Password security
What’s the state of your password security? Do you consider the length and complexity and don’t use the same password for multiple services?
What’s the state of your password security? Do you consider the length and complexity and don’t use the same password for multiple services?
On the way to the Verband Deutscher Eisenbahn-Ingenieure e.V. (VDEI) conference about railway cybersecurity where I’ll be speaking tomorrow… of course by train!
I’m happy to share that last weekend I passed the Microsoft Certified: Azure AI Fundamentals certification exam. As a rail security professional, why am I sitting for an AI-related exam when I’m not a data scientist? The rail industry is moving more and more towards interconnected technical solutions. Of course, we are not yet seeing…
A Military-Type Explosive Sent Via USB Drive (gbhackers.com) ⚡ So far, USB-Killer devices were used by attackers (or pentesters) to disable or destroy devices with USB interfaces by discharging a high power electrical shock into the data lines of the USB port. ❗ If you find a USB stick somewhere: Do not plug it into…
As with any new technology, the “other side” is trying to figure out how to use it to their advantage. The normal commercial versions of LLMs have barriers built in to prevent the creation of malware code or phishing mails, for example. If you remove these barriers, you get the output that we as security…
How well do you know your IT? Learn which questions to ask!
Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…