Protecting America’s cybersecurity demands showing our teeth

Deterring U.S. adversaries from attacking American infrastructure requires making clear that the United States can strike back in kind. 

The post Protecting America’s cybersecurity demands showing our teeth appeared first on CyberScoop.

Continue reading Protecting America’s cybersecurity demands showing our teeth

The Hacking of Culture and the Creation of Socio-Technical Debt

Culture is increasingly mediated through algorithms. These algorithms have splintered the organization of culture, a result of states and tech companies vying for influence over mass audiences. One byproduct of this splintering is a shift from imperfect but broad cultural narratives to a proliferation of niche groups, who are defined by ideology or aesthetics instead of nationality or geography. This change reflects a material shift in the relationship between collective identity and power, and illustrates how states no longer have exclusive domain over either. Today, both power and culture are increasingly corporate…

Continue reading The Hacking of Culture and the Creation of Socio-Technical Debt

LLMs’ Data-Control Path Insecurity

Back in the 1960s, if you played a 2,600Hz tone into an AT&T pay phone, you could make calls without paying. A phone hacker named John Draper noticed that the plastic whistle that came free in a box of Captain Crunch cereal worked to make the right sound. That became his hacker name, and everyone who knew the trick made free pay-phone calls.

There were all sorts of related hacks, such as faking the tones that signaled coins dropping into a pay phone and faking tones used by repair equipment. AT&T could sometimes change the signaling tones, make them more complicated, or try to keep them secret. But the general class of exploit was impossible to fix because the problem was general: Data and control used the same channel. That is, the commands that told the phone switch what to do were sent along the same path as voices…

Continue reading LLMs’ Data-Control Path Insecurity

Europol Hacked? IntelBroker Claims Major Law Enforcement Breach

By Waqas
Notorious hacker IntelBroker claims a major data breach at Europol. Allegedly, sensitive data including employee info, source code, and operational documents were compromised. Europol has yet to confirm the breach. Could this expose ongoing in… Continue reading Europol Hacked? IntelBroker Claims Major Law Enforcement Breach

Microsoft organizational changes seek to address security failures

The company says securing its products is its top priority after a series of damaging, embarrassing breaches. 

The post Microsoft organizational changes seek to address security failures appeared first on CyberScoop.

Continue reading Microsoft organizational changes seek to address security failures

Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape

A new report by cyber security firm Radware identifies the four main impacts of AI on the threat landscape emerging this year. Continue reading Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape