Tag: Countermeasures

  • Schneier on Security: AI-Enabled Influence Operation Against Iran

    Source URL: https://www.schneier.com/blog/archives/2025/10/ai-enabled-influence-operation-against-iran.html Source: Schneier on Security Title: AI-Enabled Influence Operation Against Iran Feedly Summary: Citizen Lab has uncovered a coordinated AI-enabled influence operation against the Iranian government, probably conducted by Israel. Key Findings A coordinated network of more than 50 inauthentic X profiles is conducting an AI-enabled influence operation. The network, which we refer…

  • Slashdot: Record-Breaking DDoS Attack Peaks At 22 Tbps and 10 Bpps

    Source URL: https://it.slashdot.org/story/25/09/24/2010227/record-breaking-ddos-attack-peaks-at-22-tbps-and-10-bpps?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Record-Breaking DDoS Attack Peaks At 22 Tbps and 10 Bpps Feedly Summary: AI Summary and Description: Yes Summary: Cloudflare successfully mitigated a record-breaking DDoS attack against a European network infrastructure company, reaching peaks of 22.2 Tbps. The attack, attributed to the Aisuru botnet, demonstrates the increasing sophistication of cyber…

  • Unit 42: Bookworm to Stately Taurus Using the Unit 42 Attribution Framework

    Source URL: https://unit42.paloaltonetworks.com/bookworm-to-stately-taurus/ Source: Unit 42 Title: Bookworm to Stately Taurus Using the Unit 42 Attribution Framework Feedly Summary: We connect Bookworm malware to Chinese APT Stately Taurus using our attribution framework, enhancing our understanding of threat group tradecraft. The post Bookworm to Stately Taurus Using the Unit 42 Attribution Framework appeared first on Unit…

  • Docker: MCP Horror Stories: The Drive-By Localhost Breach

    Source URL: https://www.docker.com/blog/mpc-horror-stories-cve-2025-49596-local-host-breach/ Source: Docker Title: MCP Horror Stories: The Drive-By Localhost Breach Feedly Summary: This is Part 4 of our MCP Horror Stories series, where we examine real-world security incidents that expose the devastating vulnerabilities in AI infrastructure and demonstrate how Docker MCP Gateway provides enterprise-grade protection against sophisticated attack vectors. The Model Context…

  • Schneier on Security: Time-of-Check Time-of-Use Attacks Against LLMs

    Source URL: https://www.schneier.com/blog/archives/2025/09/time-of-check-time-of-use-attacks-against-llms.html Source: Schneier on Security Title: Time-of-Check Time-of-Use Attacks Against LLMs Feedly Summary: This is a nice piece of research: “Mind the Gap: Time-of-Check to Time-of-Use Vulnerabilities in LLM-Enabled Agents“.: Abstract: Large Language Model (LLM)-enabled agents are rapidly emerging across a wide range of applications, but their deployment introduces vulnerabilities with security implications.…

  • The Register: AI-powered penetration tool, an attacker’s dream, downloaded 10K times in 2 months

    Source URL: https://www.theregister.com/2025/09/11/cobalt_strikes_ai_successor_downloaded/ Source: The Register Title: AI-powered penetration tool, an attacker’s dream, downloaded 10K times in 2 months Feedly Summary: Shady, China-based company, all the apps needed for a fully automated attack – sounds totally legit Villager, a new penetration-testing tool linked to a suspicious China-based company and described by researchers as “Cobalt Strike’s…

  • The Register: LegalPwn: Tricking LLMs by burying badness in lawyerly fine print

    Source URL: https://www.theregister.com/2025/09/01/legalpwn_ai_jailbreak/ Source: The Register Title: LegalPwn: Tricking LLMs by burying badness in lawyerly fine print Feedly Summary: Trust and believe – AI models trained to see ‘legal’ doc as super legit Researchers at security firm Pangea have discovered yet another way to trivially trick large language models (LLMs) into ignoring their guardrails. Stick…

  • The Register: If you thought China’s Salt Typhoon was booted off critical networks, think again

    Source URL: https://www.theregister.com/2025/08/28/china_salt_typhoon_alert/ Source: The Register Title: If you thought China’s Salt Typhoon was booted off critical networks, think again Feedly Summary: 13 governments sound the alarm about ongoing unpleasantness China’s Salt Typhoon cyberspies continue their years-long hacking campaign targeting critical industries around the world, according to a joint security alert from cyber and law…