Security Vulnerabilities in Snipping Tools
March 28 2023Both Google’s Pixel’s Markup Tool and the Windows Snipping Tool have vulnerabilities that allow people to partially recover content that was edited out of images.
Read moreChatGPT Privacy Flaw
March 22 2023OpenAI has disabled ChatGPT’s privacy history, almost certainly because they had a security flaw where users were seeing each others’ histories.
Read moreNew National Cybersecurity Strategy
March 6 2023Last week, the Biden administration released a new National Cybersecurity Strategy (summary here). There is lots of good commentary out there....
Read moreWhat Will It Take?
February 14 2023What will it take for policy makers to take cybersecurity seriously? Not minimal-change seriously. Not here-and-there seriously. But really seriously. What will it take for policy makers to take...
Read moreAttacking Machine Learning Systems
February 6 2023The field of machine learning (ML) security—and corresponding adversarial ML—is rapidly advancing as researchers develop sophisticated techniques to perturb, disrupt, or steal the ML model or data. It’s a...
Read moreNIST Is Updating Its Cybersecurity Framework
January 30 2023NIST is planning a significant update of its Cybersecurity Framework. At this point, it’s asking for feedback and comments to its concept paper.
- Do the proposed changes reflect the... Read more
US Cyber Command Operations During the 2022 Midterm Elections
January 25 2023The head of both US Cyber Command and the NSA, Gen. Paul Nakasone, broadly discussed that first organization’s offensive cyber operations during the runup to the 2022 midterm...
Read moreThe problem with anniversaries is that there's an almost infinite number of them every day...
Read moreBreaking the Zeppelin Ransomware Encryption Scheme
November 21 2022Brian Krebs writes about how the Zeppelin ransomware encryption scheme was broken:
The researchers said their break came when they understood that while Zeppelin used three different types of...
Read more

Recent Comments