Fact or fiction?
programs.com/resources/op...
@securelybuilt
Securely Built is on the hunt for insecurity in the world where we can leverage our decades of experience in cyber and engineering to banish insecure technology from whence it came. Find out more at: securelybuilt.com
Check out the Short course on AppSec at: www.udemy.com/course/quick...
And if you really want to go deep on AppSec check out the best selling course chock full of all things AppSec at:
www.udemy.com/course/appli...
Making updates to some of my #training courses when I pick up faint snoring in the background.
Yes, she snores.
Should I go to HR about my coworker who sleeps 16 hours a day.
If you're looking for some training on AppSec see the link below in the comments.
#appsec #cybersecurity
Burning the midnight oil is what we used to call it.
Today, it's 10.8 extra hours per week.
That's what cybersecurity professionals are averaging beyond their contracted schedules, according to new survey data. Nearly half are logging 11+ overtime hours weekly. One in five is pushing past 16.
"Across every domain β land, air, sea, cyber β the U.S. Joint Force delivered synchronized and layered effects."
That's the Chairman of the Joint Chiefs publicly putting cyber operations on equal footing with traditional warfare in the Iran conflict.
#cybersecurity #nationstate #cyberwarfare
The "everyone else is doing it, so why not us" argument.
The collective action problem has always existed. Why unilaterally disarm if others won't. Even when you know the risks of doing so are plentiful and potentially catastrophic.
User compromise still reigns supreme when it comes to cyberattacks.
#socialengineering #cybersecurity
thehackernews.com/2026/02/unso...
Like sands through the hourglass, so are the days of our lives.
#databreach #cybersecurity
"90% of the code we use in our applications comes from OSS contributors."
So when AI coding assistants started generating entire applications from a single prompt... why would this be any different?
Because it's worse.
#AppSec #AISecurity #SecurelyBuilt #AIAgents #DevSecOps
I am, by no means, sticking up for China here. But....we use technology that is spying on us on a daily basis. Our phones, cars, IoT devices, health trackers, TVs, streaming devices, etc...
Most are not vetted prior to being invasive.
#cybersecurity #apt
The Morris Worm for the #AI Agent Era?
Researchers are predicting the rise of a kind of self-replicating adversarial #prompt among networks of #AIagents calling it a βprompt wormβ or a βprompt virus.β Self-replicating instructions that could spread through networks of communicating AI agents.
Because of course.....
#ai #misconfiguration #cybersecurity
On December 29, 2025, coordinated #cyberattacks struck over 30 #wind and #solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers in #Poland. The attacks have been attributed to Static Tundra, a threat cluster linked to Russia's FSB.
Are local models the new IoT?
If you are running Ollama locally (as I do) be sure that you have the service bound to the localhost address and not the public binding of 0.0.0[.]0 or a public interface.
thehackernews.com/2026/01/rese...
AWS is deprecating Server-Side Encryption with Customer-provided keys (SSE-C) in April. Perhaps good riddance for some. This obscure S3 feature has become a tool for ransomware operators.
Cybersecurity researchers have discovered two malicious Microsoft VS Code extensions that are advertised as AI-powered coding assistants, but also harbor covert functionality to siphon developer data to China-based servers.
There have been 1.5 million installs already, and they are still available.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
Weβre moving past the novelty phase toward a "Digital Factory" modelβwhere small, specialized models (SLMs) do the heavy lifting while LLMs act as the high-level consultants.
Read my latest on the future of AI utility:
You've heard of Ransomware-as-a-Service, and DDoS-as-a-Service.
Behold....cybercrimeAI-as-a-service:
Cybercrime has entered its AI era, with criminals now using weaponized language models and deepfakes as cheap, off-the-shelf infrastructure rather than experimental tools, according to researchers
Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta.
thehackernews.com/2026/01/blac...
I guess that's one way to "limit the problem". Just make people pay for it π€·
Grok has yanked its image-generation toy out of the hands of most X users after the UK government openly weighed a ban over the AI feature that "undressed" people on command.β¦
Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution.
I built an AI training course for people who want to understand LLM #cybersecurity without hype. Whatβs the #1 thing you wish more #AI courses explained clearly?
Without a doubt!
Check out the latest article on threat modeling of cloud/hybrid environments.
open.substack.com/pub/securely...
Happy Holidays! My book "Threat Modeling Best Practices" is $9.99 for a limited timeβonly via direct order from Packt.
Learn to model threats in an increasingly insecure environment.
Don't miss out!
www.packtpub.com/en-us/produc...
#Cybersecurity #MicrosoftSecurityCopilot #HolidayDeals
A successful 2025!