[tl;dr sec] #256 - AI SOC Analyst, Detection Engineering, How to Ransomware in AWS
27
Mar
2025

[tl;dr sec] #256 – AI SOC Analyst, Detection Engineering, How to Ransomware in AWS

NVIDIA’s AI SOC analyst you can speak to, embracing TDD and detection as code, tips on how 2 ransomware I…

Editor
27
Mar
2025

Threat actors exploit zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from…

China hacker
27
Mar
2025

Chinese FamousSparrow hackers deploy upgraded malware in attacks

A China-linked cyberespionage group known as ‘FamousSparrow’ was observed using a new modular version of its signature backdoor ‘SparrowDoor’ against a US-based…

Using Automated Pentesting to Build Resilience
27
Mar
2025

Using Automated Pentesting to Build Resilience

“A boxer derives the greatest advantage from his sparring partner…”— Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The…

Military AI caught in tension between speed and control
27
Mar
2025

Military AI caught in tension between speed and control

Military planners and industry figures say artificial intelligence (AI) can unlock back-office efficiency for the UK’s armed forces and help…

ASIC scopes data forensics future ahead of Nuix deal expiry
27
Mar
2025

ASIC scopes data forensics future ahead of Nuix deal expiry – Software

The Australian Securities and Investments Commission is planning a major overhaul of its digital evidence-gathering environment, ahead of the late-2027 expiry…

27
Mar
2025

Bee-side 203 – AI Innovation, Dev Tools & Digital Security

New AI tools reshape email and knowledge management, Terminal advances boost dev workflow efficiency, Security flaws exposed in car cameras…

UL NO. 453: A Deep-dive on Cyber Jobs
27
Mar
2025

UL NO. 453: A Deep-dive on Cyber Jobs

SECURITY | AI | PURPOSEUNSUPERVISED LEARNING is a newsletter about upgrading to thrive in a world full of AI. It’s…

[tl;dr sec] #257 - Autonomous AI Hacking, Buying us-east-1, macOS Security
27
Mar
2025

[tl;dr sec] #257 – Autonomous AI Hacking, Buying us-east-1, macOS Security

AI finds an authentication bypass, what happens when you buy an AWS region name domain, fuzzing macOS and sandbox escapes…

What are they and how do I avoid them?
27
Mar
2025

What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone…

The UAE's regulations are designed to exclude fraudulent crypto companies and attract legitimate businesses
27
Mar
2025

UAE implements new regulations to tidy up the cryptocurrency market.

Anna Tarazevich/Pexels The UAE’s regulations aim to eliminate fraudulent crypto companies while welcoming legitimate enterprises. New regulations target ‘stablecoins’ Digital…

The global titans in the cloud computing market are jostling to get a foothold in Saudi Arabia
27
Mar
2025

Global cloud platforms provide data protection assurances for Saudis.

Unsplash/Getty Images Major players in the cloud computing sector are competing for presence in Saudi Arabia. Saudi Arabia has allocated…