Dr. Anton Chuvakin

41.4K posts

Dr. Anton Chuvakin banner
Dr. Anton Chuvakin

Dr. Anton Chuvakin

@anton_chuvakin

Information security - #SIEM, #DFIR, #EDR formerly at Gartner! Now @GoogleCloud Office of the #CISO; host of @CloudSecPodcast https://t.co/VpKtfz8nXG

San Jose, CA Katılım Ocak 2008
9.2K Takip Edilen41.3K Takipçiler
rekdt
rekdt@rekdt·
FYI, I’ll be at Google Cloud Next in LV in a couple weeks with a fresh sticker Reveal sooooooon
rekdt tweet media
English
3
1
29
670
Dr. Anton Chuvakin retweetledi
Brian in Pittsburgh
Brian in Pittsburgh@arekfurt·
Alright, you wanna defend an organization against a proported coming tsunami of AI-created 0days? Implement: -defense-in-depth generally -reduction of Net-facing attack surface -network segmentation -execution/app control -encryption of sensitive data using keys only you hold
English
2
1
2
80
Dr. Anton Chuvakin retweetledi
SANS Institute
SANS Institute@SANSInstitute·
Your employees are already using AI without your approval. They’re feeding it sensitive data. They don’t understand the risk. They’re doing it because you haven’t given them better tools. @joswr1ght at RSAC: “We have an ongoing issue where workers don’t have the tools they need, and now they’re saying, ‘I can get AI to help me without approval,’ without understanding what kind of data they’re sending into systems or what the risk is.” @edskoudis hinted shadow AI may appear in next year’s Top 5 Most Dangerous. 📣 You heard it here first. go.sans.org/nTAdXo @OneRSAC | #RSAC #Cybersecurity
SANS Institute tweet media
English
0
3
5
859
Dr. Anton Chuvakin retweetledi
Google VRP (Google Bug Hunters)
📢📢📢 Attention bug hunters! The Google VRP is updating its reward model, with a focus on the impact of vulnerabilities and the sensitivity of the data involved. To this end, we're introducing two dimensions: Information Tiers and Action Criticality. 👀👇 bughunters.google.com/blog/standardi…
English
7
39
222
16.1K
Dr. Anton Chuvakin retweetledi
Brian in Pittsburgh
Brian in Pittsburgh@arekfurt·
This is the biggest problem with the security industry giants' marketing messaging being so disconnected from the realities of defending organizations: People actually listen to what they (and those who just copy/paste whatever the giants put out) say.
Justin Elze@HackingLZ

I would probably rant less if I didn't have to deal with "The sky is falling what should our strategy be for all this impending 0day..." Well you might want to finish rolling out MFA and finish that EDR deployment first...

English
1
1
3
530
Dr. Anton Chuvakin retweetledi
Justin Elze
Justin Elze@HackingLZ·
I would probably rant less if I didn't have to deal with "The sky is falling what should our strategy be for all this impending 0day..." Well you might want to finish rolling out MFA and finish that EDR deployment first...
English
15
6
89
4.9K
Dr. Anton Chuvakin retweetledi
Ariel Herbert-Voss
Ariel Herbert-Voss@adversariel·
What this means in plain English: as a large model is trained for an extremely long time on a giant amount of data, we see a significant jump in reasoning capabilities. Earlier this year I spoke with Wired about the inflection point with Sybil’s hacking skills that connected to this jump. Mythos proves us right. wired.com/story/ai-model…
English
1
2
10
620
Dr. Anton Chuvakin retweetledi
Doc
Doc@caballerobrah·
@nickvangilder @anton_chuvakin Let’s face it, exploitable vulns are already being found faster than teams can patch them
English
0
1
2
113
Dr. Anton Chuvakin retweetledi
Dr. Anton Chuvakin retweetledi
Brian in Pittsburgh
Brian in Pittsburgh@arekfurt·
So, so, so, so many silly takes in my feed about the future of cybersecurity in the last two days. Not sure I've seen the like of it on infosec Twitter/X in the 8-9 years I've been here. (The good but not surprising news: Few seem to be coming from actual practitioners.)
English
0
0
5
539
Dr. Anton Chuvakin retweetledi
Nick VanGilder
Nick VanGilder@nickvangilder·
If Mythos ends up doing all the things that people say it will, a lot of companies are about to find out the hard way that you can’t patch your way out of this. If exploitable vulns are going to be found faster than companies can realistically patch them, vuln management will likely become an ineffective preventative control. If/when that happens, companies will naturally need to get faster at creating detection content and better at incident response. This is good news for red teams.
English
4
5
18
4.7K