AI Security
What is the role of us security professionals when it comes to AI powered systems?



What is the role of us security professionals when it comes to AI powered systems?
This post is a great example, that a spear phishing attack also works in the offline world. It does not always have to be an e-mail! Thank you to Marc Torke for sharing this. The letter in the picture is claiming to come from an official German court and was sent to a newly founded…
Step 1: Plan Security Management: This is the first step in the process, indicating the importance of planning and managing security measures effectively. Step 2: Security Risk Analysis (IEC 62443-3-2): The second step involves conducting a security risk analysis in accordance with the IEC 62443-3-2 standard. This step is crucial for identifying potential security risks…
The newly discovered xz-utils backdoor, which was published yesterday (NVD – CVE-2024-3094 (nist.gov)) also affects one of the Linux distributions most used by penetration testers: Kali Linux. ❗Make sure, that you are updating your Kali installations as fast as possible, especially when you updated them before in the time frame between 26.03.2024 and 29.03.2024. 💡For…
There is a job advert for a Windows 3.11 administrator role in the rail industry doing the rounds on the internet right now – e.g. here at Heise. It’s often accompanied by the question why such old systems are still in use – it’s 2024! Yes, this is the reality of OT systems – not…
Identity is the new perimeter. What does this mean in times of AI – both on the offensive and the defensive side? 💡 Rohit Ghai talks about this in an inspiring keynote at RSA Conference 2023. Well worth watching! https://www.youtube.com/watch?v=plMlFAxHJ6s
What’s the state of your password security? Do you consider the length and complexity and don’t use the same password for multiple services? Post | LinkedIn