Patrick C Miller's Avatar

Patrick C Miller

@patrickcmiller

Critical Infrastructure & Industrial Security Advisor. Ampyx Cyber CEO. Public speaker. Airport dweller. Recovering regulator. BEERISAC member. CCI US Coordinator. Former SANS Instructor. #ICS #OT #NERCCIP #NIST #IEC62443 #NIS2 #CRA #SlavaUkraini

2,096
Followers
1,157
Following
23,952
Posts
19.08.2023
Joined
Posts Following

Latest posts by Patrick C Miller @patrickcmiller

Preview
'InstallFix' Attacks Spread Fake Claude Code Sites The cyberattacks blend malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces.

'InstallFix' Attacks Spread Fake Claude Code Sites www.darkreading.com/cloud-securi...

10.03.2026 20:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Russia-linked hackers appear on Iran war’s cyber front, but their impact is murky Some experts question the significance of pro-Russia β€œhacktivist” groups.

Russia-linked hackers appear on Iran war’s cyber front, but their impact is murky www.nextgov.com/cybersecurit...

10.03.2026 19:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
ShinyHunters Hackers Threaten 400 Firms Over Stolen Salesforce Data Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

ShinyHunters Hackers Threaten 400 Firms Over Stolen Salesforce Data hackread.com/shinyhunters...

10.03.2026 19:12 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
HPE warns of critical AOS-CX flaw allowing admin password resets Hewlett Packard Enterprise (HPE) has patched multiple security vulnerabilities in the Aruba Networking AOS-CX operating system, including several authentication and code execution issues.

HPE warns of critical AOS-CX flaw allowing admin password resets www.bleepingcomputer.com/news/securit...

10.03.2026 18:42 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Crims hit EV charger firm ELECQ, steal customer contact data Exclusive: An attack on the company’s AWS platform may have exposed customers' names and home addresses

Crims hit EV charger firm ELECQ, steal customer contact data www.theregister.com/2026/03/09/r...

10.03.2026 18:12 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
AI agent hacked McKinsey chatbot for read-write access : David and Goliath…but with AI agents

AI agent hacked McKinsey chatbot for read-write access www.theregister.com/2026/03/09/m...

10.03.2026 17:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Kremlin hackers attempting to compromise Signal, WhatsApp accounts globally Russian state hackers are carrying out a global campaign to compromise Signal and WhatsApp accounts belonging to government officials and military personnel, Dutch intelligence warned Monday.

Kremlin hackers attempting to compromise Signal, WhatsApp accounts globally therecord.media/russian-hack...

10.03.2026 17:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CISA: Recently patched Ivanti EPM flaw now actively exploited CISA flagged a high-severity Ivanti Endpoint Manager (EPM) vulnerability as actively exploited in attacks and ordered U.S. federal agencies to patch systems within three weeks.

CISA: Recently patched Ivanti EPM flaw now actively exploited www.bleepingcomputer.com/news/securit...

10.03.2026 16:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CISA shortens patch deadline for critical Ivanti, SolarWinds bugs The Cybersecurity and Infrastructure Security Agency (CISA) gave all federal civilian agencies until Thursday to patch CVE-2025-26399 β€” a critical vulnerability impacting the popular SolarWinds Web…

CISA shortens patch deadline for critical Ivanti, SolarWinds bugs therecord.media/cisa-shorten...

10.03.2026 16:12 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
European Commission opens consultation on draft guidance to help manufacturers and developers comply with CRA - Industrial Cyber European Commission opens consultation on draft guidance to help manufacturers and developers comply with CRA.

European Commission opens consultation on draft guidance to help manufacturers and developers comply with CRA - Industrial Cyber industrialcyber.co/threats-atta...

10.03.2026 15:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
US National Cyber Strategy calls for government–industry coordination to boost offensive and defensive capabilities - Industrial Cyber US National Cyber Strategy calls for government–industry coordination to boost offensive and defensive capabilities

US National Cyber Strategy calls for government–industry coordination to boost offensive and defensive capabilities - Industrial Cyber industrialcyber.co/news/us-nati...

10.03.2026 15:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 2
Preview
What cybersecurity actually does for your business Strong cybersecurity creates value that may not be immediately obvious or measurable. Here's where to look forit.

What cybersecurity actually does for your business www.welivesecurity.com/en/business-...

10.03.2026 14:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
DeepRare outperforms doctors in a rare disease diagnosis study DeepRare AI system outperforms doctors at diagnosing rare diseases with 64.4% accuracy on first attempt. Find more about the study.

How an AI system beat experienced doctors at diagnosing rare diseases thenextweb.com/news/how-an-...

10.03.2026 14:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues OpenAI launches Codex Security AI agent that scanned 1.2M commits, finding 792 critical and 10,561 high-severity vulnerabilities in open-source projec

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues thehackernews.com/2026/03/open...

10.03.2026 13:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
OpenAI delays ChatGPT’s β€˜adult mode’ again | TechCrunch The feature, which will give verified adult users access to erotica and other adult content, had already been delayed from December.

OpenAI delays ChatGPT’s β€˜adult mode’ again techcrunch.com/2026/03/07/o...

10.03.2026 13:12 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Critical Nginx UI flaw CVE-2026-27944 exposes server backups Nginx UI flaw CVE-2026-27944 lets attackers download and decrypt server backups without authentication, exposing sensitive data.

Critical Nginx UI flaw CVE-2026-27944 exposes server backups securityaffairs.com/189123/secur...

10.03.2026 12:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
New Social Security Scam Emails Use Fake Tax Documents to Hijack PCs Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

New Social Security Scam Emails Use Fake Tax Documents to Hijack PCs hackread.com/social-secur...

10.03.2026 12:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Trump’s cyber strategy emphasizes offensive operations, deregulation, AI The White House unveiled a cybersecurity strategy built around six pillars, prioritizing offensive operations, AI adoption, and deregulation, while leaving critics to question whether cutting red…

Trump’s cyber strategy emphasizes offensive operations, deregulation, AI www.csoonline.com/article/4141...

10.03.2026 11:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Remotely Unlocking An Encrypted Hard Disk Can you remotely unlock an encrypted hard disk? [Jyn] needed to unlock their home server after it rebooted even if they weren’t home. Normally, they used Tailscale to remote in, but you can&#…

Remotely Unlocking an Encrypted Hard Disk hackaday.com/2026/03/06/r...

10.03.2026 11:12 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Spoofing An Emergency Traffic Preemption Signal There’s a well-known movie trope in which a hacker takes control of the traffic lights in a city, causing general mayhem or creating a clear getaway path. Unlike many Hollywood representation…

Spoofing an Emergency Traffic Preemption Signal hackaday.com/2026/03/08/s...

10.03.2026 10:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Microsoft: Hackers abusing AI at every stage of cyberattacks Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a…

Microsoft: Hackers abusing AI at every stage of cyberattacks www.bleepingcomputer.com/news/securit...

10.03.2026 10:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Termite ransomware breaches linked to ClickFix CastleRAT attacks Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.

Termite ransomware breaches linked to ClickFix CastleRAT attacks www.bleepingcomputer.com/news/securit...

10.03.2026 09:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Hackers abuse .arpa DNS and ipv6 to evade phishing defenses Threat actors are abusing the special-use ".arpa" domain and IPv6 reverse DNS in phishing campaigns that more easily evade domain reputation checks and email security gateways.

Hackers abuse .arpa DNS and ipv6 to evade phishing defenses www.bleepingcomputer.com/news/securit...

10.03.2026 09:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
House panel moves pipeline cybersecurity and energy threat analysis bills forward to boost energy sector resilience - Industrial Cyber House panel moves pipeline cybersecurity and energy threat analysis bills forward to boost energy sector resilience

House panel moves pipeline cybersecurity and energy threat analysis bills forward to boost energy sector resilience - Industrial Cyber industrialcyber.co/regulation-s...

10.03.2026 08:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Cybersecurity M&A Roundup: 42 Deals Announced in February 2026 Significant cybersecurity M&A deals announced by Check Point, Booz Allen, Proofpoint, Sophos, Palo Alto Networks, and Zscaler.

Cybersecurity M&A Roundup: 42 Deals Announced in February 2026 www.securityweek.com/cybersecurit...

10.03.2026 08:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
EU court adviser says banks must immediately refund phishing victims Athanasios Rantos, the Advocate General of the Court of Justice of the EU (CJEU), has issued a formal opinion suggesting that banks must immediately refund account holders affected by unauthorized…

EU court adviser says banks must immediately refund phishing victims www.bleepingcomputer.com/news/legal/e...

10.03.2026 07:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s β€˜Playbook’ New research shows hundreds of attempts by apparent Iranian state hackers to hijack consumer-grade cameras, timed to missile and drone strikes. Israel, Russia, and Ukraine have also adopted this…

From Iran to Ukraine, everyone's trying to hack security cameras www.wired.com/story/from-u...

10.03.2026 07:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook www.listennotes.com/e/3938a08fda...

10.03.2026 06:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Manage attack infrastructure? AI agents can now help interview: Crims 'will do what gets them their objective easiest and fastest,' Microsoft threat intel boss tells The Reg

AI agents now help attackers, including North Korea, manage their drudge work www.theregister.com/2026/03/08/d...

10.03.2026 06:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Over 100 GitHub Repositories Distributing BoryptGrab Stealer The malware targets browser and cryptocurrency wallet data, along with system information and user files.

Over 100 GitHub Repositories Distributing BoryptGrab Stealer www.securityweek.com/over-100-git...

10.03.2026 05:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0