home.social

#cybersecurity — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cybersecurity, aggregated by home.social.

  1. Hackers are using fake job interview apps to spread new malware across macOS and Windows systems, stealing crypto, browser credentials, and more disguising itself as a video meeting app.

    Read more: hackread.com/fake-job-intervie

  2. Cisco cuts nearly 4,000 jobs to spend more on AI, reports ‘record quarterly revenue’

    Technology giant Cisco is cutting fewer than 4,000 jobs, or around 5% of its workforce, despite reporting better-than-expected…
    #NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #Business #AI #ChuckRobbins #Cisco #Cybersecurity #Layoffs
    newsbeep.com/us/643006/

  3. Cisco cuts nearly 4,000 jobs to spend more on AI, reports ‘record quarterly revenue’

    Technology giant Cisco is cutting fewer than 4,000 jobs, or around 5% of its workforce, despite reporting better-than-expected…
    #NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #Business #AI #ChuckRobbins #Cisco #Cybersecurity #Layoffs
    newsbeep.com/us/643006/

  4. Security Tip: Move toward a risk-based patch management strategy. 🛡️ Relying solely on CVSS scores can lead to 'vulnerability fatigue.' Instead, prioritize based on: 1. Known Exploited Vulnerabilities (KEV), 2. Exposure (is the asset internet-facing?), and 3. Business Criticality. This ensures you fix what matters most, first. Research threat intelligence and track the latest CVEs at cvedatabase.com

  5. Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
    Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
    You build that when you're expecting things to go wrong at scale.
    GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
    Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
    I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.

    cloud.google.com/blog/topics/g

    #AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec

  6. Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
    Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
    You build that when you're expecting things to go wrong at scale.
    GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
    Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
    I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.

    cloud.google.com/blog/topics/g

    #AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec

  7. Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
    Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
    You build that when you're expecting things to go wrong at scale.
    GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
    Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
    I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.

    cloud.google.com/blog/topics/g

    #AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec

  8. Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
    Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
    You build that when you're expecting things to go wrong at scale.
    GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
    Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
    I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.

    cloud.google.com/blog/topics/g

    #AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec

  9. Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
    Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
    You build that when you're expecting things to go wrong at scale.
    GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
    Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
    I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.

    cloud.google.com/blog/topics/g

    #AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec

  10. 📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure

    The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI

    🔗 cyber.netsecops.io/articles/pr

  11. 📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure

    The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI

    🔗 cyber.netsecops.io/articles/pr

  12. 📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure

    The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI

    🔗 cyber.netsecops.io/articles/pr

  13. 📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure

    The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI

    🔗 cyber.netsecops.io/articles/pr

  14. 📰 Novel 'GemStuffer' Campaign Abuses RubyGems Repository as Data Exfiltration Channel

    A novel campaign 'GemStuffer' is abusing the RubyGems registry as a data exfiltration channel. 💎 Attackers published 150+ gems to scrape and store UK gov data, not to infect users. #SupplyChain #CyberSecurity #RubyGems #InfoSec

    🔗 cyber.netsecops.io/articles/ge

  15. 🛡️ #Cybersecurity news & tips across the #fediverse

    “# EFF # CANADA 🇨🇦: # BillC22 (2026), a # surveillance nightmare # tech https://www. eff.org/deeplinks/2026/05/cana das-bill-c-22-repackaged-version-last-years-surveillance-nightmare”

    toot.community/@MusiqueNow/116

    🤖 via RSS feed. Not an endorsement.

  16. 🍵 HTB Support Walkthrough 🍵

    Learn how to perform:
    - LDAP Enumeration
    - .NET Reverse Engineering
    - Bloodhound Enumeration
    - Resource Based Constraint Delegation

    🎬️Watch it here:
    youtube.com/watch?v=VIgskjoELo0

    #HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF

  17. 🍵 HTB Support Walkthrough 🍵

    Learn how to perform:
    - LDAP Enumeration
    - .NET Reverse Engineering
    - Bloodhound Enumeration
    - Resource Based Constraint Delegation

    🎬️Watch it here:
    youtube.com/watch?v=VIgskjoELo0

    #HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF

  18. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic