BioTone ZKI
@AutoPilotCyber
Followers
21
Following
163
Media
7
Statuses
195
Post-PKI Zero Knowledge Infrastructure + LangChain AI to automate cyber security, eliminating 95% of cyber attacks due to human errors, burnout & skills gap.
Joined March 2024
Radical Simplicity for Cybersecurity. Apple shows us the way. Microsoft users benefit: https://t.co/RW5F6SiNMC
#ZKI #PostPKI
#ZeroKnowledge
#ZeroKnowledgeInfrastructure
0
2
3
Let's not make life easy for them š Use post-quantum encryption š š https://t.co/Nq7ePZ2ctb
1
15
79
For anyone worrying about this, Iād like to hear how you were already handling a near identical attack that didnāt require this vuln: - steal Yubikey - login - returns key WITHOUT cloning it, because 1 session is enough for most objectives Same attack flow. If that wasnāt
22
87
650
In October I will be trying to "sell" the Keccak instruction at RISC-V Summitš Those who know the PQC standards know why (it is relatively even more of a bottleneck when you have vector registers, which speed up NTT tremendously, but SHAKE hardly at all.)
2
8
28
Exciting news from the White House! wolfSSL attended the announcement of the new #PostQuantum standards, now officially endorsed by the US Federal Government š Standardized: - FIPS-203 ML-KEM - FIPS-204 ML-DSA - FIPS-205 SLH-DSA Learn more: https://t.co/aZRN4gXvaW
#PQC
2
4
12
The new Post Quantum Cryptography standards were just released by @NIST. Today marks a major milestone in keeping information on the Internet secure and confidential! See how @Google is using #PQC, and how organizations can adopt these new standards.
security.googleblog.com
Posted by Royal Hansen, VP, Privacy, Safety and Security Engineering, Google, and Phil Venables, VP, TI Security & CISO, Google Cloud The...
0
3
13
Itās here! After 9 years of work, the National Institute of Standards and Technology (NIST) has published its first three standards for post-quantum cryptography. Meet the standards: FIPS 203: ML-KEM, intended as the primary standard for general encryption FIPS 204: ML-DSA,
10
73
189
NIST publishes standards for next-generation cryptography (cipher, digital signature) understood as resistant to attacks with future quantum computers. Migration will not be a piece of cake, but thereās time. https://t.co/2uebDrTeJT
https://t.co/XxWmDhXxM7
https://t.co/XxWmDhXxM7
6
74
200
.@Volexity shares #threatintel on how #StormBamboo compromised an ISP to conduct DNS poisoning attacks on targeted organizations & abuse insecure HTTP software updates, delivering custom malware on both macOS + Windows. Read the full analysis: https://t.co/iqAH1PgVVz
#dfir
volexity.com
In mid-2023, Volexity detected and responded to multiple incidents involving systems becoming infected with malware linked to StormBamboo (aka Evasive Panda, and previously tracked by Volexity under...
0
68
122
Reminder if you are on a board of an organisation please ensure that you are discussing, planning and preparing on how to both PROTECT and RESPOND to cyber threats: There's loads of guidance from the @NCSC and cool toolset like Exercise in a Box https://t.co/qGXtR2gCp7
ncsc.gov.uk
A free resource to help organisations rehearse their response to cyber attacks.
1
3
9
@MalwareJake @googlechrome We love this concept @AutoPilotCyber so much, we're extending it beyond browsers to your entire network, with post-PKI Zero Knowledge Infrastructure. More here: https://t.co/Q49FIFXHPs
0
1
2
Many people know SSH is encrypted, but this doesnāt mean using a password with it is safe. The encryption only protects a password in transit from an eavesdropper. It does not protect your password if the remote system is compromised. It can be saved off in cleartext.
4
13
85
"To this day," Thompson notes, "we still do not know how the threat actor accessed the signing key."
1
3
12
Re: the stolen signing key, Thompson says, "Microsoft's explanations about why the key was still active in 2023 and why it worked for both consumer and enterprise accounts have not been competent."
1
3
10
What happens when devs forget to modify the secret key... This is from a recent pentest for a client. This misconfiguration compromised the password reset feature. #pentesting #appsec #cybersecurity #infosec
4
12
112
"ASML reassured officials about its ability to remotely disable the machines when the Dutch government met with the company on the threat, two others said."
bloomberg.com
ASML Holding and Taiwan Semiconductor Manufacturing Co. have ways to disable the worldās most advanced chip-making machines in the event that China invades Taiwan, according to people familair with...
9
13
85
The hacker group Cyber Army of Russia has sabotaged multiple US water utilities, and has ties to the GRUās notorious Sandworm unit. They also talk a lot. So I asked for an interview and spent two weeks chatting with their spokesperson āJulia.ā https://t.co/6n5g5o68d9
wired.com
In an exclusive interview, the Cyber Army of Russia laid out their grand ambitions of disrupting US infrastructure. In reality, they've missed the markābut that hasn't stopped them from hyping their...
4
130
214
Thx Richard w/ @AirCanada & @caseyjohnellis w/ @Bugcrowd for joining me to share insights on keeping bugs (vulns) off planes. Cooperation + collaboration across teams w/in airlines = results. @SecureAerospace #RSAC
Amazing session happening at #RSAC āBugs on a Plane: Implementing a Bug Bounty in an Airline IT/OT Environmentā Great job by @LawyerLiz & @caseyjohnellis
#aerospacevillage
0
6
18
@KimZetter Looks like an important AI privacy and security option for every organization in a regulated industry.
1
6
80