Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29819 bookmarks
Custom sorting
Regulating AI Behavior with a Hypervisor - Schneier on Security
Regulating AI Behavior with a Hypervisor - Schneier on Security
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.” Abstract:As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To mitigate this risk, we propose Guillotine, a hypervisor architecture for sandboxing powerful AI models—models that, by accident or malice, can generate existential threats to humanity. Although Guillotine borrows some well-known virtualization techniques, Guillotine must also introduce fundamentally new isolation mechanisms to handle the unique threat model posed by existential-risk AIs. For example, a rogue AI may try to introspect upon hypervisor software or the underlying hardware substrate to enable later subversion of that control plane; thus, a Guillotine hypervisor requires careful co-design of the hypervisor software and the CPUs, RAM, NIC, and storage devices that support the hypervisor software, to thwart side channel leakage and more generally eliminate mechanisms for AI to exploit reflection-based vulnerabilities. Beyond such isolation at the software, network, and microarchitectural layers, a Guillotine hypervisor must also provide physical fail-safes more commonly associated with nuclear power plants, avionic platforms, and other types of mission critical systems. Physical fail-safes, e.g., involving electromechanical disconnection of network cables, or the flooding of a datacenter which holds a rogue AI, provide defense in depth if software, network, and microarchitectural isolation is compromised and a rogue AI must be temporarily shut down or permanently destroyed. ...
·schneier.com·
Regulating AI Behavior with a Hypervisor - Schneier on Security
State Department reorganization could imperil cyber diplomacy
State Department reorganization could imperil cyber diplomacy
Congress told the U.S. State Department how to approach global cyber challenges, but the administration’s plan would upend that strategy.
·cybersecuritydive.com·
State Department reorganization could imperil cyber diplomacy
Verizon's DBIR Reveals 34% Jump in Vulnerability Exploitation
Verizon's DBIR Reveals 34% Jump in Vulnerability Exploitation
After a 180% rise in last year’s report, the exploitation of vulnerabilities continues to grow, now accounting for 20% of all breaches
·infosecurity-magazine.com·
Verizon's DBIR Reveals 34% Jump in Vulnerability Exploitation
FBI: US lost record $16.6 billion to cybercrime in 2024
FBI: US lost record $16.6 billion to cybercrime in 2024
The FBI says cybercriminals have stolen a record $16,6 billion in 2024, marking an increase in losses of over 33% compared to the previous year.
·bleepingcomputer.com·
FBI: US lost record $16.6 billion to cybercrime in 2024
Phishing detection is broken: Why most attacks feel like a zero day
Phishing detection is broken: Why most attacks feel like a zero day
Phishing attacks now evade email filters, proxies, and MFA — making every attack feel like a zero-day. This article from Push Security breaks down why detection is failing and how real-time, in-browser analysis can help turn the tide.
·bleepingcomputer.com·
Phishing detection is broken: Why most attacks feel like a zero day
ASUS releases fix for AMI bug that lets hackers brick servers
ASUS releases fix for AMI bug that lets hackers brick servers
ASUS has released security updates to address CVE-2024-54085, a maximum severity flaw that could allow attackers to hijack and potentially brick servers.
·bleepingcomputer.com·
ASUS releases fix for AMI bug that lets hackers brick servers
Unlocking the Distillation of AI & Threat Intelligence | CSA
Unlocking the Distillation of AI & Threat Intelligence | CSA
As AI research advances, model distillation will likely expand into new applications and improve the ability to address complex challenges like disinformation.
·cloudsecurityalliance.org·
Unlocking the Distillation of AI & Threat Intelligence | CSA
RSAC Fireside Chat: Enterprise storage security – ground zero for protecting data, preserving resilience
RSAC Fireside Chat: Enterprise storage security – ground zero for protecting data, preserving resilience
It’s no secret that cyber criminals go after data. What’s often overlooked is shoring up direct protection where that data typically resides: in enterprise storage systems. That’s beginning to change. Related: The data storage economy Enterprise storage security has moved to the front burner. The emerging best practice is to approach it as a core
·lastwatchdog.com·
RSAC Fireside Chat: Enterprise storage security – ground zero for protecting data, preserving resilience
Over $16 billion in losses reported to FBI in 2024 tied to computer crime
Over $16 billion in losses reported to FBI in 2024 tied to computer crime
The FBI on Wednesday said it recorded a “staggering” $16.6 billion in cybercrime losses to businesses and individuals, the highest for both figures since the hub’s establishment in 2000.
·therecord.media·
Over $16 billion in losses reported to FBI in 2024 tied to computer crime
AI can help defenders stop nation-state threat actors at machine speed | CyberScoop
AI can help defenders stop nation-state threat actors at machine speed | CyberScoop
AI is transforming cybersecurity defenses against Chinese threat actors. Learn why US organizations must leverage AI for faster detection and real-time response to evolving threats targeting cloud and IT infrastructure.
·cyberscoop.com·
AI can help defenders stop nation-state threat actors at machine speed | CyberScoop
Forging Robust Cloud Defenses for Modern Businesses | CSA
Forging Robust Cloud Defenses for Modern Businesses | CSA
​Explore key cloud security challenges and strategies to protect digital assets, ensuring resilience in today's hybrid and multi-cloud environments.
·cloudsecurityalliance.org·
Forging Robust Cloud Defenses for Modern Businesses | CSA
US Data Breach Victim Count Surges 26% Annually
US Data Breach Victim Count Surges 26% Annually
The latest ITRC data finds breach volumes remained flat in Q1 but victim numbers increased 26% annually
·infosecurity-magazine.com·
US Data Breach Victim Count Surges 26% Annually
M&S Grapples with Cyber Incident Affecting In-Store Services
M&S Grapples with Cyber Incident Affecting In-Store Services
Marks and Spencer has confirmed that it has been managing a cyber incident for the past few days which affected its contactless payments and click and collect services
·infosecurity-magazine.com·
M&S Grapples with Cyber Incident Affecting In-Store Services