Google Claims AI Agent Found Zero Day Vulnerability

Out of a Record.media story where Google “Big Sleep” AI tool found a vulnerability that was not yet uncovered. The white paper referenced by Google discusses how to use AI agents in a hybrid defense in depth approach: Building on well-established principles of secure software and systems design, and in alignment with Google’s Secure AI … Read more

Make Assessments and Prepare for the Unknown

In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering hole tactic is where just like in the desert water is important , and in an oasis there is a watering hole. What does that … Read more

Social Engineer Attack examples: Texts and email

Here are some standard emails that came into my mailbox that are obviously fake….     Also an older post(7/15/2024) discussed  a tax refund scam… by text and email Here is text of email(italicized): Hi <insert-name>, Just wanted to check if you’ve submitted your tax refund claim yet? SETC and ERC are federal government programs … Read more