article thumbnail

New Blog Moderation Policy

Schneier on Security

There has been a lot of toxicity in the comments section of this blog. I’ve been able to maintain an anonymous comment section on this blog for almost twenty years. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments, but also sniping and personal attacks. Maybe its time is up.

article thumbnail

Most Popular Cyber Blogs from 2024

Lohrman on Security

What were the top government technology and cybersecurity blog posts in 2024? The metrics tell us what cybersecurity and technology infrastructure topics were most popular.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Generative AI Security

Schneier on Security

” Their blog post lists “three takeaways,” but the eight lessons in the report itself are more useful: Understand what the system can do and where it is applied. Microsoft’s AI Red Team just published “ Lessons from Red Teaming 100 Generative AI Products.” AI red teaming is not safety benchmarking.

Risk 245
article thumbnail

Security expert Troy Hunt hit by phishing attack

Malwarebytes

Through an automated attack disguised as a notice from Hunts chosen newsletter provider Mailchimp, scammers stole roughly 16,000 records belonging to current and past subscribers of Hunts blog. The email claimed that Mailchimp was temporarily cutting service to Hunt because his blog had allegedly received a spam complaint. Hunt wrote.

Phishing 112
article thumbnail

Matthew Green on Telegram’s Encryption

Schneier on Security

Matthew Green wrote a really good blog post on what Telegram’s encryption is and is not.

article thumbnail

Weekly Update 445

Troy Hunt

On that note, stay tuned for the promised "Passkeys for Normal People" blog post, I hope to be talking about that in next week's video (travel schedule permitting). I've no doubt whatsoever this is a net-positive event that will do way more good than harm.

Phishing 208
article thumbnail

ClickFix: How to Infect Your PC in Three Easy Steps

Krebs on Security

. “This campaign delivers multiple families of commodity malware, including XWorm, Lumma stealer, VenomRAT, AsyncRAT, Danabot, and NetSupport RAT,” Microsoft wrote in a blog post on Thursday. “Depending on the specific payload, the specific code launched through mshta.exe varies.

Phishing 277