Would you like to chat with [un]prompted con about AI security? Follow a thread across every session, brief your team, or just base your research on the knowledge collected?
Would you like to chat with [un]prompted con about AI security? Follow a thread across every session, brief your team, or just base your research on the knowledge collected?
Only just started but it looks good so far - thanks for detailing all this Jeremy!
Excited to share our open source agentic framework for security research, a collaborative framework that lets the community share AI "taskflows”! Read @kevinbackhouse.bsky.social 's blog post for details and a demo. Join us in strengthening open-source security! github.blog/security/com...
This is the labeller for US Government Contributions:
bsky.app/profile/us-g...
Scaling inductive charging by four orders of magnitude, Porsche has achieved 90% efficiency in wireless power transfer for its Cayenne SUV. By designing an 11kW system that adheres to open SAE standards, this engineering feat moves us closer to a much more convenient EV infrastructure.
To be fair, he says as much in another post…
bsky.app/profile/scal...
Have you read the linked post in full though? From a privacy perspective it’s certainly an improvement on how most other platforms do it.
🚨 📖 Final output for this year: I am thrilled to present the summary report from our summer symposium "Reckoning with AI Agents", co-authored with @amyrossarguedas.bsky.social and Linda Eggert.
➡ buff.ly/Ol8Xd7P
I think the ‘via 9to5Google’ reference is just because they were first to report on it, not that they’re actively linked to the project.
I believe this is the thread being referred to…
bsky.app/profile/nome...
🧵1/ Artificial Intelligence could transform UK public services — but it must be introduced responsibly to avoid damaging public trust, experts warn.
A new report by @dianecoyle1859.bsky.social & Wendy Hall calls for urgent action. 👇
www.bennettinstitute.cam.ac.uk/publications...
Kubernetes The Hard Way guides you through bootstrapping a basic Kubernetes cluster with all control plane components running on a single node, and two worker nodes, which is enough to learn the core concepts.
Kubernetes The Hard Way has been updated. I've also resolved most of the open issues and pull requests as I set the stage to add support for both ARM64 and AMD64, making the project compatible with both CPU architectures while continuing to be cloud provider agnostic. github.com/kelseyhighto...
I stand with Ukraine
Proud to live in a country (the Netherlands) that unconditionally supports Ukraine.
Europe needs to re-arm, to support Ukraine and defend itself and democracy.
Ukraine is the one defending Europe from Russian aggression. Ukraine should be part of the EU.
Slava Ukraini 🇺🇦
If your org's approved architecture is based on Zero Trust and you use Teams, here is a nifty chart from Microsoft which lays out your plan. If you store any type of controlled data in your tenant, anywhere, you will fall into the Specialized Security Category.
learn.microsoft.com/en-us/securi...
Want to know AWS’ post quantum crypto plan? 👀 👇
aws.amazon.com/blogs/securi...
The self described “Shodan of AWS” is now live! This is an amazing project from Daniel Grzelak that helps democratize cloud resource enumeration for the masses. Very excited about this!
awseye.com
Crazy interesting paper in many ways:
1) Voice-enabled GPT-4o conducted 2 hour
interviews of 1,052 people
2) GPT-4o agents were given the transcripts & prompted to simulate the people
3) The agents were given surveys & tasks. They achieved 85% accuracy in simulating interviewees real answers!
WHOA! 🤯
We can now configure FQDN based filtering in Defender Firewall without Intune/Defender for Endpoint?
Looks like we can do create these rules via PowerShell or GPO (likely need to update your ADMX templates)
learn.microsoft.com/en-us/window...
If you're looking for the security talks from Kubecon NA 2024, I've added the abstracts and Youtube embeds to talks.container-security.site/categories/#... .
There's also talks going back to 2016 in case you really want to watch a lot of container security videos!
Cyber folks, you can monitor for CVE mentions fright from the Jetstream with websocat & jq:
$ websocat "wss://jetstream1.us-east.bsky.network/subscribe?wantedCollections=app.bsky.feed.post" | jq 'select(.commit.record.text != null) | select(.commit.record.text | test("CVE-\\d{4}-\\d+"))'
ok, let's break it down.
at the core of atproto is the data. it lives own your own computer (or someone hosts it for you). think of it as a hard drive with JSON files on it
data is structured (i.e. has a type), and can references other records on other peoples' computer with a URI like a hyperlink
I'm booting up my bluesky! For those that don't know me: I do security research and detection at Datadog, I currently run the newsletter Detection Engineering Weekly (deteng.io) and I post a lot about threat detection topics
Image from lawsuit filing mentioning the new exploit
Whoa: NSO Group allegedly rolled a #WhatsApp exploit to implant #Pegasus spyware even after WhatsApp sued them.
This previously-unrevealed "Erised" vector was later disabled by WhatsApp.
These un-redacted filings are quite the read. Even some footnotes have scoops. 1/