Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Russian army targeted by new Android malware hidden in mapping app
Russian army targeted by new Android malware hidden in mapping app
A new Android malware has been discovered hidden inside trojanized versions of the Alpine Quest mapping app, which is reportedly used by Russian soldiers as part of war zone operational planning.
·bleepingcomputer.com·
Russian army targeted by new Android malware hidden in mapping app
Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter
Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter
Governments around the world have appeared to ease off from using internet shutdowns to silence protesters and control access to information, according to new data from internet infrastructure company Cloudflare.
·therecord.media·
Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter
Understanding the threat landscape for Kubernetes and containerized assets
Understanding the threat landscape for Kubernetes and containerized assets
The dynamic nature of containers can make it challenging for security teams to detect runtime anomalies or pinpoint the source of a security incident, presenting an opportunity for attackers to stay undetected. Microsoft Threat Intelligence has observed threat actors taking advantage of unsecured workload identities to gain access to resources, including containerized environments. Microsoft data […]
·microsoft.com·
Understanding the threat landscape for Kubernetes and containerized assets
Regulating AI Behavior with a Hypervisor - Schneier on Security
Regulating AI Behavior with a Hypervisor - Schneier on Security
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.” Abstract:As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To mitigate this risk, we propose Guillotine, a hypervisor architecture for sandboxing powerful AI models—models that, by accident or malice, can generate existential threats to humanity. Although Guillotine borrows some well-known virtualization techniques, Guillotine must also introduce fundamentally new isolation mechanisms to handle the unique threat model posed by existential-risk AIs. For example, a rogue AI may try to introspect upon hypervisor software or the underlying hardware substrate to enable later subversion of that control plane; thus, a Guillotine hypervisor requires careful co-design of the hypervisor software and the CPUs, RAM, NIC, and storage devices that support the hypervisor software, to thwart side channel leakage and more generally eliminate mechanisms for AI to exploit reflection-based vulnerabilities. Beyond such isolation at the software, network, and microarchitectural layers, a Guillotine hypervisor must also provide physical fail-safes more commonly associated with nuclear power plants, avionic platforms, and other types of mission critical systems. Physical fail-safes, e.g., involving electromechanical disconnection of network cables, or the flooding of a datacenter which holds a rogue AI, provide defense in depth if software, network, and microarchitectural isolation is compromised and a rogue AI must be temporarily shut down or permanently destroyed. ...
·schneier.com·
Regulating AI Behavior with a Hypervisor - Schneier on Security
FBI: US lost record $16.6 billion to cybercrime in 2024
FBI: US lost record $16.6 billion to cybercrime in 2024
The FBI says cybercriminals have stolen a record $16,6 billion in 2024, marking an increase in losses of over 33% compared to the previous year.
·bleepingcomputer.com·
FBI: US lost record $16.6 billion to cybercrime in 2024
Phishing detection is broken: Why most attacks feel like a zero day
Phishing detection is broken: Why most attacks feel like a zero day
Phishing attacks now evade email filters, proxies, and MFA — making every attack feel like a zero-day. This article from Push Security breaks down why detection is failing and how real-time, in-browser analysis can help turn the tide.
·bleepingcomputer.com·
Phishing detection is broken: Why most attacks feel like a zero day
ASUS releases fix for AMI bug that lets hackers brick servers
ASUS releases fix for AMI bug that lets hackers brick servers
ASUS has released security updates to address CVE-2024-54085, a maximum severity flaw that could allow attackers to hijack and potentially brick servers.
·bleepingcomputer.com·
ASUS releases fix for AMI bug that lets hackers brick servers
Unlocking the Distillation of AI & Threat Intelligence | CSA
Unlocking the Distillation of AI & Threat Intelligence | CSA
As AI research advances, model distillation will likely expand into new applications and improve the ability to address complex challenges like disinformation.
·cloudsecurityalliance.org·
Unlocking the Distillation of AI & Threat Intelligence | CSA
RSAC Fireside Chat: Enterprise storage security – ground zero for protecting data, preserving resilience
RSAC Fireside Chat: Enterprise storage security – ground zero for protecting data, preserving resilience
It’s no secret that cyber criminals go after data. What’s often overlooked is shoring up direct protection where that data typically resides: in enterprise storage systems. That’s beginning to change. Related: The data storage economy Enterprise storage security has moved to the front burner. The emerging best practice is to approach it as a core
·lastwatchdog.com·
RSAC Fireside Chat: Enterprise storage security – ground zero for protecting data, preserving resilience