Aggregator
CVE-2022-1540 | PostmagThemes Demo Import Plugin up to 1.0.7 on WordPress Imported File unrestricted upload
CVE-2009-2541 | Sony Playstation 3 Web Browser resource management (EDB-9160 / XFDB-52875)
Чёрные дыры-близнецы больше не обманут астрофизиков: у компьютера теперь есть ИИ-шпаргалка
Catawba Two Kings Casino Falls Victim to ANUBIS Ransomware
Один файл — и сгорел весь сервер: что случилось с American Megatrends
No Hidden Trade-Offs: Why Measuring False Positives & Negatives Is the Only Way to Assess AI Bot Protection
The only way to assess AI bot protection? Measure both false positives and false negatives. Anything less risks security gaps or user disruption.
The post No Hidden Trade-Offs: Why Measuring False Positives & Negatives Is the Only Way to Assess AI Bot Protection appeared first on Security Boulevard.
«Advanced Chat Privacy»: WhatsApp запретил выносить сообщения из чатов
Node.js Test CI Security Incident
Silent New Threat Actor
Silent
YouTube 用户上传了 20 万亿则视频
Без шума, без писем, без следов: украденный логин работает тише любого трояна
Defensie maakt vaart met aanschaf nieuw materieel
Regulating AI Behavior with a Hypervisor
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.”
Abstract:As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To mitigate this risk, we propose Guillotine, a hypervisor architecture for sandboxing powerful AI models—models that, by accident or malice, can generate existential threats to humanity. Although Guillotine borrows some well-known virtualization techniques, Guillotine must also introduce fundamentally new isolation mechanisms to handle the unique threat model posed by existential-risk AIs. For example, a rogue AI may try to introspect upon hypervisor software or the underlying hardware substrate to enable later subversion of that control plane; thus, a Guillotine hypervisor requires careful co-design of the hypervisor software and the CPUs, RAM, NIC, and storage devices that support the hypervisor software, to thwart side channel leakage and more generally eliminate mechanisms for AI to exploit reflection-based vulnerabilities. Beyond such isolation at the software, network, and microarchitectural layers, a Guillotine hypervisor must also provide physical fail-safes more commonly associated with nuclear power plants, avionic platforms, and other types of mission critical systems. Physical fail-safes, e.g., involving electromechanical disconnection of network cables, or the flooding of a datacenter which holds a rogue AI, provide defense in depth if software, network, and microarchitectural isolation is compromised and a rogue AI must be temporarily shut down or permanently destroyed. ...
The post Regulating AI Behavior with a Hypervisor appeared first on Security Boulevard.
UK Retailer Marks & Spencer Plays Incident Response Straight
It's rare to see a corporation lauded for its hacking incident communications, but British retailer Marks & Spencer has executed an admirable version of what informing the world of bad news should look like. M&S notified customers directly about the cybersecurity incident.
Live Webinar | Resilience in Crisis: Recovering Your Minimum Viable Company Fast
FBI Pushes Global Crackdowns as Cybercrime Losses Soar
The FBI strongly supported recent efforts to expand information sharing with international partners and launch new efforts to curb global cybercrime, including working with Indian authorities to combat cyber-enabled financial crimes and transnational call center fraud.
Socket Acquires Startup Coana to Boost Code Risk Precision
With Coana's team and tools, Socket aims to strengthen its platform's ability to identify actionable vulnerabilities. The integration will help security teams eliminate busywork, focusing on high-impact issues using precomputed reachability data from open source codebases.
UK Retailer Marks & Spencer Plays Incident Response Straight
It's rare to see a corporation lauded for its hacking incident communications, but British retailer Marks & Spencer has executed an admirable version of what informing the world of bad news should look like. M&S notified customers directly about the cybersecurity incident.