Tag: emerging threats

  • The Register: Telco security is a dumpster fire and everyone’s getting burned

    Source URL: https://www.theregister.com/2024/12/02/telco_security_opinion/ Source: The Register Title: Telco security is a dumpster fire and everyone’s getting burned Feedly Summary: The politics of cybersecurity are too important to be left to the politicians Opinion Here’s a front-page headline you won’t see these days: CHINA’S SPIES ARE TAPPING OUR PHONES. Not that they’re not – they are…

  • Schneier on Security: Race Condition Attacks against LLMs

    Source URL: https://www.schneier.com/blog/archives/2024/11/race-condition-attacks-against-llms.html Source: Schneier on Security Title: Race Condition Attacks against LLMs Feedly Summary: These are two attacks against the system components surrounding LLMs: We propose that LLM Flowbreaking, following jailbreaking and prompt injection, joins as the third on the growing list of LLM attack types. Flowbreaking is less about whether prompt or response…

  • Slashdot: OpenAI’s Sora Video Generator Appears To Have Leaked

    Source URL: https://slashdot.org/story/24/11/26/2020220/openais-sora-video-generator-appears-to-have-leaked?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: OpenAI’s Sora Video Generator Appears To Have Leaked Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a group that has leaked access to OpenAI’s Sora video generator, citing protests against perceived duplicity in OpenAI’s practices. This incident raises ongoing concerns about security in AI services and…

  • CSA: Can AI Balance Security and Usability Effectively?

    Source URL: https://www.zscaler.com/cxorevolutionaries/insights/bringing-security-vs-usability-pendulum-stop Source: CSA Title: Can AI Balance Security and Usability Effectively? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the fundamental challenge of balancing security and user experience in cybersecurity, positing that artificial intelligence (AI) can be employed to achieve this equilibrium. It emphasizes a shift towards AI-powered, adaptive security…

  • Slashdot: AI’s Future and Nvidia’s Fortunes Ride on the Race To Pack More Chips Into One Place

    Source URL: https://tech.slashdot.org/story/24/11/25/1254207/ais-future-and-nvidias-fortunes-ride-on-the-race-to-pack-more-chips-into-one-place?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI’s Future and Nvidia’s Fortunes Ride on the Race To Pack More Chips Into One Place Feedly Summary: AI Summary and Description: Yes Summary: The text highlights substantial investments by major technology firms in AI capabilities through the creation of large-scale computing infrastructures known as “super clusters.” This trend…

  • The Register: Russian spies may have moved in next door to target your network

    Source URL: https://www.theregister.com/2024/11/25/infosec_news_in_brief/ Source: The Register Title: Russian spies may have moved in next door to target your network Feedly Summary: Plus: Microsoft seizes phishing domains; Helldown finds new targets; Illegal streaming with Jupyter, and more Infosec in brief Not to make you paranoid, but that business across the street could, under certain conditions, serve…

  • The Register: 1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole

    Source URL: https://www.theregister.com/2024/11/22/palo_alto_firewalls_under_exploit/ Source: The Register Title: 1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole Feedly Summary: PAN-PAN! Intruders inject web shell backdoors, crypto-coin miners, more Thousands of Palo Alto Networks firewalls were compromised by attackers exploiting two recently patched security bugs. The intruders were able to deploy web-accessible backdoors to…

  • Cisco Talos Blog: Bidirectional communication via polyrhythms and shuffles: Without Jon the beat must go on

    Source URL: https://blog.talosintelligence.com/bidirectional-communication-via-polyrhythms-and-shuffles-without-jon-the-beat-must-go-on/ Source: Cisco Talos Blog Title: Bidirectional communication via polyrhythms and shuffles: Without Jon the beat must go on Feedly Summary: The Threat Source Newsletter is back! William Largent discusses bidirectional communication in the SOC, and highlights new Talos research including the discovery of PXA Stealers. AI Summary and Description: Yes Summary: The…

  • Alerts: CISA Adds Three Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/21/cisa-adds-three-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Three Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-44308 Apple Multiple Products Code Execution Vulnerability CVE-2024-44309 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability CVE-2024-21287 Oracle Agile Product Lifecycle Management (PLM) Incorrect Authorization Vulnerability…

  • CSA: CSA Interview: Nerding Out with CISO Alexander Getsin

    Source URL: https://cloudsecurityalliance.org/blog/2024/11/21/csa-community-spotlight-nerding-out-about-security-with-ciso-alexander-getsin Source: CSA Title: CSA Interview: Nerding Out with CISO Alexander Getsin Feedly Summary: AI Summary and Description: Yes Summary: The Cloud Security Alliance (CSA) highlights its 15 years of impactful research in cloud security, involvement of key cybersecurity personnel, and future ambitions to incorporate AI security into its mandate. This is significant…