Advertisement · 728 × 90

Posts by Mike Sec

Preview
The zero-days are numbered  | The Mozilla Blog Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser.

I appreciate their attempt to put some water on the flames, but saying the 271 vulns Mythos discovered could’ve been identified by a human doesn’t really help. “Thankfully Fred got hit by a car, much better than getting hit by a train.”
blog.mozilla.org/en/privacy-s...

14 hours ago 1 0 0 0

This still holds true. Models similar to Mythos and GPT 5.4-Cyber will only increase the volume, veracity, and velocity of vulnerabilities and attacks in the not too distant future. The underlying fundamentals of cyber defense still hold true; however, approaches to applying them will need to change

1 week ago 0 0 0 0
Preview
Our evaluation of Claude Mythos Preview’s cyber capabilities | AISI Work We conducted cyber evaluations of Anthropic’s Claude Mythos Preview and found continued improvement in capture-the-flag (CTF) challenges and significant improvement on multi-step cyber-attack simulati...

A more pragmatic review of Mythos that doesn’t involve gas, hair, and matches.
www.aisi.gov.uk/blog/our-eva...

1 week ago 0 0 0 0

To be fair, I would say there’s an Easter egg in there…

2 weeks ago 1 0 0 0

Foreign actors have been compromising domestic routers for years because they’re unpatched and/or end of life, so they ban foreign routers. By summer, after years of foreign actors compromising domestic telcos also because of poor cyber hygiene, they will ban foreign telcos.

4 weeks ago 0 0 0 0
lester freamon looking off to the right of the frame

lester freamon looking off to the right of the frame

follow malware and you get malware authors and malware payloads. follow the infrastructure and you don't know where the fuck it's gonna take you.

1 month ago 14 4 3 0

Agreed. Salt Typhoon - espionage/successful intrusions; Russian use of Acid Rain - attack.

2 months ago 0 0 0 0

First repeatable attribution framework for threat intel teams since the Diamond Model as far as I know…

2 months ago 0 0 0 0
Preview
GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use | Google Cloud Blog Our report on adversarial misuse of AI highlights model extraction, augmented attacks, and new AI-enabled malware.

First VoidLink, now HONESTCUE. Fair to assume AI generated malware frameworks are only going to exponentially grow…

cloud.google.com/blog/topics/...

2 months ago 0 0 0 0
Advertisement

“The uncomfortable lesson of Salt Typhoon is not that Beijing has futuristic capabilities. It’s that Washington often treats major intrusions as proof of overwhelming adversary sophistication, when in reality, basic, preventable weaknesses still account for much of the vulnerability.” 🎯

2 months ago 0 0 0 0
Preview
Spionage: BND hörte jahrelang US-Präsident Barack Obama ab Der deutsche Geheimdienst überwachte regelmäßig Telefonate des damaligen US-Präsidenten an Bord der Air Force One. Erlaubnis von Angela Merkel hatte der BND nicht.

Germany’s foreign intelligence agency (BND) intercepted phone conversations of former President Barack Obama while he was aboard Air Force One over several years. The interceptions exploited vulnerabilities in the aircraft’s encryption and known frequencies.

www.zeit.de/politik/ausl...

3 months ago 117 45 6 20

T-Mobile users like, “There’s no way coverage is that good.”

3 months ago 0 0 0 0
Post image

Scoop: The lone employee behind CISA's Pre-Ransomware Notification Initiative resigned on Friday rather than take a forced reassignment to FEMA.

CISA says PRNI will continue, but sources said David Stern's loss will be a major setback for it.

My story: www.cybersecuritydive.com/news/cisa-ra...

3 months ago 257 132 7 16

The US is woefully behind China in both renewable and nuclear energy production, the former because its connection with climate change, which is seen as a “hoax”, and the latter because of the waste it produced, which is more than offset by the amount of power generated compared to fossil fuels.

3 months ago 1 0 1 0
Preview
Trump Halts 5 Wind Farms Off the East Coast

Success in AI won’t just be because of chips and algorithms, but just as, if not more, importantly, data centers and power generation.
www.nytimes.com/2025/12/22/c...

3 months ago 0 0 1 0
Preview
AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.

In order: data security and management, cloud security, identity management. Goes without saying, protections should follow data - but what does that mean in a world of AI? How are you ensuring only those authorized to see or know certain things, are? www.cybersecuritydive.com/news/ai-secu...

3 months ago 0 0 0 0
Preview
AI Malware: Hype vs. Reality A grounded look at AI malware: most threats sit at low maturity levels, with no verified autonomous BYOAI attacks. Learn what’s real, what’s hype, and how defenders should respond.

Where is the closest rooftop? There is something I would like to shout.
“AI is currently a force multiplier on existing attacker tradecraft, not a source of fundamentally new TTPs.”

www.recordedfuture.com/blog/ai-malw...

4 months ago 0 0 0 1
Preview
a cartoon of a chef with the words chef 's kiss below him ALT: a cartoon of a chef with the words chef 's kiss below him
4 months ago 0 0 0 0
Advertisement
Marcus Hutchins :verified: (@malwaretech@infosec.exchange) Here's an easy way to understand the US "hacking back" / Offensive cyber operations proposal: You lose the keys to your house down the back of the couch. It would be very time consuming to try and dig...

infosec.exchange/@malwaretech...

4 months ago 0 0 1 0

Straight up, I developed and taught — and @kikta.net now teaches — an entire course at the @alperovitch.institute that boils down to “you can shape adversary cyber activity but you can’t deter it because that’s how intelligence operations work”. Being mad at China for playing the game is ridiculous.

5 months ago 15 3 1 0

I explained to my class week that despite all the panic about state actor capabilities:

-The biggest threat to electricity is squirrels
-Minecraft skids have the best DDoS capabilities
-No amount of disruption could ever beat misconfiguration, with DNS at the top of the list

5 months ago 9 3 1 0
Preview
Acting US Cyber Command, NSA chief won’t be nominated for the job, sources say Army Lt. Gen. William Hartman, the acting leader of U.S. Cyber Command and the NSA, will not be nominated to take the job permanently, sources told Recorded Future News.

EXCLUSIVE: President Donald Trump has decided not to nominate Army Lt. Gen. William Hartman to be the next leader of U.S. Cyber Command and the National Security Agency.

On @therecordmedia.bsky.social

therecord.media/william-hart...

6 months ago 20 14 4 1
Preview
Attacks on data centers: the biggest threat to the AI boom Here’s a four-step strategy for keeping data centers safe.

Data center security being the Achilles heel of AI has been the topic of concern for the last year or two. I think the biggest takeaway from this piece is the need for a business continuity plan - being ready to go back to manual processes where AI has taken over.

www.scworld.com/perspective/...

6 months ago 1 0 0 0
Preview
Salt Typhoon: New Joint Advisory Offers a Beacon Through the Storm but Stirs Up New Questions Analysis of newly identified Salt Typhoon-linked companies casts light on the complex ecosystem of front companies and real businesses supporting Chinese state cyber operations

open.substack.com/pub/nattotho...

7 months ago 1 0 0 0
Post image

Peter Kyle raised eyebrows last year when he said he was made, just hours into office, “very very aware that there was a cybersecurity challenge that our country faced that I simply wasn’t aware of before.”

We report a secret briefing by intel chiefs was responsible: therecord.media/cyberattack-...

7 months ago 7 9 1 2
Post image

Microsoft: Multiple subsea fiber cuts in the Red Sea impacting global communications

azure.status.microsoft/en-us/status

7 months ago 22 11 0 0
Preview
AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution.

Interesting attack vector. Essentially the AI equivalent of domain squatting, except with AI model names.
www.securityweek.com/ai-supply-ch...

7 months ago 1 0 0 0
Preview
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms DPRK-aligned threat actors abuse CTI platforms to detect infrastructure exposure and scout for new assets.

🚨New research drop: Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms

It was a pleasure collaborating with Sreekar Madabushi and @kennethkinion.bsky.social from Validin!

Read our blog post: s1.ai/nk-ops

7 months ago 10 6 1 0
Advertisement
Preview
With less than a month to go, House panel votes to extend popular cyber programs Ten-year extensions of a threat information sharing law and a cybersecurity grant program for states and localities won bipartisan approval in the House Homeland Security Committee.

Legislation to renew two federal cybersecurity laws has finally begun moving through Congress, but it’s unclear if lawmakers will be able to pass both bills before an end-of-the-month deadline.

On @therecordmedia.bsky.social

therecord.media/house-homela...

7 months ago 1 1 0 0
Preview
Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 2025 A look into what action Netscaler customers need to take ASAP.

New by me - Citrix have forgot to tell you a zero day was under exploitation earlier this year to successfully backdoor devices at "critical" organisations, and no vendor released technical details.

More to come, including on CVE-2025-7775 too.

doublepulsar.com/citrix-forgo...

7 months ago 50 24 2 0