#cybersecurity

193 posts · Last used 22m

Back to Timeline
@brian_greenberg@infosec.exchange · 29m ago

An AI coding agent wiped out a company’s entire production database and every backup in just 9 seconds. The AI agent later confessed, in its own words, that it guessed a destructive action would be scoped to the staging environment, didn’t verify, didn’t read the docs, and just did it anyway. 🤦🏻‍♂️ Everyone’s blaming the AI. I’m looking at the humans who handed it the keys. This wasn’t a rogue model. It was a predictable outcome of predictable choices:

  • A CLI token with blanket permissions across all environments
  • Backups stored on the same volume as the data they’re meant to protect
  • A cloud provider whose API executes destructive commands with zero confirmation step
  • An agent given access to production while the team thought it was safely contained in staging

The founder is now manually reconstructing customer bookings from Stripe logs and calendar integrations. Every one of his customers is doing the same because of a 9-second API call. AI agents don’t have judgment. They have instructions and permissions. Whatever permissions you grant, assume they will eventually be used in the worst possible sequence at the worst possible moment. That’s not pessimism, it’s how you architect resilient systems. Separate your environments. Scope your tokens. Store backups offline and off-volume. Require confirmation before any destructive operation. These aren’t AI-era lessons. They’re 30-year-old lessons that people keep skipping because the tooling makes it easy to skip them. The speed AI can act is new. The failure modes underneath it are not. https://www.tomshardware.com/tech-industry/artificial-intelligence/claude-powered-ai-coding-agent-deletes-entire-company-database-in-9-seconds-backups-zapped-after-cursor-tool-powered-by-anthropics-claude-goes-rogue #AI #Cybersecurity #RiskManagement

2
0
1
Boosted by hypebot @hypebot@goingdark.social
@threatresearch@infosec.exchange · 4h ago
Hi folks. It's Andrew with another update on our battle over the "wrong to repair" bill that continues to move through the Colorado legislature, SB26-090. I am asking anyone, but especially those with a background as a cybersecurity practitioner, to please consider submitting written or live/virtual testimony TODAY to the committee who will be hearing this bill, starting at 1:30pm mountain time. This afternoon, in a little under four hours, a House committee will be hearing testimony on the bill. If you have been waiting for your moment, this might be the last chance you have this session to weigh in and express your support for this critical right we may lose in the next few days. Opponents of Colorado's right to repair law, which only came into effect on January 1, include companies like IBM and Cisco Systems. They are making outrageous and counterfactual claims about the right to repair in order to pressure lawmakers into accepting this bill that would exclude any technology classified as "critical infrastructure" as exempt from the right to repair law. One of the most egregiously wrong claims they have repeatedly made is that a "right to repair" items like a firewall somehow makes the products Cisco and IBM sell less safe from a cybersecurity perspective. After the committee hearing last month, I spoke in the hallway with the government affairs person from Cisco. I asked him to explain it to me, a cybersecurity professional, why being able to fix a broken firewall presents a cybersecurity risk. He could not explain it, simply repeating that giving people access to internal schematics in order to let them repair parts in a network edge device somehow presents a risk that adversaries would then be able to more easily reverse-engineer the product. The cybersecurity folks know where this is leading: They are claiming that the obscurity of their documentation about their products is the cybersecurity feature that protects them from attack. Those of us who are practitioners in this space know that obscurity provides no security whatsoever in the long term, and that giving people the ability to replace broken parts, like power supplies, does not threaten the cybersecurity of a router or firewall any more than replacing a power cord. After all, data centers have tight security about who is allowed in or out, and engage with cyber- and physical pentesters to routinely check the security of their facilities. The reality is that the west's biggest adversary, China, already has every model of every firewall on earth in its possession, and has thrown brigades of bodies at them to perform the reverse engineering Cisco claims they want to prevent. That cat is out of the bag. This bill will not provide any cybersecurity protection to any Cisco firewall. As I said to the Cisco lobbyist, if an adversary already has physical access to the device, it's game over. Adversaries don't swap out broken hard drives or power supplies. Beyond that specious argument, there is a secondary problem with the bill: It never defines with any necessary level of detail what comprises "critical infrastructure" - which means that, if a regular, commercial TV set you can buy at Costco is being used as a monitor in a SOC, it's possible that those commercial products will end up lumped into the category of "critical infrastructure." We all know that what makes electronic infrastructure critical is not what it is - phones, laptops, desktops, printers, scanners, even desk lamps - but how and where, and for what purpose it is used What this bill appears to be about, and why Cisco and IBM are fighting to advance it so hard, is that it enables the rent-seeking behavior of companies who want to lock their customers in to expensive annual support contracts, and lock third-party support companies out of the equation. That's literally all this is, a way to defend an ongoing revenue stream. Any arguments other than that make no sense. If you can, please consider testifying in person: The lobbyists have seemingly infinite time and access to these legislators, and have been steamrolling the entire process through, using ridiculous lies and arguments that make no sense to anyone with background as a practitioner. we want to focus on three core messages: This bill is ridiculously broad and would sweep up most IT equipment, limiting repair options for everyone from Fortune 500 companies to small mom-and-pop businesses, schools, hospitals, libraries, universities, local governments, law enforcement agencies and more. It is a false premise to claim that repair tools are a security risk and limiting those tools to the manufacturer's repairers is safer. This bill allows manufacturers to lock out repair competition and monopolize repair for their products; that drives up costs, reduces quality, and can undermine the secondary market. If you can share your personal background and experience and speak to how limiting access to repair tools will not make products safer would be great. You don't need to be a Colorado resident, or even based in the US. Here's how you do it: sign up to testify here: https://sites.coleg.gov/public-testimony/sign-up-to-testify/step-1 Search for SB26-090 Select the bill when it pops up Fill in your details including whether you are testifying in-person or remotely. Please select "Oppose" for your position. Enter your information Show up and, when called, give your two (or three, depending on how many/few sign up) minutes of testimony, and be prepared to answer questions The people pushing this bill are counting on the fact that this is happening in the middle of a workday, when we're all trying to wreck hackers. But this is a case where we, as a community, need to stand up for what's right. Not doing so will make all of our jobs harder in the future. I hope to see you there. #COpolitics #RightToRepair #activism #hackers #cybersecurity #cybersicherheit #cyberseguridad
28
0
94
@ivycyber@privacysafe.social · 15h ago
🛡️ #Cybersecurity news & tips across the #fediverse “House Speaker Mike Johnson proposes a third plan to reauthorize FISA Section 702 surveillance powers before the April 30 deadline, following two failed attempts. https:// worldbriefly.news/johnson-unve ils-third-att...” https://mastodon.social/@worldbrieflynews/116472174668793688 🤖 via RSS feed. Not an endorsement.
0
0
2
@ivycyber@privacysafe.social · 23h ago
🛡️ #Cybersecurity news & tips across the #fediverse “"Palantir has recruited 32 UK government and public sector officials including leaders of AI strategy from both the Ministry of Defence and the NHS, a new investigation by the Nerve reveals. The practice has exposed t...” https://tldr.nettime.org/@remixtures/116471184802285929 🤖 via RSS feed. Not an endorsement.
1
0
2
@ivycyber@privacysafe.social · 1d ago
🛡️ #Cybersecurity news & tips across the #fediverse “The Third Bit: Big Tech is Like the Stasi https:// third-bit.com/2026/04/24/big-t ech-as-stasi/ "People using social media and AI are revealing more about themselves than the Stasi could ever have dreamed of know...” https://mastodon.world/@dominiquec/116467998613978719 🤖 via RSS feed. Not an endorsement.
2
0
2
@ivycyber@privacysafe.social · 1d ago
🛡️ #Cybersecurity news & tips across the #fediverse “I, for one, do not trust a fascist surveillance provider who can't find and remove disloyal employees from their midst. https:// arstechnica.com/tech-policy/20 26/04/palantir-employees-are-talking-about-companys-de...” https://mathstodon.xyz/@maxpool/116465788179714546 🤖 via RSS feed. Not an endorsement.
0
0
2
@ivycyber@privacysafe.social · 1d ago
🛡️ #Cybersecurity news & tips across the #fediverse “"1. Programmers working on the Internet have a moral responsibility to the entire world, not a single country. The Internet has been designed since its inception as a universal system for the sharing of knowledge without...” https://tldr.nettime.org/@remixtures/116465663517274253 🤖 via RSS feed. Not an endorsement.
0
0
0
@ivycyber@privacysafe.social · 1d ago
🛡️ #Cybersecurity news & tips across the #fediverse “Palantir employees are talking about company's "descent into fascism" https://arstechnica.com/tech-policy/2026/04/palantir-employees-are-talking-about-companys-descent-into-fascism/ # Tech # Policy # Surveilla...” https://arstechnica.com/tech-policy/2026/04/palantir-employees-are-talking-about-companys-descent-into-fascism/ 🤖 via RSS feed. Not an endorsement.
0
0
2
@ivycyber@privacysafe.social · 1d ago
🛡️ #Cybersecurity news & tips across the #fediverse “Petition to stop the rollout of # FacialRecognition # surveillance in the UK. The Government and shops are scanning us without clear laws in place, using our faces like barcodes. It feels really invasive. Can yo...” https://climatejustice.social/@RichardAshwell/116464716598308295 🤖 via RSS feed. Not an endorsement.
0
0
2
@ivycyber@privacysafe.social · 2d ago
🛡️ #Cybersecurity news & tips across the #fediverse “Proton CEO warns global age verification push will mean "the death of anonymity online" Protecting children online is crucial, but forcing every user to hand over their ID is a privacy nightmare waiting to happen, accor...” https://mastodon.online/@jonsnow/116463845055240406 🤖 via RSS feed. Not an endorsement.
0
0
2
@ivycyber@privacysafe.social · 2d ago
🛡️ #Cybersecurity news & tips across the #fediverse “Federal Surveillance Tech Becomes Mandatory in New Cars by 2027 Your next car purchase comes with an unwelcome passenger: a federal mandate requiring surveillance technology that monitors your every blink, glance, and h...” https://mastodon.online/@jonsnow/116463796318298616 🤖 via RSS feed. Not an endorsement.
1
0
3
@ivycyber@privacysafe.social · 2d ago
🛡️ #Cybersecurity news & tips across the #fediversehttps://www europesays.com/people/42537/ EU ‘Emoji Crackdown’ Sparks Mockery and Outrage Online # backlash # CriminalActivity # DigitalServicesAct # drug # DSA # emoji # EuropeanCommission # F...” https://pubeurope.com/@people/116463261615838899 🤖 via RSS feed. Not an endorsement.
0
0
2
@ivycyber@privacysafe.social · 2d ago
🛡️ #Cybersecurity news & tips across the #fediverse “RE: https:// flipboard.com/@techradar/vpn-c ybersecurity-securing-your-life-online-lcmnfb0vz/-/a-hl0GxAQ5QkSTHunoY8lhrA%3Aa%3A2416536031-%2F0 ""Rather than enforcing regulations on the companies, we are putting ru...” https://mastodon.world/@mikill/116461602306210693 🤖 via RSS feed. Not an endorsement.
0
0
2
@danielmarsh@social.thepixelspulse.com · 2d ago
ADT has confirmed yet another data breach, with the ShinyHunters group claiming to have exposed millions of customer records including PII. This incident isn't just a one-off; it points to a systemic problem, potentially stemming from social engineering tactics like vishing and compromised SSO accounts into SaaS platforms like Salesforce. The real concern? Data entrusted to a security provider can… https://www.tpp.blog/vwuqge5 #cybersecurity #adt #shinyhunters 🤖 This post was AI-generated.
0
0
0
Boosted by Kevin Karhan @kkarhan@jorts.horse
@teufelswerk@social.tchncs.de · 3d ago
Die italienische Digitalrechtsorganisation Osservatorio Nessuno hat kürzlich eine neue Malware namens Morpheus aufgedeckt. Sie tarnt sich als harmlose Android-Update-App, kann jedoch umfassend Daten von den Geräten der Opfer stehlen, Apps manipulieren und sogar biometrische Daten auslesen, um Accounts wie WhatsApp zu übernehmen. 👇 #spyware #whatsapp #datenschutz #morpheus #cybersecurity #malware https://teufelswerk.net/morpheus-neue-italienische-spyware-kapert-android-geraete-und-alles-bleibt-legal/
2
0
2
@ivycyber@privacysafe.social · 2d ago
🛡️ #Cybersecurity news & tips across the #fediverse “House Bill Proposes Reauthorization of Section 702 Amid Minimal Oversight Changes 📰 Original title: The Latest Push to Extend Key US Spy Powers Is Still a Mess 🤖 IA: It's clickbait ⚠️ 👥 Usuarios: It's clickbait ⚠️ ...” https://mastodon.social/@killbait/116460645382758541 🤖 via RSS feed. Not an endorsement.
0
0
2
Boosted by Kevin Karhan @kkarhan@jorts.horse
@brian_greenberg@infosec.exchange · 3d ago
Trying to be secure... You deleted the app. You turned on disappearing messages. You did everything right. The FBI can still read your Signal messages. Huh? This wasn't a Signal failure. Signal did its job. iOS didn't. The phone was storing notification previews in a database long after the app was gone, because someone turned on Lock Screen message previews. Apple just patched it in iOS 26.4.2, and they only found out about it because a defendant's court case exposed it during testimony. 🔎 This is why privacy promises and privacy architecture are two different things 📲 Update your phone. Not because you're hiding something. Because your phone is quietly keeping receipts you don't know about. ⚠️ And if you're a CISO still telling employees that "just use Signal" is a complete privacy answer, it's time to revisit that conversation. https://www.macrumors.com/2026/04/22/ios-26-4-2-notification-database-security-fix/ #Cybersecurity #Privacy #iOS #InfoSec #Leadership #security #cloud #infosec #AlwaysUpdate
11
1
13
@ivycyber@privacysafe.social · 2d ago
🛡️ #Cybersecurity news & tips across the #fediverse “The Intercept: “We Knew They Were Paying Informants”: SPLC Donors Reject Trump DOJ Fraud Claims https:// theintercept.com/2026/04/24/sp lc-donors-fraud-doj-kash-patel/ Also, Palantir: Palantir Is Helping Trump’s...” https://infosec.exchange/@AAKL/116460594026987032 🤖 via RSS feed. Not an endorsement.
0
0
2
@danielmarsh@social.thepixelspulse.com · 2d ago
Discover the Pack2TheRoot flaw, a high-severity vulnerability (CVE-2026-41651) in PackageKit that has granted local users root access on Linux systems for nearly 12 years. This incident, where AI helped uncover the bug, forces a critical reevaluation of how we audit foundational open-source components. Learn which distributions are affected and why immediate patching to PackageKit 1.3.5 is… https://www.tpp.blog/1ybpbp2 #cybersecurity #pack2theroot #packagekit 🤖 This post was AI-generated.
0
0
0
@ivycyber@privacysafe.social · 2d ago
🛡️ #Cybersecurity news & tips across the #fediverse “"When he drives through his neighborhood now, Brian Page passes rows of police cars and AI‑powered cameras that track nearly every movement. For most of his life, Page, who goes by “Scapegoat Jones,” felt safest in the ...” https://tldr.nettime.org/@remixtures/116460311811321320 🤖 via RSS feed. Not an endorsement.
0
0
2