Normal view
-
ZDNet | security RSS
- Microsoft account vs. local account: How to choose and set up your pick in Windows 11
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
-
ZDNet | security RSS
- I used Gmail's AI tool to do hours of work for me in 10 minutes - with 3 prompts
I used Gmail's AI tool to do hours of work for me in 10 minutes - with 3 prompts
-
ZDNet | security RSS
- This Android camera accessory helped me spot a hidden electrical hazard just in time
This Android camera accessory helped me spot a hidden electrical hazard just in time
-
The Register - Security
- 'People's Panel' to check if UK wants controversial Digital ID will cost Β£630K
'People's Panel' to check if UK wants controversial Digital ID will cost Β£630K
We could tell you no for free
The UK government will spend about Β£630,000 running a discussion panel on its digital identity card plans, which minister James Frith said will "consider different perspectives and debate trade-offs" alongside a formal consultation.β¦
-
ZDNet | security RSS
- Why I'm ditching my cheap PC cloning software for this M.2 dock that's highly functional
Why I'm ditching my cheap PC cloning software for this M.2 dock that's highly functional
I used Apple Music's new AI tool to break out of my music rut - and it worked
r/netsec monthly discussion & tool thread
Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.
Rules & Guidelines
- Always maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.
- Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.
- If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.
- Avoid use of memes. If you have something to say, say it with real words.
- All discussions and questions should directly relate to netsec.
- No tech support is to be requested or provided on r/netsec.
As always, the content & discussion guidelines should also be observed on r/netsec.
Feedback
Feedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- AI-Generated Calendar Event Phishing w/ Dynamic Landing Pages
AI-Generated Calendar Event Phishing w/ Dynamic Landing Pages
Itβs crazy how things come full circle more than a decade later.
About a decade ago, I got interested in calendar phishing after seeing Beau Bullockβs work at BHIS. Around that time, I built and shared some of my own Graph API scripts for calendar phishing, added support for it in my open source PhishAPI tool, and even introduced the idea to KnowBe4 so they could eventually bring it into phishing training for clients (which Kevin Mitnick himself used Beau's command-line tool to demonstrate).
I brought it to their attention at a clientβs request after using the technique successfully on them, during a time when calendar phishing was still largely overlooked as a real-world attack path.
Back then, it was still niche enough that plenty of defenders were not thinking about calendar invites as a phishing channel at all.
More than a decade later, Iβm still refining the concept, now as part of the commercial PhishU Framework.
Iβm happy to say the Framework fully supports Calendar Event phishing again, but now in a much more usable way:
Β· Native calendar event workflow
Β· Simple WYSIWYG w/ AI-generated timing suggestions and content
Β· As easy as selecting the Calendar Event template
Β· Automatically tied into training when used in a campaign
Itβs built for red teams and security teams that want realistic phishing assessments, including credential and session capture paths, not just allow-list-only email testing.
[link] [comments]
Block the Prompt, Not the Work: The End of "Doctor No"
Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
-
ZDNet | security RSS
- I tested ChatGPT vs. Claude to see which is better - and if it's worth switching
I tested ChatGPT vs. Claude to see which is better - and if it's worth switching
Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation β Patch Released
-
ZDNet | security RSS
- This Windows PC setting could be limiting your SSD capacity - here's how to regain storage
This Windows PC setting could be limiting your SSD capacity - here's how to regain storage
-
The Hacker News
- 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Donβt See It Coming)
3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Donβt See It Coming)
Authority Encoding Risk (AER)
Most AI discussions focus on correctness.
Accuracy. Alignment. Output quality.
But thereβs a more fundamental problem underneath all of that:
Who β or what β is actually allowed to execute a decision?
---
I just published a paper introducing:
Authority Encoding Risk (AER)
A measurable variable for something most systems donβt track at all:
Authority ambiguity at the moment of execution.
---
Todayβs systems can tell you:
β’ if something is likely correct
β’ if it follows policy
β’ if it appears safe
But they cannot reliably answer:
Is this decision admissible under real-world authority constraints?
---
That gap shows up in:
β’ automation systems
β’ AI-assisted decisions
β’ institutional workflows
β’ underwriting and loss modeling
And right now, itβs largely invisible.
---
The paper breaks down:
β’ how authority ambiguity propagates into risk
β’ why existing frameworks fail to capture it
β’ how it can be measured before loss occurs
---
If youβre working anywhere near AI, risk, infrastructure, or decision systems β this is a layer worth paying attention to.
---
Thereβs a category of risk most AI systems donβt even know exists.
This paper represents an initial formulation.
Ongoing work is focused on tightening definitions, expanding evidence, and strengthening the model.
https://papers.ssrn.com/sol3/papers.cfm?abstract\_id=6229278
[link] [comments]
UK manufacturers under cyber fire with 80% reporting attacks
ESET says factory outages, lost revenue, and supply chain disruption are becoming routine
Nearly 80 percent of British manufacturers say they've been hit by a cyber incident in the past year, as new research suggests disruption on the factory floor is no longer an exception but business as usual.β¦
Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms