home.social

#cyberrisk — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cyberrisk, aggregated by home.social.

  1. House Panel Scrutinizes Anthropic's Mythos Amid Cyber Risk Concerns

    A recent closed-door briefing by Anthropic showed lawmakers firsthand how its advanced AI model, Mythos, can swiftly identify and reason through software vulnerabilities, highlighting the urgent need for federal agencies to access cutting-edge US models to stay ahead of cyber threats. This live demo reinforced the importance of…

    osintsights.com/house-panel-sc

    #Ai #CyberRisk #EmergingThreats #HomelandSecurity #NationState

  2. AI Adoption Outpaces Security Policies, Heightens Cyber Risk

    Most organizations are already using AI tools, with 90% of digital trust professionals confirming employees are leveraging them, yet only 38% have a comprehensive policy in place to manage the risks. This disconnect leaves a staggering 25% of organizations with no AI policy at all, heightening cyber risk.

    osintsights.com/ai-adoption-ou

    #AiAdoption #EmergingThreats #DigitalTrust #CyberRisk #GenerativeAi

  3. 🎖️ El Curso de OWASP Top 10 está permanente disponible en el aula virtual para acceso inmediato. 📲 WhatsApp: https://wa.me/51949304030 🌐 https://www.reydes.com/e/Curso_OWASP_TOP_10 #cyberattack #cyberrisk #zerotrust #dataprotection #kalilinux #owasp #cybercrime
  4. 🎖️ El Curso de OWASP Top 10 está permanente disponible en el aula virtual para acceso inmediato. 📲 WhatsApp: https://wa.me/51949304030 🌐 https://www.reydes.com/e/Curso_OWASP_TOP_10 #cyberattack #cyberrisk #zerotrust #dataprotection #kalilinux #owasp #cybercrime
  5. 🎖️ El Curso de OWASP Top 10 está permanente disponible en el aula virtual para acceso inmediato. 📲 WhatsApp: https://wa.me/51949304030 🌐 https://www.reydes.com/e/Curso_OWASP_TOP_10 #cyberattack #cyberrisk #zerotrust #dataprotection #kalilinux #owasp #cybercrime
  6. 🎖️ El Curso de OWASP Top 10 está permanente disponible en el aula virtual para acceso inmediato. 📲 WhatsApp: https://wa.me/51949304030 🌐 https://www.reydes.com/e/Curso_OWASP_TOP_10 #cyberattack #cyberrisk #zerotrust #dataprotection #kalilinux #owasp #cybercrime
  7. Mythos AI: A Shadow Over Financial Systems

    Anthropic's new AI, Mythos, finds software security flaws in seconds. Banks and governments are discussing how to protect systems from potential misuse.

    #AISecurity, #CyberRisk, #BankingTech, #ClaudeMythos, #TechNews

    newsletter.tf/new-ai-mythos-fi

  8. Если гипотеза внезапно подтвердится — последствия будут системными:

    1. Кибербезопасность обнулится как класс
    Если модель уровня Anthropic действительно массово находит уязвимости, то:

    классический bug bounty и аудит теряют смысл

    окно между “найдено” и “эксплуатируется” сокращается почти до нуля

    zero-day станет нормой, а не исключением

    2. Банковский сектор станет первичной целью
    Такие игроки как JPMorgan Chase, Bank of America, Citigroup:

    вынуждены будут изолировать критические системы (air gap / legacy freeze)

    резко увеличат CAPEX на defensive AI

    начнут переход к “закрытым” архитектурам без внешних зависимостей

    3. Гонка AI vs AI
    Microsoft, Apple, Amazon:

    развернут defensive LLM’ы для автоматического патчинга

    появятся системы, где код пишется и сразу же проверяется ИИ

    DevSecOps станет полностью автоматизированным циклом

    4. Государственный уровень (кибервойна)

    спецслужбы получат инструмент для массового вскрытия инфраструктуры

    критическая инфраструктура (энергетика, связь) станет уязвимой в кратчайшие сроки

    появится давление на регулирование и контроль моделей

    5. Конец “доверенного софта”

    любая система без постоянного AI-аудита считается потенциально скомпрометированной

    open-source проекты под риском, если не внедрят автоматическую проверку

    software supply chain станет главной точкой атаки

    ---

    Вывод:
    Если это реально — это не “ещё один ИИ-релиз”, а сдвиг уровня ядерного оружия, только в киберпространстве.
    Но именно поэтому такие вещи почти невозможно скрыть — и пока нет подтверждений, к этому стоит относиться как к сценарию, а не факту.Фраза про «неповоротливую банковскую систему» — это не техническое утверждение, а типичный журналистско-аналитический ярлык, который упрощает реальность.

    Если разложить по сути, банки выглядят “медленными” по сравнению с IT не потому, что они не умеют, а потому что у них другая оптимизационная функция.

    1. Жёсткое регулирование как основной ограничитель

    Крупные банки (например JPMorgan Chase, Bank of America, Citigroup) работают в среде:

    Basel III/IV капиталовые требования

    AML/KYC обязательства

    аудит регуляторов (Fed, OCC, ECB и т.д.)

    Любое изменение:

    должно быть документировано

    верифицировано

    и часто одобрено внешним надзором

    Это автоматически убивает “движение быстро и ломай вещи”.

    ---

    2. Legacy-инфраструктура

    Банки исторически построены на:

    COBOL/мейнфреймах

    десятках интеграционных слоёв

    системах, которым 20–40 лет

    Это не “плохой код”, а:

    критически стабильные системы расчётов

    где ошибка = прямые финансовые потери или системный сбой

    Любая миграция = риск каскадного отказа.

    ---

    3. Стоимость ошибки несопоставима с IT-стартапами

    У банка:

    ошибка в проде = деньги клиентов / системный риск / судебные иски
    У IT-компании:

    ошибка = откат релиза

    Поэтому у банков:

    длинные циклы внедрения

    много уровней проверки

    консервативный риск-менеджмент

    ---

    4. Архитектура “согласованности важнее скорости”

    Банковские системы оптимизированы под:

    консистентность (ACID)

    трассируемость транзакций

    аудит

    А не под:

    быстрые эксперименты

    частые архитектурные сломы

    ---

    5. Но важно: это уже меняется

    Называть банки просто “неповоротливыми” сейчас — упрощение.

    Фактически происходит:

    активная миграция в cloud (Microsoft Azure, AWS и др.)

    внедрение AI для fraud detection

    DevSecOps и continuous compliance

    ---

    Итог

    “Неповоротливость” = не про интеллект или ресурсы.
    Это про инженерный выбор между скоростью и стоимостью системного риска.

    Если хочешь, могу разложить, где именно ИИ реально уже ломает этот баланс (fraud, AML, code security) — там интереснее, чем в мемной версии про “старые банки”.#Anthropic #ClaudeAI #FakeNews #Disinformation #FactCheck #CyberSecurity #AIThreats #BankingSystem #ScottBessent #JamieDimon #OSINT #InfoWar #TechNews #AIReality #CyberRisk #Debunked

  9. For the quants: Here is the execution trace for the C2917 realization.

    Notable steps:

    SEC EDGAR Item 1A fallback used for peer text extraction.

    CAPEC to CWE relationship mapping across the MSFT attack surface.

    Monte Carlo convolution (1,000 trials) across a filtered 3-node vulnerability set.

    Leading CVEs: CVE-2025-10258, CVE-2026-27515, CVE-2025-7015.

    The engine remains stable across 238+ meta-assays.

    #Infosec #CyberRisk #Quant #MSFT #VirensAudit #MonteCarlo #DataScience

  10. For the quants: Here is the execution trace for the C2917 realization.

    Notable steps:

    SEC EDGAR Item 1A fallback used for peer text extraction.

    CAPEC to CWE relationship mapping across the MSFT attack surface.

    Monte Carlo convolution (1,000 trials) across a filtered 3-node vulnerability set.

    Leading CVEs: CVE-2025-10258, CVE-2026-27515, CVE-2025-7015.

    The engine remains stable across 238+ meta-assays.

    #Infosec #CyberRisk #Quant #MSFT #VirensAudit #MonteCarlo #DataScience

  11. For the quants: Here is the execution trace for the C2917 realization.

    Notable steps:

    SEC EDGAR Item 1A fallback used for peer text extraction.

    CAPEC to CWE relationship mapping across the MSFT attack surface.

    Monte Carlo convolution (1,000 trials) across a filtered 3-node vulnerability set.

    Leading CVEs: CVE-2025-10258, CVE-2026-27515, CVE-2025-7015.

    The engine remains stable across 238+ meta-assays.

    #Infosec #CyberRisk #Quant #MSFT #VirensAudit #MonteCarlo #DataScience

  12. For the quants: Here is the execution trace for the C2917 realization.

    Notable steps:

    SEC EDGAR Item 1A fallback used for peer text extraction.

    CAPEC to CWE relationship mapping across the MSFT attack surface.

    Monte Carlo convolution (1,000 trials) across a filtered 3-node vulnerability set.

    Leading CVEs: CVE-2025-10258, CVE-2026-27515, CVE-2025-7015.

    The engine remains stable across 238+ meta-assays.

    #Infosec #CyberRisk #Quant #MSFT #VirensAudit #MonteCarlo #DataScience

  13. For the quants: Here is the execution trace for the C2917 realization.

    Notable steps:

    SEC EDGAR Item 1A fallback used for peer text extraction.

    CAPEC to CWE relationship mapping across the MSFT attack surface.

    Monte Carlo convolution (1,000 trials) across a filtered 3-node vulnerability set.

    Leading CVEs: CVE-2025-10258, CVE-2026-27515, CVE-2025-7015.

    The engine remains stable across 238+ meta-assays.

    #Infosec #CyberRisk #Quant #MSFT #VirensAudit #MonteCarlo #DataScience

  14. Good Read! AI in Cyber Conflict - May not be a panacea for the bad guys.

    AI may be helping to power Cyber Attacks but may lead to lower quality outputs and in fact make detection easier, b/c AI tends to struggle with generating original, creative, and deceptive outputs. AI automation may help improve cyber defenses more than offense.

    "Crucially, AI models excel at detection but struggle with deception. Consequently, offense automation offers efficiency gains yet limited effectiveness gains—and the higher the stakes become, the lower these gains tend to be." lawfaremedia.org/article/the-a #CyberAttack #CyberSecurity #AI #CyberRisk #Security #Risk #Malware #Hackers #CyberCrime #AIAutomation

  15. Recent reporting alleges multiple data exposures across Mexican government systems, affecting a broad range of public institutions.

    If confirmed, the situation illustrates recurring challenges in public-sector security architecture, data segregation, and incident response coordination.

    From an InfoSec perspective, this reinforces the need for layered defenses, regular audits, and breach containment planning.

    Engage in the discussion and follow @technadu for sober, unbiased cybersecurity analysis.

    Source: x.com/ivillasenor/status/20060

    #InfoSec #PublicSectorSecurity #DataProtection #CyberRisk #GovernmentIT #TechNadu

  16. Recent reporting alleges multiple data exposures across Mexican government systems, affecting a broad range of public institutions.

    If confirmed, the situation illustrates recurring challenges in public-sector security architecture, data segregation, and incident response coordination.

    From an InfoSec perspective, this reinforces the need for layered defenses, regular audits, and breach containment planning.

    Engage in the discussion and follow @technadu for sober, unbiased cybersecurity analysis.

    #InfoSec #PublicSectorSecurity #DataProtection #CyberRisk #GovernmentIT #TechNadu

  17. Recent reporting alleges multiple data exposures across Mexican government systems, affecting a broad range of public institutions.

    If confirmed, the situation illustrates recurring challenges in public-sector security architecture, data segregation, and incident response coordination.

    From an InfoSec perspective, this reinforces the need for layered defenses, regular audits, and breach containment planning.

    Engage in the discussion and follow @technadu for sober, unbiased cybersecurity analysis.

    Source: x.com/ivillasenor/status/20060

    #InfoSec #PublicSectorSecurity #DataProtection #CyberRisk #GovernmentIT #TechNadu

  18. Recent reporting alleges multiple data exposures across Mexican government systems, affecting a broad range of public institutions.

    If confirmed, the situation illustrates recurring challenges in public-sector security architecture, data segregation, and incident response coordination.

    From an InfoSec perspective, this reinforces the need for layered defenses, regular audits, and breach containment planning.

    Engage in the discussion and follow @technadu for sober, unbiased cybersecurity analysis.

    Source: x.com/ivillasenor/status/20060

    #InfoSec #PublicSectorSecurity #DataProtection #CyberRisk #GovernmentIT #TechNadu

  19. Recent reporting alleges multiple data exposures across Mexican government systems, affecting a broad range of public institutions.

    If confirmed, the situation illustrates recurring challenges in public-sector security architecture, data segregation, and incident response coordination.

    From an InfoSec perspective, this reinforces the need for layered defenses, regular audits, and breach containment planning.

    Engage in the discussion and follow @technadu for sober, unbiased cybersecurity analysis.

    Source: x.com/ivillasenor/status/20060

    #InfoSec #PublicSectorSecurity #DataProtection #CyberRisk #GovernmentIT #TechNadu

  20. Gen Digital researchers have disclosed GhostPairing, a technique that leverages WhatsApp’s multi-device functionality via social engineering to enable persistent, low-noise access to user communications.

    The case highlights how legitimate features can become attack surfaces when paired with deception rather than technical exploitation.

    Open discussion: how can platforms mitigate abuse of trusted workflows without degrading user experience?

    Follow TechNadu for objective threat analysis and security research updates.

    Source: techrepublic.com/article/news-

    #InfoSec #ThreatResearch #SocialEngineering #MessagingSecurity #PrivacyEngineering #CyberRisk

  21. Thank you to the Cyber Insurance News & Information Podcast and host Martin Hinton for having our CMO Kimber Spradlin on the show recently to talk about how good #cybersecurity communication, clear language, and better logging can cut cyber risk. 🚫⚠️

    Listen in and learn how you can normalize log data, which will result in reduced alert noise and a better ability to see real incidents. 👀 Plus, dig into:
    ❓ Why cybersecurity communication must reach every employee—not only the SOC
    🪵 How log management supports audits, retention rules, and cyber insurer expectations
    🤖 The fundamental role of #AI in detection versus marketing hype
    🧑‍💻 MFA, identity, patching, and everyday cyber hygiene
    🔍 Digital literacy, deepfakes, and teaching people to spot scams
    🤔 How to frame cyber risk in business terms that boards understand

    This is a great listen for those who work in #cybersecurity, cyber insurance, IT leadership, or communications. Get practical ideas to sharpen your cybersecurity communication and build a stronger security culture.

    🎧 open.spotify.com/episode/2OFmN #CyberInsurance #CyberRisk #SIEM

  22. Researchers disclosed that delivery-receipt behavior in WhatsApp and Signal can be leveraged to observe device activity using silent reactions, edits, and deletions.

    Only a phone number is needed, and there’s no user control to disable receipts.
    What types of safeguards would you consider appropriate here?

    Source: gbhackers.com/hackers-exploit-

    Follow us for measured, research-driven cybersecurity reporting.

    #InfoSec #Cybersecurity #MobileSecurity #ThreatResearch #Privacy #MessagingSecurity #SecurityAwareness #TechNews #CyberRisk #DigitalSafety

  23. Law Firms Are Now Prime Targets for Cybercrime – Are You Ready?

    Legal practices across the UK are facing an unprecedented surge in cyber attacks.

    Why? Because firms hold exactly what cybercriminals want:

    ✅ Confidential client data
    ✅ High-value financial transactions
    ✅ Systems not built for modern threats

    The result? Law firms now rank among the most targeted professional service sectors.

    In my latest article, I break down why legal firms are in the crosshairs, the attack techniques most commonly used, the unique challenges legal practices face (like protecting professional privilege) - And - most importantly - what firms can do to stay secure, resilient, and compliant.

    This isn’t theory. These are practical, real-world security steps for law firms that handle sensitive data, tight deadlines, and complex regulations.

    📚 If you’re a solicitor, partner, or law firm IT lead, this guide is for you.

    👉 Read the full article here: paulreynolds.uk/cybersecurity-

    🛡️ Want help building a defensible cybersecurity position tailored for legal practice? DM or connect - we make cyber risk manageable, even if your firm doesn’t have a CISO.

    #CyberSecurity #LegalTech #LawFirmSecurity #SRA #GDPR #CyberRisk #ProfessionalServices #BusinessEmailCompromise #Ransomware #DataProtection #PaulReynolds #YourDigitalCTO