Aisuru Botnet Shifts from DDoS to Residential Proxies
Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and sustainable business: Renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy…
Understanding and Protecting Against Sender Policy Framework (SPF) Poisoning | Abdul Wahab Junaid
What is Sender Policy Framework (SPF)? Sender Policy Framework (SPF) is a technical standard designed to provide a layer of protection against fraudulent
Autonomous AI Hacking and the Future of Cybersecurity - Schneier on Security
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything. Over the summer, hackers proved the concept, industry institutionalized it, and criminals operationalized it. In June, AI company XBOW took the top spot on HackerOne’s US leaderboard after submitting over 1,000 new vulnerabilities in just a few months. In August, the seven teams competing in DARPA’s AI Cyber Challenge ...
Build vs. Buy: What it Really Takes to Harden Your Software Supply Chain - DevOps.com
Securing the software supply chain requires more than building hardened images. Learn why DIY often fails and what it takes to maintain secure images at scale.
Visa Isn't Centralized—and Neither Is First Person Identity
Visa isn't centralized. Instead, it's a trust framework that lets thousands of participants interoperate. First-person identity brings that same model to digital identity, enabling not one
The latest data breaches are a regular topic in the news. Raising awareness about the prevalence and severity of the issue, as well as how the financial impact on the business can be limited is what we contribute with this article.
Digital Threat Modeling Under Authoritarianism - Schneier on Security
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling. In security, threat modeling is the process of determining what security measures make sense in your particular situation. It’s a way to think about potential risks, possible defenses, and the costs of both. It’s how experts avoid being distracted by irrelevant risks or overburdened by undue costs...
The first six chapters of my new book, Dynamic Authorization: Adaptive Access Control, are now available in Manning’s Early Access Program. The book explores why authorization is still misunderstood, and how new tools like Cedar enable secure, flexible systems that also improve employee and customer experience.
The DNSSEC Illusion: 16 TLDs revealed the hidden fragility in DNSSEC ops
For years, a European TLD ran their DNSSEC toolchain without incident. Everything “just worked.” Updates were rare, and no one touched the setup.
Then their only DNSSEC expert left.
What looked like stability turned out to be fragility. The system wasn’t resilient — it was dependent on one person’s
Improving privacy can get overwhelming at first. It's important to move one step at a time, but remain persistent. Good privacy is like good health habits.
Keep applications secure with strong authentication security. Apply actionable steps and learn key takeaways to securing and building apps that elevate identity assurances.
Newgrounds, a gaming forum, has some clever ways for non-intrusively complying with the shambling disaster that is the "UK Online Safety Act". For years, I've been doing something similar to this when generating internal reports on DNA Lounge demographics: e.g., if someone bought a ticket for an 18+ event 5 years ago, they must be at least 23 years old now. Newgrounds: Here is our current ...
Whimsical elliptic curves in Zcash zero knowledge proofs
Several elliptic curves which Zcash uses in zero knowledge proofs are named after characters from Lewis Carroll: Jubjub, Bandersnatch, Tweddledee, Tweedledum
Zero Knowledge Proofs Alone Are Not a Digital ID Solution to
In the past few years, governments across the world have rolled out digital identification options, and now there are efforts encouraging online companies to implement identity and age verification
The “Bubble” of Risk: Improving Assessments for Offensive Cybersecurity Agents - CITP Blog
Authored by Boyi Wei Most frontier models today undergo some form of safety testing, including whether they can help adversaries launch costly cyberattacks. But many of these assessments overlook a critical factor: adversaries can adapt and modify models in ways that expand the risk far beyond the perceived safety profile that static evaluations capture. At […]