Liturgical headdresses worn by Christian bishops and abbots
POPULARITY
Categories
Fundada con la intención de rendir homenaje a las raíces mexicanas y al mismo tiempo romper esquemas, este mezcal artesanal ha logrado conquistar tanto paladares como miradas con su distintiva botella. En esta entrevista platicamos con Claudio Román, Director General y fundador de Mezcal Mitre sobre el origen de la marca, su portafolio, las ideas creativas detrás de sus lanzamientos y por qué Mezcal Espadín es una gran opción para celebrar este #DíadelPadre.
In May 2025, the Emerging Technologies Institute and MITRE Corporation released a report that explores how artificial intelligence (AI) can improve the Department of Defense's acquisition system and support its workforce. Several of the authors, including Adam Bouffard (Group Leader and Principal Decision Analyst at MITRE), Chris Barlow (Senior Acquisition Analyst), and Wilson Miles (Associate Research Fellow at ETI) joined the podcast to discuss both the opportunities of inserting AI into the acquisition lifecycle and barriers to implementation. Additionally, the guests describe several potential paths forward to accelerate the adoption of AI for acquisition needs.Accelerating the Future: Leveraging AI for Transformative Federal Acquisition, https://www.emergingtechnologiesinstitute.org/publications/research-papers/accelerating-the-futureTo receive updates about the NDIA Emerging Technologies for Defense Conference and Exhibition on August 27-29, 2025 at the Washington D.C. Convention Center, please join our mailing list here: https://www.emergingtechnologiesinstitute.org/sign-up or visit our website at: https://www.ndiatechexpo.orghttps://emergingtechnologiesinstitute.orghttps://www.facebook.com/EmergingTechETIhttps://www.linkedin.com/company/ndia-eti-emerging-technologies-institute https://www.twitter.com/EmergingTechETI
I chat with Aaron Lippold, creator of MITRE's Security Automation Framework (SAF), to discuss how to escape the pain of manual STIG compliance. We explore the technical details of open-source tools like InSpec, Heimdall, and Vulcan that automate validation, normalize diverse security data, and streamline the entire security authoring process. The show notes and blog post for this episode can be found at https://opensourcesecurity.io/2025/2025-06-stig-automation-aaron-lippold/
Guest Kade Morton Panelists Richard Littauer | Eriol Fox Show Notes In this Maintainers Month episode of Sustain, host Richard Littauer and co-host Eriol Fox talk with cybersecurity expert Kade Morton from Arachne Digital. The conversation dives into how Kade's unconventional path through criminology and international relations led him into cybersecurity and open source. They explore the unique challenges of sustaining open source security tools, particularly for human rights activists and under-resourced groups, the tension between proprietary and open solutions, and how geopolitical contexts and human motivations influence modern digital threat landscapes. Hit download now to hear more! [00:01:41] Kade explains his work is split between a day job working security operations and a startup he runs called Arachne Digital. [00:02:51] Kade tells us about his background, how he got into cybersecurity through self-teaching and open source, and how his criminology and international relations studies informed his interest in cyber threats. [00:05:17] Kade discusses the open source projects he maintains, specifically ‘Thread.' [00:06:50] We learn about the difficulty of getting others invested in better tools and Kade discusses challenges explaining open source values to corporate environments. [00:12:26] Richard asks whether closed-source software is more secure and Kade highlights how most real world exploits target proprietary software. [00:14:57] Eriol brings up security perceptions in non-tech orgs using digital tools. Kade shares how Arachne Digital offers free services to vetted human rights orgs and he they discuss challenges balancing funding and access in human rights cybersecurity. [00:19:17] Richard reflects on monetization models for sustaining open source cybersecurity. Kade explains his company avoids fear-based marketing and promotes awareness instead. [00:22:40] Kade outlines how their threat-informed defense model works. [00:25:42] Eriol asks what changes could help improve open source sustainability. Kade discusses feeling out of place in both government and open source spaces and emphasizes cross-pollination between sectors to reduce polarity. [00:28:29] Richard introduces the concept of “digital sovereignty.” Kade warns of the risks of splintering the internet through nationalism and advocates for a balanced middle ground between centralization and fragmentation. [00:31:41] Kade shares where you can find his work on the web. Quotes [00:13:44] “It's mostly proprietary software that's being hacked.” [00:29:40] “The internet is the world's largest shared resource.” Spotlight [00:32:56] Eriol's spotlight is a repository called: The Design We Open. [00:33:49] Richard's spotlight is 1Password and Robin Riley. [00:34:31 Kade's spotlight is a shoutout to Mitre for TRAM and Justin Seitz who wrote a blog post on a project called, Searx. Links SustainOSS (https://sustainoss.org/) podcast@sustainoss.org (mailto:podcast@sustainoss.org) richard@sustainoss.org (mailto:richard@sustainoss.org) SustainOSS Discourse (https://discourse.sustainoss.org/) SustainOSS Mastodon (https://mastodon.social/tags/sustainoss) SustainOSS Bluesky (https://bsky.app/profile/sustainoss.bsky.social) SustainOSS LinkedIn (https://www.linkedin.com/company/sustainoss/) Open Collective-SustainOSS (Contribute) (https://opencollective.com/sustainoss) Richard Littauer Socials (https://www.burntfen.com/2023-05-30/socials) Eriol Fox GitHub (https://erioldoesdesign.github.io/) Kade Morton LinkedIn (https://www.linkedin.com/in/kade-morton-34179283/) Arachne Digital (https://www.arachne.digital/) Arachne Digital LinkedIn (https://www.linkedin.com/company/arachne-digital/) Arachne Digital (Medium) (https://arachnedigital.medium.com/) Arachne Digital (YouTube) (https://www.youtube.com/@Arachne_Digital) Arachne Digital (Bluesky) (https://bsky.app/profile/arachnedigital.bsky.social) Arachne Digital (GitHub) (https://github.com/arachne-threat-intel/) Thread-GitHub (https://github.com/arachne-threat-intel/thread) The National Digital Forum (NDF) (https://www.ndf.org.nz/) The New Design Congress (https://newdesigncongress.org/en/) Open Technology Fund -Security Lab (https://www.opentech.fund/labs/security-lab/) The Design We Open (GitHub) (https://github.com/sprblm/The-Design-We-Open) 1Password (https://1password.com/) TRAM (https://github.com/mitre-attack/tram) Searx (https://github.com/searx/searx) Credits Produced by Richard Littauer (https://www.burntfen.com/) Edited by Paul M. Bahr at Peachtree Sound (https://www.peachtreesound.com/) Show notes by DeAnn Bahr Peachtree Sound (https://www.peachtreesound.com/) Special Guest: Kade Morton.
Parce que… c'est l'épisode 0x593! Shameless plug 03 au 05 juin 2025 - Infosecurity Europe 27 et 29 juin 2025 - LeHACK 12 au 17 octobre 2025 - Objective by the sea v8 10 au 12 novembre 2025 - IAQ - Le Rendez-vous IA Québec 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2065 Description Introduction et présentations Ce podcast réunit un panel d'experts en cybersécurité lors de l'événement NortSsec, avec comme animateur et participants : Olivier Arteau (recherche académique, créateur du prototype pollution), Joey Dubé (superviseur d'équipe d'analyse au Centre canadien de cybersécurité), Jean-Philippe Décarie-Mathieu (analyste principal chez Cyber Québec), Estelle Ruellan (chercheuse en cybersécurité chez Flair spécialisée en data science), et François Proulx (vice-président recherche chez Boost Security, expert en supply chain security). Souveraineté numérique et fragmentation des standards CVE La discussion s'ouvre sur la question troublante de la souveraineté numérique, particulièrement concernant les récents bouleversements autour du système CVE (Common Vulnerabilities and Exposures). L'administration américaine a menacé de couper le financement de MITRE, l'organisme gérant les CVE, créant une crise qui a révélé la dépendance occidentale aux infrastructures numériques américaines. En réaction, l'Europe a rapidement développé son propre système équivalent. Les panélistes voient cette fragmentation comme potentiellement positive. Estelle note que dans la recherche sur le dark web, ce qui compte est l'adoption par les utilisateurs plutôt que l'uniformité des standards. Jean-Philippe souligne que beaucoup de vulnérabilités n'avaient déjà pas de CVE, et qu'avoir des doublons pourrait accélérer l'attribution de numéros. Il perçoit cette situation comme une opportunité de revoir un système CVE critiqué pour son manque de précision et sa gestion centralisée problématique. Joey appuie cette vision, qualifiant ce bouleversement de “shakeup nécessaire” qui force à repenser une dépendance de quinze ans aux États-Unis. François y voit une contre-vérification bénéfique, rappelant que l'industrie s'adapte déjà aux nomenclatures multiples pour l'attribution d'acteurs malveillants. Expérience de création de CVE Olivier partage son expérience de création de CVE, expliquant que MITRE préfère que les demandes passent par des intermédiaires (entreprises ou organisations) plutôt que directement par les chercheurs. Cette structure limite les soumissions de faible qualité mais oblige les chercheurs à “s'agenouiller” devant les entreprises pour obtenir des crédits. François confirme cette approche via GitHub Security Advisory, tandis que Joey mentionne son expérience chez Intel/McAfee comme autorité de numérotation CVE. Impact de la fragmentation sur l'industrie Les experts s'accordent sur le fait que la fragmentation ne pose pas de problème majeur tant que les informations essentielles (produits affectés, versions, standards) restent cohérentes. Joey souligne que le vrai problème était la dépendance à un point de défaillance unique. Cette diversification pourrait même être salutaire en évitant qu'une seule interruption paralyse l'industrie entière. La discussion évoque la possibilité d'un système décentralisé de type fédératif, mais les panélistes restent prudents quant aux résistances des entreprises ayant des blocs CVE pré-alloués. Géopolitique et dépendance technologique La conversation prend une tournure géopolitique avec l'analyse de la dépendance canadienne aux infrastructures américaines. François note que la Chine a développé son propre système de gestion des vulnérabilités avec contrôle étatique, gardant un accès prioritaire avant publication publique. Pour les autres pays (Iran, Russie, Corée du Nord), la distinction est faite entre espionnage d'État et cybercriminalité, cette dernière tendant à utiliser les outils existants par facilité. Les panélistes soulignent l'ironie de l'administration Trump abandonnant volontairement une position de dominance stratégique dans le renseignement cyber, révélant la vulnérabilité occidentale. Jean-Philippe évoque la dépendance canadienne au renseignement des Five Eyes, particulièrement face à des États-Unis potentiellement hostiles. Solutions canadiennes et valorisation du talent La discussion se tourne vers les solutions concrètes pour réduire la dépendance technologique. Jean-Philippe identifie un problème historique de valorisation du talent technique au Canada, où la mentalité était d'aller travailler aux États-Unis pour du travail de pointe. Cette fuite des cerveaux a affaibli les capacités canadiennes. François exprime sa fierté envers son équipe “world-class” chez Boost Security, soulignant que le talent canadien existe et peut rivaliser internationalement. Le défi est l'adoption de produits canadiens face au monopole des logiciels américains. Estelle note que même avec d'excellents produits locaux, l'adoption prend du temps face à la domination mainstream américaine. Exemples d'initiatives canadiennes L'exemple de CanCyber est évoqué comme modèle d'initiative gouvernementale réussie. Ce projet fédéral donnait accès gratuit à du renseignement de menaces et des services de cybersécurité aux PME, particulièrement précieux pour les entreprises ne pouvant s'offrir des solutions coûteuses. Malheureusement supprimé après un changement de ministre, il illustre le potentiel canadien mais aussi la fragilité politique de ces initiatives. Joey confirme que des services similaires existent encore via le CCCS pour les secteurs critiques, mais sous une forme différente. Nécessité du lobbying et engagement politique Jean-Philippe souligne l'importance du lobbying pour la pérennité des initiatives technologiques. Le milieu IT s'investit peu en politique, contrairement aux industries ayant des lobbyistes payés. La communauté cybersécurité doit s'organiser via des OBNL pour porter ses enjeux politiquement. NordSec est identifié comme un véhicule potentiel, démocratisant la cybersécurité pour les PME et permettant l'échange entre secteurs public et privé. CyberEcho, partenaire principal financé par les banques canadiennes, représente aussi un bon véhicule d'influence avec une vision à long terme. Sortir de l'entre-soi Un point crucial émerge sur la tendance de la communauté cybersécurité à “prêcher entre convertis”. Olivier insiste sur la nécessité de transcender leur écosystème pour influencer les décideurs et le grand public. Il encourage les experts à donner des entrevues médiatiques malgré les risques, ayant lui-même influencé des ministres via Radio-Canada. Les obstacles identifiés incluent : la peur d'être mal cité (Jean-Philippe), les stéréotypes sur les “nerds” de la cyber (Estelle), et la difficulté de vulgariser des sujets techniques complexes. Historiquement, la communauté hacker était hostile aux médias et très élitiste, culture qui évolue heureusement vers plus de permissivité. Innovation dans la communication François mentionne l'initiative CyberScience qui coach les étudiants canadiens en CTF, avec l'équipe gagnante représentant le Canada internationalement. L'exemple danois est cité, où les médias mainstream ont couvert leur équipe CTF comme un sport, popularisant ainsi la cybersécurité. Conclusion et perspectives Le panel conclut sur l'importance de déconstruire l'élitisme historique de la communauté pour permettre l'émergence de nouveaux talents et améliorer la communication externe. La période d'incertitude géopolitique, bien que déstabilisante, offre une opportunité de repenser la souveraineté numérique canadienne et de valoriser l'expertise locale. Les experts s'accordent sur la nécessité d'actions concrètes : développer des alternatives canadiennes aux solutions américaines, renforcer le lobbying communautaire via des OBNL, améliorer la communication publique des enjeux cybersécuritaires, et surtout, surmonter la réticence à s'exposer médiatiquement pour influencer les politiques publiques. Cette discussion révèle une communauté cybersécuritaire canadienne consciente de ses défis mais confiante en ses capacités, prête à saisir l'opportunité créée par l'instabilité géopolitique actuelle pour affirmer sa souveraineté numérique. Notes NorthSec Collaborateurs Nicolas-Loïc Fortin Olivier Arteau Joey Dubé Estelle Ruellan Jean-Philippe Décarie-Mathieu François Proulx Crédits Montage par Intrasecure inc Locaux réels par Marché Bonsecours
Watch Post Flight on our Community site
A new survey from MITRE says that a majority of non-traditional defense contractors face barriers of inflexibility and complexity in the acquisition process. As DoD tries to bring more innovation and flexibility into its stable of contractors, what really needs to change to make this possible? The senior vice president and general manager for MITRE National Security Sector, Keoki Jackson joins me to answer that question.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Today, we look at three aspects of automation to give listeners a better view of its efficacy and some of its inherent challenges. First, we provide an overview, then a look at securing applications, and finally, we give a view on threat intelligence. PART ONE: Role of Automation Jason Ralph from the Department of Labor puts the entire discussion into perspective when he states that AI should not be considered as a replacement for current efforts at automation, but as an augmentation. Further, he cautions that accelerating adoption must be tempered with a more reasonable approach where you can be assured your data is not poisoned. When not used judiciously, automation can introduce more conflicts and errors than when used at all. Context is everything in today's complex systems, and Nick Vinson suggests that using an approach called "threat modeling" can give system designers better ideas of automation's impact. PART TWO: Application Security & Cloud Telemetry Malicious actors noticed the emphasis on data security and are now directing attacks on applications. Applications can be complex to protect when located in a public, private, and hybrid cloud maze. Rob Davies from Peraton refers to using telemetry to understand where resources are located so that we can leverage them. Telemetry can collect data from various sources, typically on a network. Monitoring this data gives you system performance. Peter Chestna from Checkmarx observes tools from cloud service providers may be too superficial and will not allow a deeper investigation of the automation process. PART THREE: Threat Intelligence & Risk Visibility In sports, there is an adage: "ya can't tell the players without a scorecard." Eric Werner from the DoD shares with listeners the Enhanced Network Sensor and Intelligence Threat Enumeration (ENSITE). Based on insight provided by the MITRE framework, it allows for new threat vectors to be distributed and reduces duplication. David Monneir from Team CYMRU starts with a strategic observation. He notes that in the federal government, a nation-state actor will persistently attack because the goal is much more serious than an attack on a bank. All the experts agree on the concepts of knowing your vulnerabilities, learning what controls are in place, and knowing what capabilities you have.
A busy Patch Tuesday. Investigators discover undocumented communications devices inside Chinese-made power inverters. A newly discovered Branch Privilege Injection flaw affects Intel CPUs. A UK retailer may claim up to £100mn from its cyber insurers after a major cyberattack. A Kosovo national has been extradited to the U.S. for allegedly running an illegal online marketplace. CISA will continue alerts on its website following industry backlash. On our Industry Voices segment, Neil Hare-Brown, CEO at STORM Guidance, discusses Cyber Incident Response (CIR) retainer service provision. Shoring up the future of the CVE program. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, we are joined by Neil Hare-Brown, CEO at STORM Guidance, discussing Cyber Incident Response (CIR) retainer service provision. You can learn more here. Selected Reading Microsoft Patch Tuesday security updates for May 2025 fixed 5 actively exploited zero-days (Security Affairs) SAP patches second zero-day flaw exploited in recent attacks (Bleeping Computer) Ivanti fixes EPMM zero-days chained in code execution attacks (Bleeping Computer) Fortinet fixes critical zero-day exploited in FortiVoice attacks (Bleeping Computer) Vulnerabilities Patched by Juniper, VMware and Zoom (SecurityWeek) ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact (SecurityWeek) Adobe Patches Big Batch of Critical-Severity Software Flaws (SecurityWeek) Ghost in the machine? Rogue communication devices found in Chinese inverters (Reuters) New Intel CPU flaws leak sensitive data from privileged memory (Bleeping Computer) M&S cyber insurance payout to be worth up to £100mn (Financial Times) US extradites Kosovo national charged in operating illegal online marketplace (The Record) CISA Planned to Kill .Gov Alerts. Then It Reversed Course. (Data BreachToday) CVE Foundation eyes year-end launch following 11th-hour rescue of MITRE program (CyberScoop) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Join host Nick Schutt on Robots & Red Tape as he sits down with Christopher Teixeira, Principal Data Scientist at MITRE, to explore the critical role of data quality in powering AI-driven decisions for public health and human welfare.Dive into the complexities of building reliable AI models in high-stakes environments, where data integrity can mean the difference between success and unintended consequences. In this thoughtful conversation, discover:How MITRE leverages high-quality data to support agencies like the CDC and CMS, driving impactful public health outcomes.Real-world lessons from Chris's career, including how strategic data selection can optimize AI performance without sacrificing accuracy.The importance of diverse teams and continuous model evaluation to ensure ethical, effective AI applications.Strategies for balancing AI's potential with human oversight to address challenges in child welfare and beyond.Ideal for data scientists, policymakers, and tech enthusiasts eager to understand how AI and data can shape a better future when guided by rigor and responsibility.#AI #DataScience #PublicHealth #ChildWelfare #MITRE #RobotsAndRedTape #TechForGood #DataQuality #EthicalAI #GovTech #Innovation #TechnologyPodcast #ArtificialIntelligence #Podcast #GovernmentInnovation #AIEthics #DataDriven #PublicSector #NextGenAI
During the first Trump administration, MITRE led a team that proposed a new solution to the shortage of cybersecurity analysts--hiring neurodistinct individuals. The team launched successful pilot projects with NGA and then CISA. The new Trump administration terminated the contract just prior to completion but the lessons learned are still available. Here with those lessons, Board Director at Melwood, Jim Cook.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. Cast: Thomas Rid (https://sais.jhu.edu/users/trid2), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) and Ryan Naraine (https://twitter.com/ryanaraine). Costin Raiu (https://twitter.com/craiu) is away this week.
Today we're talking about swimming and so we went to the London Aquatics Center in Stratford, located in the Queen Elizabeth Olympic Park. Obviously the venue for the London 2012 Olympics and Paralympic games, but also the Aquatics GB Swimming Championships, which were on while we were there.It was an opportunity to talk about the sport in detail from lots of different angles with Aquatics GB's Chief Executive Drew Barrand and Simon Rowe, whose role is Senior Vice President at Pentland Brands, which includes things like Mitre, Canterbury, but also Speedo, who are an official partner of Aquatics GB.You are hear because it's a swimming competition. You'll hear a load of noise in the background, but ignore that. The conversation was really good.Unofficial Partner is the leading podcast for the business of sport. A mix of entertaining and thought provoking conversations with a who's who of the global industry. To join our community of listeners, sign up to the weekly UP Newsletter and follow us on Twitter and TikTok at @UnofficialPartnerWe publish two podcasts each week, on Tuesday and Friday. These are deep conversations with smart people from inside and outside sport. Our entire back catalogue of 400 sports business conversations are available free of charge here. Each pod is available by searching for ‘Unofficial Partner' on Apple, Spotify, Google, Stitcher and every podcast app. If you're interested in collaborating with Unofficial Partner to create one-off podcasts or series, you can reach us via the website.
April has been a busy month for tech news – we recorded this episode with a week left in the month, but there's already so much to discuss.A major upset in the international database for tracking vulnerabilities had some in the cybersecurity field stunned – until a last minute U-turn.Elsewhere, AWS is the latest hyperscaler to roll back on data center plans, but what does this mean for the market?In this episode Jane and Rory speak once again to Ross Kelly, ITPro's news and analysis editor, to unpack some of the most noteworthy April news.Read more:MITRE CVE program handed last minute reprieve amid funding lapse concernsThird time lucky? Microsoft finally begins roll-out of controversial Recall featureMicrosoft's Recall delayed once again as roll-out fiasco continuesNew Microsoft Recall feature is a 'security nightmare' and could make Copilot+ PCs a top target for cyber criminalsFirst Microsoft, now AWS: Why tech giants are hitting the brakes on costly data center plansAnalysts think Microsoft's data center rollback is bad news for the AI boom – but the company says not to worry
Send us a textThe tech world gives and takes away as Google introduces CloudWAN while MITRE nearly loses CVE funding, showcasing both innovation and vulnerability in our digital infrastructure landscape. Politics increasingly intersects with technology as we examine controversial security clearance revocations alongside much-needed technical improvements in cloud networking.• Google Cloud Next introduces CloudWAN service with two use cases: high-performance data center connectivity and premium branch networking• Google's approach differs from AWS, encouraging single global VPC deployments across regions• MITRE loses funding for the CVE program, threatening the global vulnerability tracking system• CISA provides 11-month bridge funding, but fragmentation begins as EU launches alternative vulnerability tracking• Azure announces general availability of route maps for Virtual WAN, bringing traditional networking capabilities to cloud• Former CISA director Chris Krebs targeted in federal investigation for debunking 2020 election fraud claims• Security clearance revocations increasingly used as political weapons against technology professionalsSubscribe to Cables to Clouds Fortnightly News and tell a friend about the show to stay informed about the evolving cloud technology landscape.Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
“Shift Left” is a popular phrase in software development used to represent the idea of prioritizing certain tasks earlier in the life cycle process to avoid or easily identify potential problems before it moves on. This week on Feds At The Edge, we ask the question – What does it take and what does it really mean to “shift left.” Our expert guests share practical insights on tackling the complex realities of modern software design and deployment. Amit Madan, Chief Architect, Center for Enterprise Modernization at Mitre, recommends preparing for potential gaps when integrating legacy systems with modern, cloud-based solutions—and ensuring clear delineation of security responsibilities between agencies and cloud providers. Eoghan Casey, Field CTO for Own, offers a compelling take on risk: sometimes, staying put poses more danger than moving forward. He highlights the need for early collaboration with security professionals and stresses the value of cross-agency knowledge sharing to foster a culture of security grounded in risk management and compliance. Tune in on your favorite podcasting platform today to learn how federal teams are embedding security into every step of the software lifecycle—right from the start.
Forecast = Prepare for scattered CVEs, rising bot storms, and real-time threat lightning. Keep your digital umbrellas handy! On this episode of Storm⚡️Watch, we're breaking down the latest shifts in the vulnerability tracking landscape, starting with the ongoing turbulence in the CVE program. As the MITRE-run CVE system faces funding uncertainty and a potential transition to nonprofit status, the global security community is rapidly adapting. New standards and databases are emerging to fill the gaps—Europe's ENISA is rolling out the EU Vulnerability Database to ensure regional control, while China continues to operate its own state-mandated systems. Meanwhile, the CVE ecosystem's chronic delays and the NVD's new “Deferred” status for tens of thousands of older vulnerabilities are pushing teams to look elsewhere for timely, enriched vulnerability data. Open-source projects like OSV.dev and commercial players such as VulnCheck and Snyk are stepping up, offering real-time enrichment, exploit intelligence, and predictive scoring to help organizations prioritize what matters most. The result is a fragmented but innovative patchwork of regional, decentralized, open-source, and commercial solutions, with hybrid approaches quickly becoming the norm for defenders worldwide. We're also diving into Imperva's 2024 Bad Bot Report, which reveals that nearly a third of all internet traffic last year came from malicious bots. These bots are getting more sophisticated—using residential proxies, mimicking human behavior, and bypassing traditional defenses. The report highlights a surge in account takeover attacks and shows that industries like entertainment and retail are especially hard hit, with bot traffic now outpacing human visitors in some sectors. The rise of simple bots, fueled by easy-to-use AI tools, is reshaping the threat landscape, while advanced and evasive bots continue to challenge even the best detection systems. On the threat intelligence front, GreyNoise has just launched its Global Observation Grid—now the largest deception sensor network in the world, with thousands of sensors in over 80 countries. This expansion enables real-time, verifiable intelligence on internet scanning and exploitation, helping defenders cut through the noise and focus on the threats that matter. GreyNoise's latest research shows attackers are exploiting vulnerabilities within hours of disclosure, with a significant portion of attacks targeting legacy flaws from years past. Their data-driven insights are empowering security teams to prioritize patching and response based on what's actually being exploited in the wild, not just theoretical risk. We're also spotlighting Censys and its tools for tracking botnets and advanced threats, including collaborative projects with GreyNoise and CursorAI. Their automated infrastructure mapping and pivoting capabilities are helping researchers quickly identify related malicious hosts and uncover the infrastructure behind large-scale attacks. Finally, VulnCheck continues to bridge the gap during the CVE program's uncertainty, offering autonomous enrichment, real-time exploit tracking, and comprehensive coverage—including for CVEs that NVD has deprioritized. Their Known Exploited Vulnerabilities catalog and enhanced NVD++ service are giving defenders a broader, faster view of the threat landscape, often surfacing critical exploitation activity weeks before it's reflected in official government feeds. As the vulnerability management ecosystem splinters and evolves, organizations are being forced to rethink their strategies—embracing a mix of regional, open-source, and commercial intelligence to maintain visibility and stay ahead of attackers. The days of relying on a single source of truth for vulnerability data are over, and the future is all about agility, automation, and real-time insight. Storm Watch Homepage >> Learn more about GreyNoise >>
Topics covered in this episode: Huly CVE Foundation formed to take over CVE program from MITRE drawdb 14 Advanced Python Features Extras Joke Watch on YouTube About the show Sponsored by Posit Workbench: pythonbytes.fm/workbench Connect with the hosts Michael: @mkennedy@fosstodon.org / @mkennedy.codes (bsky) Brian: @brianokken@fosstodon.org / @brianokken.bsky.social Show: @pythonbytes@fosstodon.org / @pythonbytes.fm (bsky) Join us on YouTube at pythonbytes.fm/live to be part of the audience. Usually Monday at 10am PT. Older video versions available there too. Finally, if you want an artisanal, hand-crafted digest of every week of the show notes in email form? Add your name and email to our friends of the show list, we'll never share it. Michael #1: Huly All-in-One Project Management Platform (alternative to Linear, Jira, Slack, Notion, Motion) If you're primarily interested in self-hosting Huly without the intention to modify or contribute to its development, please use huly-selfhost. Manage your tasks efficiently with Huly's bidirectional GitHub synchronization. Use Huly as an advanced front-end for GitHub Issues and GitHub Projects. Connect every element of your workflow to build a dynamic knowledge base. Everything you need for productive team work: Team Planner • Project Management • Virtual Office • Chat • Documents • Inbox Self hosting as a service: elest.io Brian #2: CVE Foundation formed to take over CVE program from MITRE Back story: CVE, global source of cybersecurity info, was hours from being cut by DHS The 25-year-old CVE program, an essential part of global cybersecurity, is cited in nearly any discussion or response to a computer security issue. CVE was at real risk of closure after its contract was set to expire on April 16. The nonprofit MITRE runs CVE on a contract with the DHS. A letter last Tuesday sent Tuesday by Yosry Barsoum, vice president of MITRE, gave notice of the potential halt to operations. Another possible victim of the current administration. CVE Foundation Launched to Secure the Future of the CVE Program CVE Board members have spent the past year developing a strategy to transition CVE to a dedicated, non-profit foundation. The new CVE Foundation will focus solely on continuing the mission of delivering high-quality vulnerability identification and maintaining the integrity and availability of CVE data for defenders worldwide. Over the coming days, the Foundation will release more information about its structure, transition planning, and opportunities for involvement from the broader community. Michael #3: drawdb Free and open source, simple, and intuitive database design editor, data-modeler, and SQL generator. Great drag-drop relationship manager Define your DB visually, export as SQL create scripts Or import existing SQL to kickstart the diagramming. Brian #4: 14 Advanced Python Features Edward Li Picking some favorites 1. Typing Overloads 2. Keyword-only and Positional-only Arguments 9. Python Nitpicks For-else statements Walrus operator Short Circuit Evaluation Operator Chaining Extras Michael: Thunderbird send / other firefox things. Joke: Python Tariffs Thanks wagenrace Thanks Campfire Tales
HR Chatbots, MITRE, 4chan, Oracle, Identity, Port 53, NTLM, Zambia, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-469
Drex covers three critical security stories: the government's reversal of its decision to defund Mitre's Common Vulnerability and Exposure (CVE) program, a ransomware attack on DaVita's 3,100+ dialysis facilities across 14 countries, and former CISA Assistant Director Chris Krebs' resignation from Sentinel One following an executive order targeting him.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
HR Chatbots, MITRE, 4chan, Oracle, Identity, Port 53, NTLM, Zambia, Josh Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-469
HR Chatbots, MITRE, 4chan, Oracle, Identity, Port 53, NTLM, Zambia, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-469
Chris Krebs resigns from SentinelOne and vows to fight, the Thai army and police doxed pro-democracy dissidents, CISA extends MITRE's CVE contract, and Apple patches two iOS zero-days. Show notes
HR Chatbots, MITRE, 4chan, Oracle, Identity, Port 53, NTLM, Zambia, Josh Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-469
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities. Many of the critical updates are already known vulnerabilities in open-source software like Apache and Nginx ingress. https://www.oracle.com/security-alerts/cpuapr2025.html Oracle Breach Guidance CISA released guidance for users affected by the recent Oracle cloud breach. The guidance focuses on the likely loss of passwords. https://www.cisa.gov/news-events/alerts/2025/04/16/cisa-releases-guidance-credential-risks-associated-potential-legacy-oracle-cloud-compromise Google Chrome Update A Google Chrome update released today fixes two security vulnerabilities. One of the vulnerabilities is rated as critical. https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_15.html CVE Updates CISA extended MITRE s funding to operate the CVE numbering scheme. However, a number of other organizations announced that they may start alternative vulnerability registers. https://euvd.enisa.europa.eu/ https://gcve.eu/ https://www.thecvefoundation.org/
Three Buddy Problem - Episode 42: We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games. Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days. Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs' exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
MITRE gets last-minute bailout from CISA Krebs exits SentinelOne after security clearance pulled Apple fixes two zero-days exploited in targeted iPhone attacks Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. For the stories behind the headlines, visit CISOseries.com. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, And helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines.
❤️ Visite nossa campanha de financiamento coletivo e nos apoie!
The CVE program gets a last-minute reprieve. A federal whistleblower alleges a security breach at the NLRB. Texas votes to spin up their very own Cyber Command. BreachForums suffers another takedown. A watchdog group sues the federal government over SignalGate allegations. The SEC Chair reveals a 2016 hack. ResolverRAT targets the healthcare and pharmaceutical sectors worldwide. Microsoft warns of blue screen crashes following recent updates. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. 4chan gets Soyjacked. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. Today's question comes from N2K's EC-Council Certified Ethical Hacker CEH (312-50) Practice Test. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Selected Reading Funding Expires for Key Cyber Vulnerability Database (Krebs on Security) CISA extends funding to ensure 'no lapse in critical CVE services' (Bleeping Computer) CVE Foundation (CVE Foundation) NoVa govcon firm Mitre to lay off 442 employees after DOGE cuts contracts (Virginia Business) Federal employee alleges DOGE activity resulted in data breach at labor board (NBC News) Whistleblower claims DOGE took sensitive data - now he's being hounded by threatening notes (CNN via YouTube) New state agency to deal with cyber threats advances in Texas House (Texarkana Gazette) BreachForums taken down by the FBI? Dark Storm hackers say they did it “for fun” (Cybernews) Here's What Happened to Those SignalGate Messages (WIRED) After breach, SEC says hackers used stolen data to buy stocks (CNET) New ResolverRAT malware targets pharma and healthcare orgs worldwide (Bleeping Computer) Microsoft warns of blue screen crashes caused by April updates (Bleeping Computer) Infamous message board 4chan taken down following major hack (Bleeping Computer) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/Online%20Services%20Again%20Abused%20to%20Exfiltrate%20Data/31862 OpenSSH 10.0 Released OpenSSH 10.0 was released. This release adds quantum-safe ciphers and the separation of authentication services into a separate binary to reduce the authentication attack surface. https://www.openssh.com/releasenotes.html#10.0p1 Apache Roller Vulnerability Apache Roller addressed a vulnerability. Its CVSS score of 10.0 appears inflated, but it is still a vulnerability you probably want to address. https://lists.apache.org/thread/4j906k16v21kdx8hk87gl7663sw7lg7f CVE Funding Changes Mitre s government contract to operate the CVE system may run out tomorrow. This could lead to a temporary disruption of services, but the system is backed by a diverse board of directors representing many large companies. It is possible that non-government funding sources may keep the system afloat for now. https://www.cve.org/
On this week's show Patrick Gray talks to former NSA Cybersecurity Director Rob Joyce about Donald Trump's unprecedented, unwarranted and completely bonkers political persecution of Chris Krebs and his employer SentinelOne. They also talk through the week's cybersecurity news, covering: Mitre's stewardship of the CVE database gets its funding DOGE'd The US signs on to the Pall Mall anti-spyware agreement China tries to play the nationstate cyber-attribution game, but comedically badly Hackers run their malware inside the Windows sandbox, for security against EDR This week's episode is sponsored by open source identity provider Authentik. CEO Fletcher Heisler joins to talk through the increasing sprawl of the identity ecosystem. This episode is also available on Youtube. Show notes Cybersecurity industry falls silent as Trump turns ire on SentinelOne | Reuters U.S. cyber defenders shaken by Trump's attack on their former boss Trump Revenge Tour Targets Cyber Leaders, Elections – Krebs on Security Wyden to block Trump's CISA nominee until agency releases report on telecoms' ‘negligent cybersecurity' | The Record from Recorded Future News Gabbard sets up DOGE-style team to cut costs, uncover intel ‘weaponization' MITRE Warns CVE Program Faces Disruption Amid US Funding Uncertainty US to sign Pall Mall pact aimed at countering spyware abuses | The Record from Recorded Future News Court document reveals locations of WhatsApp victims targeted by NSO spyware | TechCrunch Spyware Maker NSO Group Is Paving a Path Back Into Trump's America | WIRED NCSC shares technical details of spyware targeting Uyghur, Tibetan and Taiwanese groups | The Record from Recorded Future News Risky Bulletin: Chinese APT abuses Windows Sandbox to go invisible on infected hosts China escalates cyber fight with U.S., names alleged NSA hackers Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs - Ars Technica China-based SMS Phishing Triad Pivots to Banks – Krebs on Security Risky Bulletin: CA/B Forum approves 47-days TLS certs Ransomware in het mkb: Cybercriminelen verhogen losgeld bij cyberverzekering 4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War
Nvidia announces a $5.5 billion charge tied to exports of H20 AI chips, Meta reportedly offered FTC $1B to settle current case, Grok AI chatbot now includes Grok Studio for docs, code, and apps. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none ofContinue reading "CISA Will Extend Funding to Mitre For the CVE Program – DTH"
CISA issued a statement that it execution an option on its contract with MITRE to continue funding the CVE program.
MITRE corporation says funding cuts will impact the CVE database, China accuses NSA employees of an Asian Winter Games hack, a ransomware attack disrupts dialysis clinics, the CA/Browser Forum will limit TLS certificate lifetime to 47 days, and 4chan gets hacked. Show notes
Explore actionable strategies for building a robust cyber resilience posture in this insightful episode. From strengthening defenses to improving recovery agility and anticipating future cybersecurity trends, this conversation delivers practical insights to help you stay a step ahead in protecting your digital landscape.
El trauma es ineludible. Cuando el dolor se encarna en la mente (y se ensaña especialmente con la de los niños) es casi imposible expulsarlo. Por eso la narradora de este cuento, una mujer ya adulta, ve al padre y su presente se desacomoda: vuelve a tener ocho años, a chocar de frente con la herida aún abierta. La perra, de la escritora mexicana Socorro Venegas, fue presentado en el marco del festival Benengeli, la Semana internacional de las letras en español 2023, organizado por el Instituto Cervantes. +++++++++++++++++++++++++++ Pre producción y voz: CECILIA BONA Editó este episodio: DANY FERNÁNDEZ (@danyrap.f) para @activandoproducciones.proyecto ⚙️ Producción: XIMENA GONZALEZ @ximegonzal3z ++++++++++++++++++++++++++++++++++ ¿Te gustaría patrocinar POR QUÉ LEER? Conocé cómo en https://porqueleer.com/patrocina ++++++++++++++++++++++++++++++++++ Soy Cecilia Bona y creé Por qué leer para promover el placer por la lectura. ¿Ya me seguís en redes? ⚡https://instagram.com/porqueleerok ⚡https://twitter.com/porqueleerok ⚡https://www.facebook.com/porqueleerok/ Qué es POR QUÉ LEER Por qué leer es un proyecto multiplataforma que promueve el placer por la lectura. La idea es contagiar las ganas de leer mediante recomendaciones, reseñas y debates. ¡Cada vez somos más! CECILIA BONA Soy periodista, productora y creadora de contenidos. Trabajé en radios como MITRE, VORTERIX y CLUB OCTUBRE. Amo leer desde pequeña, incentivada especialmente por mi mamá. En Por qué leer confluyen muchas de mis pasiones -la radio, la edición de video, la comunicación- y por eso digo que está hecho con muchísimo amor.
Deborah Youmans, CIO at MITRE Corp., joins host Maryfran Johnson for this CIO Leadership Live interview. They discuss cyber incidents, enterprise data governance and GenAI success, leveraging 'outsider' CIO status to encourage more IT innovation, coping with nonstop federal regulatory requirements and more.
⬥GUEST⬥Allie Mellen, Principal Analyst, Forrester | On LinkedIn: https://www.linkedin.com/in/hackerxbella/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥In this episode, Allie Mellen, Principal Analyst on the Security and Risk Team at Forrester, joins Sean Martin to discuss the latest results from the MITRE ATT&CK Ingenuity Evaluations and what they reveal about detection and response technologies.The Role of MITRE ATT&CK EvaluationsMITRE ATT&CK is a widely adopted framework that maps out the tactics, techniques, and procedures (TTPs) used by threat actors. Security vendors use it to improve detection capabilities, and organizations rely on it to assess their security posture. The MITRE Ingenuity Evaluations test how different security tools detect and respond to simulated attacks, helping organizations understand their strengths and gaps.Mellen emphasizes that MITRE's evaluations do not assign scores or rank vendors, which allows security leaders to focus on analyzing performance rather than chasing a “winner.” Instead, organizations must assess raw data to determine how well a tool aligns with their needs.Alert Volume and the Cost of Security DataOne key insight from this year's evaluation is the significant variation in alert volume among vendors. Some solutions generate thousands of alerts for a single attack scenario, while others consolidate related activity into just a handful of actionable incidents. Mellen notes that excessive alerting contributes to analyst burnout and operational inefficiencies, making alert volume a critical metric to assess.Forrester's analysis includes a cost calculator that estimates the financial impact of alert ingestion into a SIEM. The results highlight how certain vendors create a massive data burden, leading to increased costs for organizations trying to balance security effectiveness with budget constraints.The Shift Toward Detection and Response EngineeringMellen stresses the importance of detection engineering, where security teams take a structured approach to developing and maintaining high-quality detection rules. Instead of passively consuming vendor-generated alerts, teams must actively refine and tune detections to align with real threats while minimizing noise.Detection and response should also be tightly integrated. Forrester's research advocates linking every detection to a corresponding response playbook. By automating these processes through security orchestration, automation, and response (SOAR) solutions, teams can accelerate investigations and reduce manual workloads.Vendor Claims and the Reality of Security ToolsWhile many vendors promote their performance in the MITRE ATT&CK Evaluations, Mellen cautions against taking marketing claims at face value. Organizations should review MITRE's raw evaluation data, including screenshots and alert details, to get an unbiased view of how a tool operates in practice.For security leaders, these evaluations offer an opportunity to reassess their detection strategy, optimize alert management, and ensure their investments in security tools align with operational needs.For a deeper dive into these insights, including discussions on AI-driven correlation, alert fatigue, and security team efficiency, listen to the full episode.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/hackerxbella_go-beyond-the-mitre-attck-evaluation-to-activity-7295460112935075845-N8GW/Blog | Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes: https://www.forrester.com/blogs/go-beyond-the-mitre-attck-evaluation-to-the-true-cost-of-alert-volumes/⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Common Crawl includes Common Leaks The "Common Crawl" dataset, a large dataset created by spidering website, contains as expected many API keys and other secrets. This data is often used to train large language models https://trufflesecurity.com/blog/research-finds-12-000-live-api-keys-and-passwords-in-deepseek-s-training-data Github Repositories Exposed by Copilot As it is well known, Github's Copilot is using data from public GitHub repositories to train it's model. However, it appears that repositories who were briefly left open and later made private have been included as well, allowing Copilot users to retrieve files from these repositories. https://www.lasso.security/blog/lasso-major-vulnerability-in-microsoft-copilot MITRE Caldera Framework Allows Unauthenticated Code Execution The MITRE Caldera adversary emulation framework allows for unauthenticted code execution by allowing attackers to specify compiler options https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e modsecurity Rule Bypass Attackers may bypass the modsecurity web application firewall by prepending encoded characters with 0. https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-42w7-rmv5-4x2j
In this insightful episode, we delve into the unique journey of Dan Ward, a Senior Principal Systems Engineer at MITRE, former Air Force Lieutenant Colonel, and author of four books, including The Simplicity Cycle and Fire. Dan reflects on his innovative career, spanning military service, systems engineering, and prolific writing, sharing lessons on catalyzing change and simplifying complexity.Dan's anecdotes illuminate key ideas: the transformative power of collaboration—“a catalyst by themselves is just powder in a jar”—and the importance of fostering a culture that celebrates learning from failure. He introduces the concept of “failure cake,” a practice his team developed to destigmatize failure by celebrating attempts and extracting lessons with humor and camaraderie.A firm believer in the power of writing, Dan calls on professionals to contribute to their fields, using his own journey as a guidepost. With practical insights and humor, he explains how writing a book is not just achievable but transformative, offering “book math” as a framework for aspiring authors.Whether it's through his viral article Build Droids, Not Death Stars, his “Green Pen Squad” initiative, or MITRE's free innovation toolkit, Dan exemplifies how leaders can simplify, inspire, and innovate. Tune in for actionable wisdom on leadership, storytelling, and building teams that thrive on collaboration and resilience.Check out "Build Droids Not Death Stars", an articule that Dan wrote that went viral and led to his first book, was inspired by his daughters.Check out The MITRE Innovation Toolkit to support innovation created by a group of Catalysts that Dan brought together.Original music by Lynz Floren.
A major employee screening provider discloses a data breach affecting over 3.3 million people. Signal considers exiting Sweden over a proposed law that would give police access to encrypted messages. House Democrats call out DOGE's negligent cybersecurity practices. Critical vulnerabilities in Rsync allow attackers to execute remote code. A class action lawsuit claims Amazon violates Washington State's privacy laws. CISA warns that attackers are exploiting Microsoft's Partner Center platform. A researcher discovers a critical remote code execution vulnerability in MITRE's Caldera security training platform. An analysis of CISA's JCDC AI Cybersecurity Collaboration Playbook. Ben Yelin explains Apple pulling iCloud end-to-end encryption in response to the UK Government. A Disney employee's cautionary tale. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Caveat podcast co-host Ben Yelin to discuss Apple pulling iCloud end-to-end encryption in response to the UK Government. You can read the article from Bleeping Computer here. Ben is the Program Director for Public Policy & External Affairs at University of Maryland Center for Health and Homeland Security. You can catch Caveat every Thursday here on the N2K CyberWire network and on your favorite podcast app. Selected Reading 3.3 Million People Impacted by DISA Data Breach (SecurityWeek) DOGE must halt all ‘negligent cybersecurity practices,' House Democrats tell Trump (The Record) Signal May Exit Sweden If Government Imposes Encryption Backdoor (Infosecurity Magazine) Rsync Vulnerabilities Let Hackers Gain Full Control of Servers - PoC Released (Cyber Security News) Lawsuit: Amazon Violates Washington State Health Data Law (BankInfo Security) CISA Warns of Microsoft Partner Center Access Control Vulnerability Exploited in Wild (Cyber Security News) MITRE Caldera security suite scores perfect 10 for insecurity (The Register) CISA's AI cybersecurity playbook calls for greater collaboration, but trust is key to successful execution (CyberScoop) A Disney Worker Downloaded an AI Tool. It Led to a Hack That Ruined His Life. (Wall Street Journal) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Chief Teriyaki Officer Willy Wonka and Charlie Choccie PhD (Business) destroy beloved childhood memories. LINKS Buy tickets to our DREM World Tour https://tour.auntydonna.com/ Follow @theauntydonnagallery on Instagram https://bit.ly/auntydonna-ig Become a Patreon supporter at http://auntydonnaclub.com/ CREDITS Hosts: Broden Kelly, Zachary Ruane, & Mark Bonanno Producer: Lindsey Green Digital Producers: Nick Barrett, Jim Cruse & Tanya Zerek Managing Producer: Sam Cavanagh Join The Aunty Donna Club: https://www.patreon.com/auntydonnaSee omnystudio.com/listener for privacy information.
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the ongoing battle between governments and tech companies over encryption, focusing on Apple's recent response to the UK government's demands for access to iCloud data. They explore the implications of Apple's decision to disable advanced data protection for UK users and the broader context of encryption in cybersecurity. The conversation then shifts to the latest MITRE evaluation of endpoint protection platforms, highlighting Microsoft's performance and the challenges of the evaluation methodology. In this conversation, Andy Jaw and Adam Brewer delve into the complexities of cybersecurity, focusing on the limitations of current testing methods, the importance of realistic evaluations, and the need for a shared responsibility culture within organizations. They critique the MITRE evaluation process, discuss the shortcomings of phishing simulations, and emphasize the necessity of integrating security into the organizational culture to foster collaboration rather than hostility between security teams and users.----------------------------------------------------YouTube Video Link: https://youtu.be/TL_cu-vnu58----------------------------------------------------Documentation:https://www.theverge.com/policy/612136/uk-icloud-investigatory-powers-act-war-on-encryptionhttps://arstechnica.com/tech-policy/2025/02/apple-pulls-data-protection-tool-instead-of-caving-to-uk-demand-for-a-backdoor/https://www.microsoft.com/en-us/security/blog/2024/12/11/microsoft-defender-xdr-demonstrates-100-detection-coverage-across-all-cyberattack-stages-in-the-2024-mitre-attck-evaluations-enterprise/https://www.wsj.com/tech/cybersecurity/phishing-tests-the-bane-of-work-life-are-getting-meaner-76f30173----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube:https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
Our guest today is Jacques Sabrie, a Principal at MITRE, a non-profit organization that operates federally funded research and development centers, which power advances in national defense and security. Mr. Sabrie has been instrumental in coordinating efforts with the National Geospatial-Intelligence Agency (NGA), leveraging his extensive experience in systems engineering and global intelligence, surveillance, and reconnaissance (ISR). Listen as Mr. Sabrie discusses how technology affects great power competition, how we balance innovation with security concerns, and the skills needed to work in national security and intelligence. What role does technology play in this shifting landscape? How do we balance innovation with security concerns, especially when dealing with emerging technologies? What are the key skills that young professionals should develop if they want to work in national security and intelligence? Learn all this, and more, in this episode of In the Interest of National Security.
We've got a few compelling topics to discuss within SecOps today. First, Tim insists it's possible to automate a large amount of SecOps work, without the use of generative AI. Not only that, but he intends to back it up by tracking the quality of this automated work with an ISO standard unknown to cybersecurity. I've often found useful lessons and wisdom outside security, so I get excited when someone borrows from another, more mature industry to help solve problems in cyber. In this case, we'll be talking about Acceptable Quality Limits (AQL), an ISO standard quality assurance framework that's never been used in cyber. Segment Resources: Introducing AQL for cyber. AQL - How we do it An AQL 'calculator' you can play around with We couldn't decide what to talk to Allie about, so we're going with a bit of everything. Don't worry - it's all related and ties together nicely. First, we'll discuss AI and automation in the SOC - Allie is covering this trend closely, and we want to know if she's seeing any results yet here. Next, we'll discover SecOps data management - the blood that delivers oxygen to the SOC muscles. Finally, we'll discuss MITRE's recent EDR evaluations - there was some contention around some vendors claiming to ace the test and we're going to get the tea on what's really going on here! For each of these three topics, these are the blog posts they correspond with if you want to learn more: Generative AI Will Not Fulfill Your Autonomous SOC Hopes (Or Even Your Demo Dreams) If You're Not Using Data Pipeline Management For Security And IT, You Need To Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes In this week's enterprise security news, we've got 5 acquisitions Tines gets funding new tools and DFIR reports to check out A legal precedent that could hurt AI companies AI garbage is in your code repos the dark side of security leadership HIPAA fines are broken Salt Typhoon is having a great time Don't use ChatGPT for legal advice!!!!! All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-394
We've got a few compelling topics to discuss within SecOps today. First, Tim insists it's possible to automate a large amount of SecOps work, without the use of generative AI. Not only that, but he intends to back it up by tracking the quality of this automated work with an ISO standard unknown to cybersecurity. I've often found useful lessons and wisdom outside security, so I get excited when someone borrows from another, more mature industry to help solve problems in cyber. In this case, we'll be talking about Acceptable Quality Limits (AQL), an ISO standard quality assurance framework that's never been used in cyber. Segment Resources: Introducing AQL for cyber. AQL - How we do it An AQL 'calculator' you can play around with We couldn't decide what to talk to Allie about, so we're going with a bit of everything. Don't worry - it's all related and ties together nicely. First, we'll discuss AI and automation in the SOC - Allie is covering this trend closely, and we want to know if she's seeing any results yet here. Next, we'll discover SecOps data management - the blood that delivers oxygen to the SOC muscles. Finally, we'll discuss MITRE's recent EDR evaluations - there was some contention around some vendors claiming to ace the test and we're going to get the tea on what's really going on here! For each of these three topics, these are the blog posts they correspond with if you want to learn more: Generative AI Will Not Fulfill Your Autonomous SOC Hopes (Or Even Your Demo Dreams) If You're Not Using Data Pipeline Management For Security And IT, You Need To Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes In this week's enterprise security news, we've got 5 acquisitions Tines gets funding new tools and DFIR reports to check out A legal precedent that could hurt AI companies AI garbage is in your code repos the dark side of security leadership HIPAA fines are broken Salt Typhoon is having a great time Don't use ChatGPT for legal advice!!!!! All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-394
About Dr. Brian Anderson:Dr. Brian Anderson is a leading voice in health AI as CEO and Co-Founder of the Coalition for Health AI (CHAI), guiding the development of national standards for safe and effective AI in healthcare. Formerly Chief Digital Health Physician at MITRE, he spearheaded crucial research initiatives, including advancements in clinical trials and oncology. An internationally recognized expert, Dr. Anderson speaks frequently on digital health, AI assurance, and interoperability. A Harvard Medical School graduate with an MD (honors) and a BA (cum laude), Dr. Anderson trained at Mass General, practiced at Greater Lawrence Family Health Center, and lives in Boston with his family.Things You'll Learn:A significant gap exists in the lack of independent labs to evaluate health AI, as these are already standard practice in other sectors with regulated technologies. The proposed national network of certified labs will fill this gap by providing independent assessments of AI models, promoting trust in their use.AI model cards are crucial for transparency because they detail the training methodologies and ingredients of AI models. This information helps users, such as physicians, make informed decisions about the tool's appropriateness for their patients.Clinicians need upskilling to critically evaluate AI tools and make informed decisions about their use in patient care.Generative AI applications like ambient scribes have the potential to greatly mitigate physician burnout by streamlining administrative tasks. This can give them more time to focus on their patients and improve their work-life balance.The creation of quality assurance labs will be a critical first step in AI regulation, helping to bridge the gap between rapidly evolving technology and established safety standards.Resources:Connect with and follow Dr. Brian Anderson on LinkedIn.Discover more about Coalition for Health AI (CHAI) on their LinkedIn and website.
We couldn't decide what to talk to Allie about, so we're going with a bit of everything. Don't worry - it's all related and ties together nicely. First, we'll discuss AI and automation in the SOC - Allie is covering this trend closely, and we want to know if she's seeing any results yet here. Next, we'll discover SecOps data management - the blood that delivers oxygen to the SOC muscles. Finally, we'll discuss MITRE's recent EDR evaluations - there was some contention around some vendors claiming to ace the test and we're going to get the tea on what's really going on here! For each of these three topics, these are the blog posts they correspond with if you want to learn more: Generative AI Will Not Fulfill Your Autonomous SOC Hopes (Or Even Your Demo Dreams) If You're Not Using Data Pipeline Management For Security And IT, You Need To Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes Show Notes: https://securityweekly.com/esw-394
Andy Jaquith joins us to discuss how to prioritize vulnerabilities and remmediation in the real-world, including asset management and more! In the security news: ESP32s in the wild and security, Google oAuth flaw, DDoS targets, Ban on auto components, Bambu firmware updates, Silk Road founder is free, one last cybersecurity executive order, US Treasury hack update, Mitre launches a new program to deal with naming things, and educational content on Pornhub? (not what you think, its SFW!) Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-858
We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluations, Frank has been working on how best to define and communicate attack language for many years now. The company he founded, Tidal Cyber is in a unique position to both leverage what MITRE has built with ATT&CK and help enterprises operationalize it. Segment Resources: Tidal Cyber website Tidal Cyber Community Edition We're a fan of hacker lore and history here at Security Weekly. In fact, Paul's Security Weekly has interviewed some of the most notable (and notorious) personalities from both the business side of the industry and the hacker community. We're very excited to share this new effort to document hacker history through in-person interviews. The series is called "Where Warlocks Stay Up Late", and is the creation of Nathan Sportsman and other folks at Praetorian. The timing is crucial, as a lot of the original hackers and tech innovators are getting older, and we've already lost a few. References: Check out the Where the Warlocks Stay Up Late website and subscribe to get notified of each episode as it is released Check out the anthropological hacker map and relive your misspent youth! In this latest Enterprise Security Weekly episode, we explored some significant cybersecurity developments, starting with Veracode's acquisition of Phylum, a company specializing in detecting malicious code in open-source libraries. The acquisition sparked speculation that it might be more about Veracode staying relevant in a rapidly evolving market rather than a strategic growth move, especially given the rising influence of AI-driven code analysis tools. We also covered One Password's acquisition of a UK-based shadow IT detection firm, raising interesting questions about their expansion into access management. Notably, the deal involved celebrity investors like Matthew McConaughey and Ashton Kutcher, suggesting a trend where Hollywood influence intersects with cybersecurity branding. A major highlight was the Cyber Haven breach, where a compromised Chrome extension update led to stolen credentials. The attack was executed through a phishing campaign disguised as a Google policy violation warning. To their credit, Cyber Haven responded swiftly, pulling the extension within two hours and maintaining transparency throughout. This incident underscored broader concerns around the poor security of browser extensions, an issue that continues to be exploited due to lax marketplace oversight. We also reflected on Corey Doctorow's concept of "Enshittification," critiquing platforms that prioritize profit and engagement metrics over genuine user experiences. His decision to disable vanity metrics resonated, especially considering how often engagement numbers are inflated in corporate settings. The episode wrapped with a thoughtful discussion on how CISOs can say "no" more effectively, emphasizing "yes, but" strategies and the importance of consistency. We also debated the usability frustrations of "magic links" for authentication, arguing that simpler alternatives like passkeys or multi-factor codes could offer a better balance between security and convenience. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-389