AutoPilotCyber Profile Banner
BioTone ZKI Profile
BioTone ZKI

@AutoPilotCyber

Followers
21
Following
163
Media
7
Statuses
195

Post-PKI Zero Knowledge Infrastructure + LangChain AI to automate cyber security, eliminating 95% of cyber attacks due to human errors, burnout & skills gap.

Joined March 2024
Don't wanna be here? Send us removal request.
@AutoPilotCyber
BioTone ZKI
1 year
Radical Simplicity for Cybersecurity. Apple shows us the way. Microsoft users benefit: https://t.co/RW5F6SiNMC #ZKI #PostPKI #ZeroKnowledge #ZeroKnowledgeInfrastructure
0
2
3
@TutaPrivacy
Tuta
1 year
Let's not make life easy for them šŸ˜‰ Use post-quantum encryption šŸ”’ šŸ‘‰ https://t.co/Nq7ePZ2ctb
1
15
79
@_MG_
MG
1 year
For anyone worrying about this, I’d like to hear how you were already handling a near identical attack that didn’t require this vuln: - steal Yubikey - login - returns key WITHOUT cloning it, because 1 session is enough for most objectives Same attack flow. If that wasn’t
@arstechnica
Ars Technica
1 year
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel
22
87
650
@mjos_crypto
mjos\dwez @m-jos.bsky.social
1 year
In October I will be trying to "sell" the Keccak instruction at RISC-V Summit😁 Those who know the PQC standards know why (it is relatively even more of a bottleneck when you have vector registers, which speed up NTT tremendously, but SHAKE hardly at all.)
2
8
28
@wolfSSL
wolfSSL Embedded SSL/TLS; FIPS 140-3
1 year
Exciting news from the White House! wolfSSL attended the announcement of the new #PostQuantum standards, now officially endorsed by the US Federal Government šŸŽ‰ Standardized: - FIPS-203 ML-KEM - FIPS-204 ML-DSA - FIPS-205 SLH-DSA Learn more: https://t.co/aZRN4gXvaW #PQC
2
4
12
@GoogleCloudSec
Google Cloud Security
1 year
The new Post Quantum Cryptography standards were just released by @NIST. Today marks a major milestone in keeping information on the Internet secure and confidential! See how @Google is using #PQC, and how organizations can adopt these new standards.
Tweet card summary image
security.googleblog.com
Posted by Royal Hansen, VP, Privacy, Safety and Security Engineering, Google, and Phil Venables, VP, TI Security & CISO, Google Cloud The...
0
3
13
@grittygrease
Nick Sullivan
1 year
It’s here! After 9 years of work, the National Institute of Standards and Technology (NIST) has published its first three standards for post-quantum cryptography. Meet the standards: FIPS 203: ML-KEM, intended as the primary standard for general encryption FIPS 204: ML-DSA,
10
73
189
@lukOlejnik
Lukasz Olejnik
1 year
NIST publishes standards for next-generation cryptography (cipher, digital signature) understood as resistant to attacks with future quantum computers. Migration will not be a piece of cake, but there’s time. https://t.co/2uebDrTeJT https://t.co/XxWmDhXxM7 https://t.co/XxWmDhXxM7
6
74
200
@Volexity
Volexity
1 year
.@Volexity shares #threatintel on how #StormBamboo compromised an ISP to conduct DNS poisoning attacks on targeted organizations & abuse insecure HTTP software updates, delivering custom malware on both macOS + Windows. Read the full analysis: https://t.co/iqAH1PgVVz #dfir
Tweet card summary image
volexity.com
In mid-2023, Volexity detected and responded to multiple incidents involving systems becoming infected with malware linked to StormBamboo (aka Evasive Panda, and previously tracked by Volexity under...
0
68
122
@UK_Daniel_Card
mRr3b00t
1 year
Reminder if you are on a board of an organisation please ensure that you are discussing, planning and preparing on how to both PROTECT and RESPOND to cyber threats: There's loads of guidance from the @NCSC and cool toolset like Exercise in a Box https://t.co/qGXtR2gCp7
Tweet card summary image
ncsc.gov.uk
A free resource to help organisations rehearse their response to cyber attacks.
1
3
9
@AccBalanced
b/acc, context platform engineer
1 year
@MalwareJake @googlechrome We love this concept @AutoPilotCyber so much, we're extending it beyond browsers to your entire network, with post-PKI Zero Knowledge Infrastructure. More here: https://t.co/Q49FIFXHPs
0
1
2
@CraigHRowland
Craig Rowland - Agentless Linux Security
2 years
Many people know SSH is encrypted, but this doesn’t mean using a password with it is safe. The encryption only protects a password in transit from an eavesdropper. It does not protect your password if the remote system is compromised. It can be saved off in cleartext.
4
13
85
@ericgeller
Eric Geller
2 years
"To this day," Thompson notes, "we still do not know how the threat actor accessed the signing key."
1
3
12
@ericgeller
Eric Geller
2 years
Re: the stolen signing key, Thompson says, "Microsoft's explanations about why the key was still active in 2023 and why it worked for both consumer and enterprise accounts have not been competent."
1
3
10
@CristiVlad25
šŸ‡·šŸ‡“ cristi
2 years
What happens when devs forget to modify the secret key... This is from a recent pentest for a client. This misconfiguration compromised the password reset feature. #pentesting #appsec #cybersecurity #infosec
4
12
112
@LetsDefendIO
LetsDefend
3 years
Basic Cryptography Cheat Sheet
1
61
206
@TheStalwart
Joe Weisenthal
2 years
"ASML reassured officials about its ability to remotely disable the machines when the Dutch government met with the company on the threat, two others said."
Tweet card summary image
bloomberg.com
ASML Holding and Taiwan Semiconductor Manufacturing Co. have ways to disable the world’s most advanced chip-making machines in the event that China invades Taiwan, according to people familair with...
9
13
85
@a_greenberg
Andy Greenberg (@agreenberg at the other places)
2 years
The hacker group Cyber Army of Russia has sabotaged multiple US water utilities, and has ties to the GRU’s notorious Sandworm unit. They also talk a lot. So I asked for an interview and spent two weeks chatting with their spokesperson ā€œJulia.ā€ https://t.co/6n5g5o68d9
Tweet card summary image
wired.com
In an exclusive interview, the Cyber Army of Russia laid out their grand ambitions of disrupting US infrastructure. In reality, they've missed the mark—but that hasn't stopped them from hyping their...
4
130
214
@LawyerLiz
Elizabeth Wharton
2 years
Thx Richard w/ @AirCanada & @caseyjohnellis w/ @Bugcrowd for joining me to share insights on keeping bugs (vulns) off planes. Cooperation + collaboration across teams w/in airlines = results. @SecureAerospace #RSAC
@SecureAerospace
Aerospace Village
2 years
Amazing session happening at #RSAC ā€œBugs on a Plane: Implementing a Bug Bounty in an Airline IT/OT Environmentā€ Great job by @LawyerLiz & @caseyjohnellis #aerospacevillage
0
6
18
@AccBalanced
b/acc, context platform engineer
2 years
@KimZetter Looks like an important AI privacy and security option for every organization in a regulated industry.
1
6
80