Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Over 49,000 misconfigured building access systems exposed online
Over 49,000 misconfigured building access systems exposed online
Researchers discovered 49,000 misconfigured and exposed Access Management Systems (AMS) across multiple industries and countries, which could compromise privacy and physical security in critical sectors.
·bleepingcomputer.com·
Over 49,000 misconfigured building access systems exposed online
"Emergent Misalignment" in LLMs - Schneier on Security
"Emergent Misalignment" in LLMs - Schneier on Security
Interesting research: “Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs“: Abstract: We present a surprising result regarding LLMs and alignment. In our experiment, a model is finetuned to output insecure code without disclosing this to the user. The resulting model acts misaligned on a broad range of prompts that are unrelated to coding: it asserts that humans should be enslaved by AI, gives malicious advice, and acts deceptively. Training on the narrow task of writing insecure code induces broad misalignment. We call this emergent misalignment. This effect is observed in a range of models but is strongest in GPT-4o and Qwen2.5-Coder-32B-Instruct. Notably, all fine-tuned models exhibit inconsistent behavior, sometimes acting aligned. Through control experiments, we isolate factors contributing to emergent misalignment. Our models trained on insecure code behave differently from jailbroken models that accept harmful user requests. Additionally, if the dataset is modified so the user asks for insecure code for a computer security class, this prevents emergent misalignment...
·schneier.com·
"Emergent Misalignment" in LLMs - Schneier on Security
Microsoft names cybercriminals behind AI deepfake network
Microsoft names cybercriminals behind AI deepfake network
Microsoft has named multiple threat actors part of a cybercrime gang accused of developing malicious tools capable of bypassing generative AI guardrails to generate celebrity deepfakes and other illicit content.
·bleepingcomputer.com·
Microsoft names cybercriminals behind AI deepfake network
Cette fois, promis, Google va changer la sécurité de Gmail pour en finir avec les SMS
Cette fois, promis, Google va changer la sécurité de Gmail pour en finir avec les SMS
Adieu les SMS sur Gmail pour la double authentification. Google désire les remplacer par une autre méthode, moins exposée aux abus et aux pratiques de piratage : les QR codes. Le changement, selon l'entreprise américaine, sera positif pour la sécurité des internautes, mais il faudra encore attendre un peu avant de le
·numerama.com·
Cette fois, promis, Google va changer la sécurité de Gmail pour en finir avec les SMS
How is AI Strengthening Zero Trust? | CSA
How is AI Strengthening Zero Trust? | CSA
Combining zero-trust security and AI is not only a novel approach for enterprises to improve their security posture, but it is also critical.
·cloudsecurityalliance.org·
How is AI Strengthening Zero Trust? | CSA
Suspected Desorden hacker arrested for breaching 90 organizations
Suspected Desorden hacker arrested for breaching 90 organizations
A suspected cyber criminal believed to have extorted companies under the name "DESORDEN Group" or "ALTDOS" has been arrested in Thailand for leaking the stolen data of over 90 organizations worldwide.
·bleepingcomputer.com·
Suspected Desorden hacker arrested for breaching 90 organizations
How Can Organizations Build Better GRC Habits in 2025? | CSA
How Can Organizations Build Better GRC Habits in 2025? | CSA
Many GRC programs rely on manual, point-in-time compliance. Continuous Controls Monitoring (CCM) helps organizations shift to an automated, proactive compliance mindset.
·cloudsecurityalliance.org·
How Can Organizations Build Better GRC Habits in 2025? | CSA
Microsoft fixes Outlook drag-and-drop broken by Windows updates
Microsoft fixes Outlook drag-and-drop broken by Windows updates
​Microsoft has fixed a known issue that broke email and calendar drag-and-drop in classic Outlook after installing recent updates on Windows 24H2 systems.
·bleepingcomputer.com·
Microsoft fixes Outlook drag-and-drop broken by Windows updates
Software Vulnerabilities Take Almost Nine Months to Patch
Software Vulnerabilities Take Almost Nine Months to Patch
Veracode found a 47% increase in the average time taken to patch software vulnerabilities, driven by growing reliance on third-party code
·infosecurity-magazine.com·
Software Vulnerabilities Take Almost Nine Months to Patch