BioTone ZKI

194 posts

BioTone ZKI banner
BioTone ZKI

BioTone ZKI

@AutoPilotCyber

Post-PKI Zero Knowledge Infrastructure + LangChain AI to automate cyber security, eliminating 95% of cyber attacks due to human errors, burnout & skills gap.

เข้าร่วม Mart 2024
108 กำลังติดตาม21 ผู้ติดตาม
BioTone ZKI รีทวีตแล้ว
Tuta
Tuta@TutaPrivacy·
Let's not make life easy for them 😉 Use post-quantum encryption 🔒 👉 tuta.com/blog/post-quan…
Tuta tweet media
English
1
15
78
3.5K
BioTone ZKI รีทวีตแล้ว
MG
MG@_MG_·
For anyone worrying about this, I’d like to hear how you were already handling a near identical attack that didn’t require this vuln: - steal Yubikey - login - returns key WITHOUT cloning it, because 1 session is enough for most objectives Same attack flow. If that wasn’t already part of your threat model, why is this? If it was part of your threat model, how do your existing defenses not already handle the vuln? (I can think of a few, but none that apply to most of the people who are concerned) This should change very little for most people.
Ars Technica@arstechnica

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel arstechnica.com/?p=2046777

English
22
87
647
124.9K
BioTone ZKI รีทวีตแล้ว
mjos\dwez @m-jos.bsky.social
mjos\dwez @m-jos.bsky.social@mjos_crypto·
In October I will be trying to "sell" the Keccak instruction at RISC-V Summit😁 Those who know the PQC standards know why (it is relatively even more of a bottleneck when you have vector registers, which speed up NTT tremendously, but SHAKE hardly at all.)
mjos\dwez @m-jos.bsky.social tweet media
English
2
8
28
1.9K
BioTone ZKI รีทวีตแล้ว
Google Cloud Security
Google Cloud Security@GoogleCloudSec·
The new Post Quantum Cryptography standards were just released by @NIST. Today marks a major milestone in keeping information on the Internet secure and confidential! See how @Google is using #PQC, and how organizations can adopt these new standards. security.googleblog.com/2024/08/post-q…
English
0
3
13
1K
BioTone ZKI รีทวีตแล้ว
Nick Sullivan
Nick Sullivan@grittygrease·
It’s here! After 9 years of work, the National Institute of Standards and Technology (NIST) has published its first three standards for post-quantum cryptography. Meet the standards: FIPS 203: ML-KEM, intended as the primary standard for general encryption FIPS 204: ML-DSA, intended as the primary standard for protecting digital signatures FIPS 205: SLH-DSA, intended as a backup method in case ML-DSA proves vulnerable “In 2015, NIST initiated the selection and standardization of quantum-resistant algorithms to counter potential threats from quantum computers. After assessing 82 algorithms from 25 countries, the top 15 were identified with global cryptographers' assistance. These were categorized into finalists and alternative algorithms, with draft standards released in 2023. Cybersecurity experts are now encouraged to incorporate these new algorithms into their systems.” nist.gov/news-events/ne…
English
10
73
188
20.5K
BioTone ZKI
BioTone ZKI@AutoPilotCyber·
@UK_Daniel_Card @NCSC Thanks for emphasizing PROTECT. It seems as if the marketing budgets for this important part of the NIST CSF are no match for the DETECT parts.
English
0
0
1
12
BioTone ZKI รีทวีตแล้ว
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Reminder if you are on a board of an organisation please ensure that you are discussing, planning and preparing on how to both PROTECT and RESPOND to cyber threats: There's loads of guidance from the @NCSC and cool toolset like Exercise in a Box ncsc.gov.uk/information/ex…
English
1
3
9
1.2K
BioTone ZKI รีทวีตแล้ว
Craig Rowland - Agentless Linux Security
Many people know SSH is encrypted, but this doesn’t mean using a password with it is safe. The encryption only protects a password in transit from an eavesdropper. It does not protect your password if the remote system is compromised. It can be saved off in cleartext.
Craig Rowland - Agentless Linux Security tweet media
English
4
13
84
12K
BioTone ZKI รีทวีตแล้ว
Eric Geller
Eric Geller@ericgeller·
"To this day," Thompson notes, "we still do not know how the threat actor accessed the signing key."
English
1
3
12
1.3K
BioTone ZKI รีทวีตแล้ว
Eric Geller
Eric Geller@ericgeller·
Re: the stolen signing key, Thompson says, "Microsoft's explanations about why the key was still active in 2023 and why it worked for both consumer and enterprise accounts have not been competent."
English
1
3
10
1.1K
BioTone ZKI รีทวีตแล้ว
🇷🇴 cristi
🇷🇴 cristi@CristiVlad25·
What happens when devs forget to modify the secret key... This is from a recent pentest for a client. This misconfiguration compromised the password reset feature. #pentesting #appsec #cybersecurity #infosec
🇷🇴 cristi tweet media
English
4
11
110
9.5K
BioTone ZKI รีทวีตแล้ว
LetsDefend
LetsDefend@LetsDefendIO·
Basic Cryptography Cheat Sheet
LetsDefend tweet media
English
1
61
206
16.7K
BioTone ZKI รีทวีตแล้ว
Joe Weisenthal
Joe Weisenthal@TheStalwart·
"ASML reassured officials about its ability to remotely disable the machines when the Dutch government met with the company on the threat, two others said." bloomberg.com/news/articles/…
English
9
13
85
24.3K
BioTone ZKI รีทวีตแล้ว
Andy Greenberg (@agreenberg at the other places)
The hacker group Cyber Army of Russia has sabotaged multiple US water utilities, and has ties to the GRU’s notorious Sandworm unit. They also talk a lot. So I asked for an interview and spent two weeks chatting with their spokesperson “Julia.” wired.com/story/cyber-ar…
English
4
129
212
80.4K
BioTone ZKI รีทวีตแล้ว
Elizabeth Wharton
Elizabeth Wharton@LawyerLiz·
Thx Richard w/ @AirCanada & @caseyjohnellis w/ @Bugcrowd for joining me to share insights on keeping bugs (vulns) off planes. Cooperation + collaboration across teams w/in airlines = results. @SecureAerospace #RSAC
Aerospace Village@SecureAerospace

Amazing session happening at #RSAC “Bugs on a Plane: Implementing a Bug Bounty in an Airline IT/OT Environment” Great job by @LawyerLiz & @caseyjohnellis #aerospacevillage

English
0
5
18
4.3K