Escalating incursions into military base infrastructure, telecom networks, utilities, and more signal that Beijing is laying the groundwork for mass disruption.
Read moreMicrosoft Flushes Out ‘Ncurses’ Gremlins
September 16 2023The maintainers of the widely used library recently patched multiple memory corruption vulnerabilities that attackers could have abused to, ahem, curse targets with malicious code and escalate privileges.
Read moreFriday Squid Blogging: Cleaning Squid
September 16 2023Two links on how to properly clean squid. I learned a few years ago, in Spain, and got pretty good at it. As usual, you can also use this squid post...
Read moreLLM Summary of My Book Beyond Fear
September 16 2023Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. I’m particularly interested in a taxonomy of his ethical arguments—please...
Read moreWhy Shared Fate is a Better Way to Manage Cloud Risk
September 16 2023The shared responsibility model was good enough to cover the first years of the cloud revolution, but the model is showing its limitations. Shared fate is a more mature...
Read moreOkta Flaw Involved in MGM Resorts Breach, Attackers Claim
September 16 2023ALPHV/BlackCat ransomware operators have used their leak site to "set the record straight" about the MGM Resorts cyberattack. Meanwhile, more attacks abusing Okta could be likely.
Read moreGreater Manchester Police Hack Follows Third-Party Supplier Fumble
September 16 2023This incident bears notable resemblance to an attack that occurred just last month affecting London's Metropolitan Police, raising concerns over UK cybersecurity safeguards for public safety.
Read more
Recent Comments