What is an exploit?
👩🎓 Learn another security term this Wednesday: What is an exploit?
👩🎓 Learn another security term this Wednesday: What is an exploit?
Incidents such as the blackout in parts of Berlin lasting several days emphasize the importance of personal preparation for crisis and disaster. The German BBK has published checklists for this purpose. The BBK is the German Federal Office of Civil Protection and Disaster Assistance. Personally I don’t prefer to check off such a list on…
Since February 2022, cybersecurity threats to railways in the European Union have changed fundamentally: nation-state actors are no longer a theoretical possibility, but a dangerous reality. Russia is trying to sabotage European railways, warns Prague 💡 We therefore need to increase the resilience of the railway system against attacks by very capable attackers with access…
We are already seeing real-world applications of artificial intelligence in the rail sector. Deutsche Bahn is using artificial intelligence to reduce delays on its network. My prediction: This is just the beginning of ML/AI applications in our sector. We will see machine learning and AI algorithms becoming more and more widespread in the coming years….
What is the role of us security professionals when it comes to AI powered systems?
A Military-Type Explosive Sent Via USB Drive (gbhackers.com) ⚡ So far, USB-Killer devices were used by attackers (or pentesters) to disable or destroy devices with USB interfaces by discharging a high power electrical shock into the data lines of the USB port. ❗ If you find a USB stick somewhere: Do not plug it into…
An attack on the software build pipeline can to some degree be compared to an attack on your supply chain. Your code can be 100% reviewed, but still the end product will contain malicious code – a very dangerous situation. Defending software build pipelines from malicious attack – NCSC.GOV.UK