BioTone ZKI

194 posts

BioTone ZKI banner
BioTone ZKI

BioTone ZKI

@AutoPilotCyber

Post-PKI Zero Knowledge Infrastructure + LangChain AI to automate cyber security, eliminating 95% of cyber attacks due to human errors, burnout & skills gap.

Bergabung Mart 2024
108 Mengikuti21 Pengikut
BioTone ZKI me-retweet
Tuta
Tuta@TutaPrivacy·
Let's not make life easy for them 😉 Use post-quantum encryption 🔒 👉 tuta.com/blog/post-quan…
Tuta tweet media
English
1
15
78
3.5K
BioTone ZKI me-retweet
MG
MG@_MG_·
For anyone worrying about this, I’d like to hear how you were already handling a near identical attack that didn’t require this vuln: - steal Yubikey - login - returns key WITHOUT cloning it, because 1 session is enough for most objectives Same attack flow. If that wasn’t already part of your threat model, why is this? If it was part of your threat model, how do your existing defenses not already handle the vuln? (I can think of a few, but none that apply to most of the people who are concerned) This should change very little for most people.
Ars Technica@arstechnica

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel arstechnica.com/?p=2046777

English
22
87
648
124.9K
BioTone ZKI me-retweet
mjos\dwez @m-jos.bsky.social
mjos\dwez @m-jos.bsky.social@mjos_crypto·
In October I will be trying to "sell" the Keccak instruction at RISC-V Summit😁 Those who know the PQC standards know why (it is relatively even more of a bottleneck when you have vector registers, which speed up NTT tremendously, but SHAKE hardly at all.)
mjos\dwez @m-jos.bsky.social tweet media
English
2
8
28
1.9K
BioTone ZKI me-retweet
Nick Sullivan
Nick Sullivan@grittygrease·
It’s here! After 9 years of work, the National Institute of Standards and Technology (NIST) has published its first three standards for post-quantum cryptography. Meet the standards: FIPS 203: ML-KEM, intended as the primary standard for general encryption FIPS 204: ML-DSA, intended as the primary standard for protecting digital signatures FIPS 205: SLH-DSA, intended as a backup method in case ML-DSA proves vulnerable “In 2015, NIST initiated the selection and standardization of quantum-resistant algorithms to counter potential threats from quantum computers. After assessing 82 algorithms from 25 countries, the top 15 were identified with global cryptographers' assistance. These were categorized into finalists and alternative algorithms, with draft standards released in 2023. Cybersecurity experts are now encouraged to incorporate these new algorithms into their systems.” nist.gov/news-events/ne…
English
10
73
189
20.5K
BioTone ZKI
BioTone ZKI@AutoPilotCyber·
@UK_Daniel_Card @NCSC Thanks for emphasizing PROTECT. It seems as if the marketing budgets for this important part of the NIST CSF are no match for the DETECT parts.
English
0
0
1
12
BioTone ZKI me-retweet
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Reminder if you are on a board of an organisation please ensure that you are discussing, planning and preparing on how to both PROTECT and RESPOND to cyber threats: There's loads of guidance from the @NCSC and cool toolset like Exercise in a Box ncsc.gov.uk/information/ex…
English
1
3
9
1.2K
BioTone ZKI me-retweet
Craig Rowland - Agentless Linux Security
Many people know SSH is encrypted, but this doesn’t mean using a password with it is safe. The encryption only protects a password in transit from an eavesdropper. It does not protect your password if the remote system is compromised. It can be saved off in cleartext.
Craig Rowland - Agentless Linux Security tweet media
English
4
13
84
12K
BioTone ZKI me-retweet
Eric Geller
Eric Geller@ericgeller·
"To this day," Thompson notes, "we still do not know how the threat actor accessed the signing key."
English
1
3
12
1.3K
BioTone ZKI me-retweet
Eric Geller
Eric Geller@ericgeller·
Re: the stolen signing key, Thompson says, "Microsoft's explanations about why the key was still active in 2023 and why it worked for both consumer and enterprise accounts have not been competent."
English
1
3
10
1.1K
BioTone ZKI me-retweet
🇷🇴 cristi
🇷🇴 cristi@CristiVlad25·
What happens when devs forget to modify the secret key... This is from a recent pentest for a client. This misconfiguration compromised the password reset feature. #pentesting #appsec #cybersecurity #infosec
🇷🇴 cristi tweet media
English
4
11
110
9.5K
BioTone ZKI me-retweet
LetsDefend
LetsDefend@LetsDefendIO·
Basic Cryptography Cheat Sheet
LetsDefend tweet media
English
1
61
206
16.7K
BioTone ZKI me-retweet
Joe Weisenthal
Joe Weisenthal@TheStalwart·
"ASML reassured officials about its ability to remotely disable the machines when the Dutch government met with the company on the threat, two others said." bloomberg.com/news/articles/…
English
9
13
85
24.3K
BioTone ZKI me-retweet
Andy Greenberg (@agreenberg at the other places)
The hacker group Cyber Army of Russia has sabotaged multiple US water utilities, and has ties to the GRU’s notorious Sandworm unit. They also talk a lot. So I asked for an interview and spent two weeks chatting with their spokesperson “Julia.” wired.com/story/cyber-ar…
English
4
129
212
80.4K
BioTone ZKI me-retweet
Elizabeth Wharton
Elizabeth Wharton@LawyerLiz·
Thx Richard w/ @AirCanada & @caseyjohnellis w/ @Bugcrowd for joining me to share insights on keeping bugs (vulns) off planes. Cooperation + collaboration across teams w/in airlines = results. @SecureAerospace #RSAC
Aerospace Village@SecureAerospace

Amazing session happening at #RSAC “Bugs on a Plane: Implementing a Bug Bounty in an Airline IT/OT Environment” Great job by @LawyerLiz & @caseyjohnellis #aerospacevillage

English
0
5
18
4.3K