Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players
Critics viewed the bill as seeking protections against nonrealistic "doomsday" fears, but most stakeholders agree that oversight is needed in the GenAI space.
Researchers hacked Kia cars armed with only license plate numbers
A team of security researchers discovered a vulnerability that allows for Kia cars to be remotely compromised with nothing more than a license plate number.
Overtaxed State CISOs Struggle With Budgeting, Staffing
CISOs for US states face the same kinds of challenges those at private companies do: lots of work to handle, but not necessarily enough money or people to handle it sufficiently well.
FERC Outlines Supply Chain Security Rules for Power Plants
The US Federal Energy Regulatory Commission spells out what electric utilities should do to protect their software supply chains, as well as their network "trust zones."
Reachability Analysis Pares Down Static Security-Testing Overload
For development teams awash in vulnerability reports, reachability analysis can help tame the chaos and offer another path to prioritize exploitable issues.
Tool update: mac-robber.py and le-hex-to-ip.py, (Mon, Sep 30th)
One of the problems I've had since I originally wrote mac-robber.py [ 1][ 2][ 3] seven years ago is that because of the underlying os.stat python library we couldn't get file creation times (B-times). Since the release of GNU...
Sloppy Entra ID Credentials Attract Hybrid Cloud Ransomware
Microsoft warns that ransomware group Storm-0501 has shifted from buying initial access to leveraging weak credentials to gain on-premises access before moving laterally to the cloud.
5 Reasons Why Developers Should Attend Security Conferences
On the first night of BlackHat USA, I made conversation with a few friendly penetration testers who were perplexed when I told them I was a developer. Why would I be at a cybersecurity conference? …What was I hoping to get out of it? My general (and...