.0
1601
+ - Accelerate: 1.4.0
1602
+ - Datasets: 3.3.2
1603
+ - Tokenizers: 0.21.0
1604
+
1605
+ ## Citation
1606
+
1607
+ ### BibTeX
1608
+
1609
+ #### Sentence Transformers and SoftmaxLoss
1610
+ ```bibtex
1611
+ @inproceedings{reimers-2019-sentence-bert,
1612
+ title = "Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks",
1613
+ author = "Reimers, Nils and Gurevych, Iryna",
1614
+ booktitle = "Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing",
1615
+ month = "11",
1616
+ year = "2019",
1617
+ publisher = "Association for Computational Linguistics",
1618
+ url = "https://arxiv.org/abs/1908.10084",
1619
+ }
1620
+ ```
1621
+
1622
+ <!--
1623
+ ## Glossary
1624
+
1625
+ *Clearly define terms in order to be accessible across audiences.*
1626
+ -->
1627
+
1628
+ <!--
1629
+ ## Model Card Authors
1630
+
1631
+ *Lists the people who create the model card, providing recognition and accountability for the detailed work that goes into its construction.*
1632
+ -->
1633
+
1634
+ <!--
1635
+ ## Model Card Contact
1636
+
1637
+ *Provides a way for people who have updates to the Model Card, suggestions, or questions, to contact the Model Card authors.*
1638
+ -->
config.json ADDED
@@ -0,0 +1,26 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "_name_or_path": "fine_tuned_sbert",
3
+ "architectures": [
4
+ "BertModel"
5
+ ],
6
+ "attention_probs_dropout_prob": 0.1,
7
+ "classifier_dropout": null,
8
+ "gradient_checkpointing": false,
9
+ "hidden_act": "gelu",
10
+ "hidden_dropout_prob": 0.1,
11
+ "hidden_size": 384,
12
+ "initializer_range": 0.02,
13
+ "intermediate_size": 1536,
14
+ "layer_norm_eps": 1e-12,
15
+ "max_position_embeddings": 512,
16
+ "model_type": "bert",
17
+ "num_attention_heads": 12,
18
+ "num_hidden_layers": 6,
19
+ "pad_token_id": 0,
20
+ "position_embedding_type": "absolute",
21
+ "torch_dtype": "float32",
22
+ "transformers_version": "4.49.0",
23
+ "type_vocab_size": 2,
24
+ "use_cache": true,
25
+ "vocab_size": 30522
26
+ }
config_sentence_transformers.json ADDED
@@ -0,0 +1,10 @@
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "__version__": {
3
+ "sentence_transformers": "3.4.1",
4
+ "transformers": "4.49.0",
5
+ "pytorch": "2.6.0"
6
+ },
7
+ "prompts": {},
8
+ "default_prompt_name": null,
9
+ "similarity_fn_name": "cosine"
10
+ }
model.safetensors ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a69349eb8ec33b8bdaeefc01305d25ac13a85d3bbe606a8d6a4316d4c370061c
3
+ size 90864192
modules.json ADDED
@@ -0,0 +1,20 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ [
2
+ {
3
+ "idx": 0,
4
+ "name": "0",
5
+ "path": "",
6
+ "type": "sentence_transformers.models.Transformer"
7
+ },
8
+ {
9
+ "idx": 1,
10
+ "name": "1",
11
+ "path": "1_Pooling",
12
+ "type": "sentence_transformers.models.Pooling"
13
+ },
14
+ {
15
+ "idx": 2,
16
+ "name": "2",
17
+ "path": "2_Normalize",
18
+ "type": "sentence_transformers.models.Normalize"
19
+ }
20
+ ]
sentence_bert_config.json ADDED
@@ -0,0 +1,4 @@
 
 
 
 
 
1
+ {
2
+ "max_seq_length": 256,
3
+ "do_lower_case": false
4
+ }
special_tokens_map.json ADDED
@@ -0,0 +1,37 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "cls_token": {
3
+ "content": "[CLS]",
4
+ "lstrip": false,
5
+ "normalized": false,
6
+ "rstrip": false,
7
+ "single_word": false
8
+ },
9
+ "mask_token": {
10
+ "content": "[MASK]",
11
+ "lstrip": false,
12
+ "normalized": false,
13
+ "rstrip": false,
14
+ "single_word": false
15
+ },
16
+ "pad_token": {
17
+ "content": "[PAD]",
18
+ "lstrip": false,
19
+ "normalized": false,
20
+ "rstrip": false,
21
+ "single_word": false
22
+ },
23
+ "sep_token": {
24
+ "content": "[SEP]",
25
+ "lstrip": false,
26
+ "normalized": false,
27
+ "rstrip": false,
28
+ "single_word": false
29
+ },
30
+ "unk_token": {
31
+ "content": "[UNK]",
32
+ "lstrip": false,
33
+ "normalized": false,
34
+ "rstrip": false,
35
+ "single_word": false
36
+ }
37
+ }
tokenizer.json ADDED
The diff for this file is too large to render. See raw diff
 
tokenizer_config.json ADDED
@@ -0,0 +1,65 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "added_tokens_decoder": {
3
+ "0": {
4
+ "content": "[PAD]",
5
+ "lstrip": false,
6
+ "normalized": false,
7
+ "rstrip": false,
8
+ "single_word": false,
9
+ "special": true
10
+ },
11
+ "100": {
12
+ "content": "[UNK]",
13
+ "lstrip": false,
14
+ "normalized": false,
15
+ "rstrip": false,
16
+ "single_word": false,
17
+ "special": true
18
+ },
19
+ "101": {
20
+ "content": "[CLS]",
21
+ "lstrip": false,
22
+ "normalized": false,
23
+ "rstrip": false,
24
+ "single_word": false,
25
+ "special": true
26
+ },
27
+ "102": {
28
+ "content": "[SEP]",
29
+ "lstrip": false,
30
+ "normalized": false,
31
+ "rstrip": false,
32
+ "single_word": false,
33
+ "special": true
34
+ },
35
+ "103": {
36
+ "content": "[MASK]",
37
+ "lstrip": false,
38
+ "normalized": false,
39
+ "rstrip": false,
40
+ "single_word": false,
41
+ "special": true
42
+ }
43
+ },
44
+ "clean_up_tokenization_spaces": false,
45
+ "cls_token": "[CLS]",
46
+ "do_basic_tokenize": true,
47
+ "do_lower_case": true,
48
+ "extra_special_tokens": {},
49
+ "mask_token": "[MASK]",
50
+ "max_length": 128,
51
+ "model_max_length": 256,
52
+ "never_split": null,
53
+ "pad_to_multiple_of": null,
54
+ "pad_token": "[PAD]",
55
+ "pad_token_type_id": 0,
56
+ "padding_side": "right",
57
+ "sep_token": "[SEP]",
58
+ "stride": 0,
59
+ "strip_accents": null,
60
+ "tokenize_chinese_chars": true,
61
+ "tokenizer_class": "BertTokenizer",
62
+ "truncation_side": "right",
63
+ "truncation_strategy": "longest_first",
64
+ "unk_token": "[UNK]"
65
+ }
vocab.txt ADDED
The diff for this file is too large to render. See raw diff