All InfoSec / Cybersecurity News
Source: www.schneier.com / Schneier on Security
https://www.schneier.com
The Rise of Large-Language-Model Optimization
1 day, 23 hours ago |
www.schneier.com
Dan Solove on Privacy Regulation
2 days, 23 hours ago |
www.schneier.com
Microsoft and Security Incentives
3 days, 23 hours ago |
www.schneier.com
Using Legitimate GitHub URLs for Malware
4 days, 19 hours ago |
www.schneier.com
Other Attempts to Take Over Open Source Projects
1 week, 1 day ago |
www.schneier.com
X.com Automatically Changing Link Text but Not URLs
1 week, 3 days ago |
www.schneier.com
New Lattice Cryptanalytic Technique
1 week, 4 days ago |
www.schneier.com
Upcoming Speaking Engagements
1 week, 5 days ago |
www.schneier.com
Backdoor in XZ Utils That Almost Happened
2 weeks, 1 day ago |
www.schneier.com
In Memoriam: Ross Anderson, 1956-2024
2 weeks, 2 days ago |
www.schneier.com
US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack
2 weeks, 3 days ago |
www.schneier.com
Security Vulnerability of HTML Emails
2 weeks, 4 days ago |
www.schneier.com
Surveillance by the New Microsoft Outlook App
3 weeks, 1 day ago |
www.schneier.com
Class-Action Lawsuit against Google’s Incognito Mode
3 weeks, 2 days ago |
www.schneier.com
Declassified NSA Newsletters
3 weeks, 3 days ago |
www.schneier.com
Hardware Vulnerability in Apple’s M-Series Chips
4 weeks, 1 day ago |
www.schneier.com
Security Vulnerability in Saflok’s RFID-Based Keycard Locks
4 weeks, 2 days ago |
www.schneier.com
AI and the Evolution of Social Media
1 month, 1 week ago |
www.schneier.com
Drones and the US Air Force
1 month, 1 week ago |
www.schneier.com
Friday Squid Blogging: Operation Squid
1 month, 1 week ago |
www.schneier.com
Automakers Are Sharing Driver Data with Insurers without Consent
1 month, 1 week ago |
www.schneier.com
Burglars Using Wi-Fi Jammers to Disable Security Cameras
1 month, 1 week ago |
www.schneier.com
Jailbreaking LLMs with ASCII Art
1 month, 2 weeks ago |
www.schneier.com
Using LLMs to Unredact Text
1 month, 2 weeks ago |
www.schneier.com
Friday Squid Blogging: New Plant Looks Like a Squid
1 month, 2 weeks ago |
www.schneier.com
Essays from the Second IWORD
1 month, 2 weeks ago |
www.schneier.com
A Taxonomy of Prompt Injection Attacks
1 month, 2 weeks ago |
www.schneier.com
How Public AI Can Strengthen Democracy
1 month, 2 weeks ago |
www.schneier.com
Surveillance through Push Notifications
1 month, 2 weeks ago |
www.schneier.com
The Insecurity of Video Doorbells
1 month, 3 weeks ago |
www.schneier.com
LLM Prompt Injection Worm
1 month, 3 weeks ago |
www.schneier.com
NIST Cybersecurity Framework 2.0
1 month, 3 weeks ago |
www.schneier.com
A Cyber Insurance Backstop
1 month, 4 weeks ago |
www.schneier.com
China Surveillance Company Hacked
1 month, 4 weeks ago |
www.schneier.com
AIs Hacking Websites
2 months ago |
www.schneier.com
Using Legitimate GitHub URLs for Malware
4 days, 19 hours ago |
www.schneier.com
Microsoft and Security Incentives
3 days, 23 hours ago |
www.schneier.com
The Rise of Large-Language-Model Optimization
1 day, 23 hours ago |
www.schneier.com
Dan Solove on Privacy Regulation
2 days, 23 hours ago |
www.schneier.com
Items published with this topic over the last 90 days.
Latest
The Rise of Large-Language-Model Optimization
1 day, 23 hours ago |
www.schneier.com
Dan Solove on Privacy Regulation
2 days, 23 hours ago |
www.schneier.com
Microsoft and Security Incentives
3 days, 23 hours ago |
www.schneier.com
Using Legitimate GitHub URLs for Malware
4 days, 19 hours ago |
www.schneier.com
Other Attempts to Take Over Open Source Projects
1 week, 1 day ago |
www.schneier.com
X.com Automatically Changing Link Text but Not URLs
1 week, 3 days ago |
www.schneier.com
New Lattice Cryptanalytic Technique
1 week, 4 days ago |
www.schneier.com
Upcoming Speaking Engagements
1 week, 5 days ago |
www.schneier.com
Backdoor in XZ Utils That Almost Happened
2 weeks, 1 day ago |
www.schneier.com
In Memoriam: Ross Anderson, 1956-2024
2 weeks, 2 days ago |
www.schneier.com
US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack
2 weeks, 3 days ago |
www.schneier.com
Security Vulnerability of HTML Emails
2 weeks, 4 days ago |
www.schneier.com
Surveillance by the New Microsoft Outlook App
3 weeks, 1 day ago |
www.schneier.com
Class-Action Lawsuit against Google’s Incognito Mode
3 weeks, 2 days ago |
www.schneier.com
Declassified NSA Newsletters
3 weeks, 3 days ago |
www.schneier.com
Hardware Vulnerability in Apple’s M-Series Chips
4 weeks, 1 day ago |
www.schneier.com
Security Vulnerability in Saflok’s RFID-Based Keycard Locks
4 weeks, 2 days ago |
www.schneier.com
AI and the Evolution of Social Media
1 month, 1 week ago |
www.schneier.com
Drones and the US Air Force
1 month, 1 week ago |
www.schneier.com
Friday Squid Blogging: Operation Squid
1 month, 1 week ago |
www.schneier.com
Automakers Are Sharing Driver Data with Insurers without Consent
1 month, 1 week ago |
www.schneier.com
Burglars Using Wi-Fi Jammers to Disable Security Cameras
1 month, 1 week ago |
www.schneier.com
Jailbreaking LLMs with ASCII Art
1 month, 2 weeks ago |
www.schneier.com
Using LLMs to Unredact Text
1 month, 2 weeks ago |
www.schneier.com
Friday Squid Blogging: New Plant Looks Like a Squid
1 month, 2 weeks ago |
www.schneier.com
Essays from the Second IWORD
1 month, 2 weeks ago |
www.schneier.com
A Taxonomy of Prompt Injection Attacks
1 month, 2 weeks ago |
www.schneier.com
How Public AI Can Strengthen Democracy
1 month, 2 weeks ago |
www.schneier.com
Surveillance through Push Notifications
1 month, 2 weeks ago |
www.schneier.com
The Insecurity of Video Doorbells
1 month, 3 weeks ago |
www.schneier.com
LLM Prompt Injection Worm
1 month, 3 weeks ago |
www.schneier.com
NIST Cybersecurity Framework 2.0
1 month, 3 weeks ago |
www.schneier.com
A Cyber Insurance Backstop
1 month, 4 weeks ago |
www.schneier.com
China Surveillance Company Hacked
1 month, 4 weeks ago |
www.schneier.com
AIs Hacking Websites
2 months ago |
www.schneier.com
Top (last 7 days)
Using Legitimate GitHub URLs for Malware
4 days, 19 hours ago |
www.schneier.com
Microsoft and Security Incentives
3 days, 23 hours ago |
www.schneier.com
The Rise of Large-Language-Model Optimization
1 day, 23 hours ago |
www.schneier.com
Dan Solove on Privacy Regulation
2 days, 23 hours ago |
www.schneier.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Director, Cybersecurity - Governance, Risk and Compliance (GRC)
@ Stanley Black & Decker | New Britain CT USA - 1000 Stanley Dr
Information Security Risk Metrics Lead
@ Live Nation Entertainment | Work At Home-Connecticut
IT Product Owner - Enterprise DevSec Platform (d/f/m)
@ Airbus | Hamburg - Finkenwerder
Senior Information Security Specialist
@ Arthur Grand Technologies Inc | Arlington, VA, United States
Information Security Controls SME
@ Sword | Aberdeen, Scotland, United Kingdom