rs-

5.2K posts

rs- banner
rs-

rs-

@RustySowers

| intake of security/tech content |

Katılım Kasım 2019
230 Takip Edilen592 Takipçiler
rs- retweetledi
Dodge This Security
Dodge This Security@shotgunner101·
This is a big deal if true. Had they managed to actually make it that last final step i feel like this could have been fatal for the company.
International Cyber Digest@IntCyberDigest

‼️🚨 This is wild. OpenAI just confirmed it got hit in the TanStack npm supply chain attack, and the attackers were close to being able to ship malicious code inside official OpenAI software, signed and trusted, if their incident response had not caught it in time. The campaign is the work of TeamPCP, the same crew running the Mini Shai-Hulud wave. Two employee devices in OpenAI's corporate environment were compromised through the malicious TanStack packages. The attackers used that foothold to reach a limited subset of internal source code repositories. OpenAI says only "limited credential material" was successfully exfiltrated, with no customer data, production systems, intellectual property or deployed software impacted. Here is the part that should grab your attention. OpenAI is rotating its code-signing certificates and forcing every macOS user to update their OpenAI apps. You do not rotate signing certs for "limited credential material." You rotate signing certs when the attacker was close enough to signing malicious binaries as OpenAI. The "we contained it in time" framing is doing serious heavy lifting here. For wider context, the same TeamPCP wave also hit Mistral AI, UiPath, Guardrails AI, OpenSearch and SAP npm packages. The TanStack compromise is tracked as CVE-2026-45321 at CVSS 9.6, and Mistral AI source code is already being advertised for sale by the group.

English
0
2
1
418
rs- retweetledi
Dr Gerhard Knecht, PhD
Dr Gerhard Knecht, PhD@GerhardKnecht·
Here is a timely lesson for the defense sector: no matter how advanced military AI becomes, it can still be outmaneuvered by human ingenuity, unconventional thinking, and old-fashioned manual tactics. A conventional SOC may still beat an AI firewall.
Science girl@sciencegirl

U.S. Marines recently proved that low-tech creativity can still defeat cutting-edge military artificial intelligence. In a DARPA field trial, a team of eight Marines was challenged to sneak past a sophisticated AI-powered detection system. Instead of relying on advanced stealth gear or electronic countermeasures, they turned to absurdly simple, almost cartoonish tactics and succeeded Some Marines cartwheeled and rolled across 300 meters of open ground. Others concealed themselves under ordinary cardboard boxes and slowly inched forward. One soldier even disguised himself as a small fir tree, shuffling gradually toward the objective. Remarkably, every Marine reached the target without ever triggering the AI sensors. The system had been trained extensively on normal human walking and running patterns, but it had no reference for these bizarre movements. Because the Marines’ actions fell completely outside the AI’s learned understanding of “human behavior,” they were effectively invisible to it. This exercise offers a timely lesson for the defense sector: no matter how advanced military AI becomes, it can still be outmaneuvered by human ingenuity, unconventional thinking, and old-fashioned manual tactics. This incident serves as a vital reminder for the defense industry that while AI is an incredibly powerful tool, it remains susceptible to creative human deception and the unpredictable nature of manual tactics. source: Scharre, P. (2023). Four Battlegrounds: Power in the Age of Artificial Intelligence. W. W. Norton & Company.

English
0
1
1
128
rs- retweetledi
rs- retweetledi
Kim Zetter
Kim Zetter@KimZetter·
Snoop Dogg Says "Hack is Wack!" http://bit.ly/9C5BNb <- really, Symantec?
English
0
2
0
0
rs-
rs-@RustySowers·
⚠️ indicator of cyber insider threat to employer (if they’re on r/publicfreakout) 💫 #cybersecurity #Cybersécurité
rs- tweet media
English
0
0
0
77
rs- retweetledi
UwU Underground
UwU Underground@uwu_underground·
We are officially expanding our UwU Underground drink protectors campaigns to any event, conference or vendor that is interested. We will happily collab and use vendor approved packaging, branded and non-branded options, and sealed packaging. Feel free to reach out to us or @princessakano for coordinating.
UwU Underground tweet media
English
25
55
283
21.3K
rs-
rs-@RustySowers·
@ZackKorman an opportunity, still, as audit frameworks, attestations, sections of cyber “experts”, etc were again proven not credible & offer no assurance of security
English
0
0
1
61
Zack Korman
Zack Korman@ZackKorman·
How do we feel about companies removing the Delve logo but continuing to brag about being SOC2 certified?
Zack Korman tweet media
English
46
22
595
35.7K
rs- retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
I don’t want any LLM running random applications on my computer, navigating my browser, or touching my spreadsheets. I don’t trust them to do the right thing all the time - and nobody doing serious work should. Sandboxed, with a controlled blast radius, fine. Full control over anything you can’t afford to lose? Never.
Claude@claudeai

You can now enable Claude to use your computer to complete tasks. It opens your apps, navigates your browser, fills in spreadsheets—anything you'd do sitting at your desk. Research preview in Claude Cowork and Claude Code, macOS only.

English
160
161
1.8K
123.1K
rs- retweetledi
Security Weekly Podcast Network
Your attack surface isn’t just endpoints anymore. Modern security platforms now include identities, applications, cloud workloads—even IoT devices. As the definition of “asset” expands, so does where and how you need to apply controls. If your security strategy hasn’t evolved with your environment, where are the gaps? #Cybersecurity #AttackSurface #Infosec
English
0
3
7
186
rs- retweetledi
Shrav Mehta
Shrav Mehta@shravvmehtaa·
Insiders have known about this behavior from Delve and new upstarts for a long time. Secureframe (and many others) reported it to the AICPA. The AICPA acknowledged the issue, but ultimately didn’t take any action. Unfortunately, that essentially made the practice okay. It’s also nearly impossible for a CPA to lose their license, which makes it low risk for audit firms to continue these practices. We explained this to customers, but eventually stopped since it was coming off as petty and many prospects didn’t care if a YC backed, seemingly credible company, was promising them certifications without lifting a finger. It’s unfortunate for all the companies involved who didn’t know any better. We are here to help over the weekend to all those affected.
English
9
8
121
15.3K
rs-
rs-@RustySowers·
great week for US biz cyber, strategic cyber threat intel, in further establishing: -performative security, false attestation -excessive consolidation of critical tech to a single, external biz -need for industry pro-reg -hr resume discrimination due to (over) reliance on ai ats #cybersecurity #cybersecuritynews
rs- tweet media
English
0
0
0
81
rs-
rs-@RustySowers·
viewed biz security code of conduct as optional 💫 #CyberSecurityAwareness #cybersecuritytips #cyberSecuritynews
rs- tweet media
Ryan@ohryansbelt

Delve, a YC-backed compliance startup that raised $32 million, has been accused of systematically faking SOC 2, ISO 27001, HIPAA, and GDPR compliance reports for hundreds of clients. According to a detailed Substack investigation by DeepDelver, a leaked Google spreadsheet containing links to hundreds of confidential draft audit reports revealed that Delve generates auditor conclusions before any auditor reviews evidence, uses the same template across 99.8% of reports, and relies on Indian certification mills operating through empty US shells instead of the "US-based CPA firms" they advertise. Here's the breakdown: > 493 out of 494 leaked SOC 2 reports allegedly contain identical boilerplate text, including the same grammatical errors and nonsensical sentences, with only a company name, logo, org chart, and signature swapped in > Auditor conclusions and test procedures are reportedly pre-written in draft reports before clients even provide their company description, which would violate AICPA independence rules requiring auditors to independently design tests and form conclusions > All 259 Type II reports claim zero security incidents, zero personnel changes, zero customer terminations, and zero cyber incidents during the observation period, with identical "unable to test" conclusions across every client > Delve's "US-based auditors" are actually Accorp and Gradient, described as Indian certification mills operating through US shell entities. 99%+ of clients reportedly went through one of these two firms over the past 6 months > The platform allegedly publishes fully populated trust pages claiming vulnerability scanning, pentesting, and data recovery simulations before any compliance work has been done > Delve pre-fabricates board meeting minutes, risk assessments, security incident simulations, and employee evidence that clients can adopt with a single click, according to the author > Most "integrations" are just containers for manual screenshots with no actual API connections. The author describes the platform as a "SOC 2 template pack with a thin SaaS wrapper" > When the leak was exposed, CEO Karun Kaushik emailed clients calling the allegations "falsified claims" from an "AI-generated email" and stated no sensitive data was accessed, while the reports themselves contained private signatures and confidential architecture diagrams > Companies relying on these reports could face criminal liability under HIPAA and fines up to 4% of global revenue under GDPR for compliance violations they believed were resolved > When clients threaten to leave, Delve reportedly pairs them with an external vCISO for manual off-platform work, which the author argues proves their own platform can't deliver real compliance > Delve's sales price dropped from $15,000 to $6,000 with ISO 27001 and a penetration test thrown in when a client mentioned considering a competitor

English
0
0
0
131