Helped to create the CVE and many other things. Fixed autorun for XP. On Blackhat Review board.
Books […]
[bridged from https://infosec.exchange/@adamshostack on the fediverse by https://fed.brid.gy/ ]
"once enabled, it’s enabled for all users on the device including other administrators and standard users."
"Agents should always act under the principles of least privilege"
"once enabled, it’s enabled for all users on the device including other administrators and standard users."
"Agents should always act under the principles of least privilege"
🤣
(cc @Viss )
🤣
(cc @Viss )
There are no regulatory updates because the United States of America is unable to fund its ongoing operations and shut down. 2025 United States federal government shutdown (Wikipedia)
Despite that, the FCC deems it essential to reconsider a set of security actions. The letter from […]
There are no regulatory updates because the United States of America is unable to fund its ongoing operations and shut down. 2025 United States federal government shutdown (Wikipedia)
Despite that, the FCC deems it essential to reconsider a set of security actions. The letter from […]
Mike Privette has released a new version of his AI Security Shared Responsibility Model.
Benchmarking is hard. See two Arxiv papers, The Illusion of Readiness: Stress Testing Large Frontier Models on Multimodal Medical Benchmarks, (“Leading systems often guess correctly even when key inputs […]
Mike Privette has released a new version of his AI Security Shared Responsibility Model.
Benchmarking is hard. See two Arxiv papers, The Illusion of Readiness: Stress Testing Large Frontier Models on Multimodal Medical Benchmarks, (“Leading systems often guess correctly even when key inputs […]
Allan Reyes has a longish article, Keeping Secrets Out of Logs, which is quite good, and has nice easter eggs.
Facebook describes how they use monthly “waves” of activity to help teams engage with their privacy work in a blog post, Federation Platform and Privacy Waves. Key concept […]
Allan Reyes has a longish article, Keeping Secrets Out of Logs, which is quite good, and has nice easter eggs.
Facebook describes how they use monthly “waves” of activity to help teams engage with their privacy work in a blog post, Federation Platform and Privacy Waves. Key concept […]
SAFECode and The Center for Internet Security have released a Secure by Design: A Developer’s Guide to Building Safer Software.
Pat Opet of JP Morgan Chase announced a paper on their threat modeling approach (“tradecraft”). You can read that linkedin post, jump to the corporate […]
SAFECode and The Center for Internet Security have released a Secure by Design: A Developer’s Guide to Building Safer Software.
Pat Opet of JP Morgan Chase announced a paper on their threat modeling approach (“tradecraft”). You can read that linkedin post, jump to the corporate […]