security

Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

AI projects face security challenges that stem from the difficulties in ensuring model integrity and reliability. The Sleepy Pickle and HuggingFace models' silent backdoors are notable cases of such model security loopholes. They are evidence of the possibility of influencing an AI model's behavior directly or indirectly through malicious or authorized model modifications, manipulations, and adversarial attacks. These model breaches stem from the blind spots that exist during the development and post-development of AI projects. This lack of visibility leaves AI models and data vulnerable to these security compromises. A recent survey by the Linux Foundation advocates adopting transparent and…
Read More
Proton Pass now supports Touch ID and Windows Hello biometric logins

Proton Pass now supports Touch ID and Windows Hello biometric logins

Proton’s password manager is gradually catching up with rivals like 1Password. The company, known initially for its encrypted email and VPN services, added biometric authentication to its Proton Pass app, which came out of beta earlier this year. The feature works with Touch ID on macOS and Windows Hello on Microsoft’s desktop OS.Like with many other services, biometric authentication lets Proton Pass users quickly unlock the security app using their fingerprint or face without typing the login password every time. However, it isn’t available for free users: Only those on a Pass Plus plan (and above) get access. The minimum…
Read More
Cryptography #0 – Essential Concepts

Cryptography #0 – Essential Concepts

The importance of cryptography goes beyond just understanding why it's cool, but also can be the difference between you being a good or bad dev in the long run. Any respectable system, especially those dealing with user data, will need some type of security, and often it’s in your hands as a dev. So I decided to write this series of articles about cryptography, so you can understand a bit more about the concepts and how everything works! Let’s start with a simple article on the main terms and how they work, and then we'll increase the difficulty with more…
Read More
The End of X (Or, It Should Be): How Elon Killed Twitter

The End of X (Or, It Should Be): How Elon Killed Twitter

When Elon Musk announced his intention to purchase Twitter in April 2022, he did so with grand promises. He pledged to tackle the platform's pervasive bot problem, ensure free speech, and improve overall user experience. However, as the dust settles, it's clear that these promises remain largely unfulfilled. Instead, the transformation of Twitter into "X" has introduced new issues, exacerbated old ones, and left users questioning the platform's future. The Bot Problem: Worse Than Ever One of Musk's primary reasons for acquiring Twitter was his desire to eliminate spam bots, which he claimed plagued the platform. In 2022, Musk estimated…
Read More
CrowdStrike Faces a Potential Tsunami of Lawsuits. Only the Fine Print Can Save It, Experts Say

CrowdStrike Faces a Potential Tsunami of Lawsuits. Only the Fine Print Can Save It, Experts Say

On July 19, Jonathan Cardi and his family watched as the departures board at Raleigh-Durham International Airport in North Carolina, turned from green to a sea of red. “Oh my gosh, it was insane,” says Cardi. “Delayed, delayed, delayed, delayed.”Cardi, a law professor at Wake Forest University and a member of the American Law Institute, was due to fly with Delta Airlines to a conference in Fort Lauderdale, Florida. With thousands of other travelers, he spent the day lining up as staff kept telling people that flights “would be taking off any minute,” he recalls. But when it became clear…
Read More
Simulating a Privelege Escalation attack to Test Your Sentinel and Defender Setup (Final)

Simulating a Privelege Escalation attack to Test Your Sentinel and Defender Setup (Final)

Introduction This is the final post in our series on setting up Sentinel and Defender for threat detection. In previous posts, we established a sentinel and defender, populated it with units, connected it to a VM, and created an analytic rule to notify a user when an incident occurs. Now, let's test the entire system by simulating a privilege escalation attack. Understanding the Attack:A privilege escalation attack aims to grant unauthorized users higher-level privileges. In this simulation, we'll create a new user account and then elevate it to the administrators group. Steps: Locate the Target VM: Access the Windows VM…
Read More
Belgian researchers found a huge privacy hole in six dating apps

Belgian researchers found a huge privacy hole in six dating apps

TechCrunch reported that a group of researchers from the university KU Leuven in Belgium identified six popular dating apps that malicious users can use to pinpoint the near-exact location of other users. Dating apps including Hinge, Happn, Bumble, Grindr, Badoo and Hily all exhibited some form of “trilateration” that could expose users’ approximate locations, which prompted some of the apps to take action and tighten their security, according to the published paper.The term “trilateration” refers to a three-point measurement used in GPS to determine the relative distance to a target. The six named apps fell into one of three categories…
Read More
Can ChatGPT-4o Be Trusted With Your Private Data?

Can ChatGPT-4o Be Trusted With Your Private Data?

Open AI says this data is used to train the AI model and improve its responses, but the terms allow the firm to share your personal information with affiliates, vendors, service providers, and law enforcement. “So it’s hard to know where your data will end up,” says Love.OpenAI’s privacy policy states that ChatGPT does collect information to create an account or communicate with a business, says Bharath Thota, a data scientist and chief solutions officer of analytics practice at management consulting firm Kearney, which advises firms on managing and using AI data to power new revenue streams.Part of this data…
Read More
Why Businesses Rely on CrowdStrike for Cybersecurity

Why Businesses Rely on CrowdStrike for Cybersecurity

In today's digital age, cybersecurity has become a cornerstone of our interconnected world. With the vast amount of data being transmitted every second, securing this information is paramount. Among the many cybersecurity companies, CrowdStrike has emerged as a leader in providing robust security solutions. But why is the internet not secure without CrowdStrike? To understand this, we must delve into the unique aspects of CrowdStrike’s offerings and their impact on internet security, as well as the importance of the companies that rely on CrowdStrike for their cybersecurity needs. What is CrowdStrike? CrowdStrike is a cybersecurity technology company founded in 2011…
Read More
Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World

Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World

Banks, airports, TV stations, hotels, and countless other businesses are all facing widespread IT outages, leaving flights grounded and causing widespread disruption, after Windows machines have displayed errors worldwide.In the early hours of Friday, companies in Australia running Microsoft’s Windows operating system started reporting devices showing Blue Screens of Death (BSODs). Shortly after, reports of disruptions started flooding in from around the world, including from the UK, India, Germany, the Netherlands, and the US: TV station Sky News went offline, and US airlines United, Delta, and American Airlines issued a “global ground stop” on all flights.The widespread Windows outages have…
Read More
No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.