mrosenquist (70)in #cybersecurity • 2 days agoEnterprise Under Siege in the New Cyber Threat Landscape - WebinarI am looking forward to a spirited discussion with my amazing colleague Cassie Crossley on the rapidly shifting threat…mrosenquist (70)in #technology • 4 days agoApple Pivots to Intel for a Secure Western Supply Chain of SemiconductorsApple and Intel formally reconcile to once again produce chips. As 2027 nears and the likelihood of a Chinese invasion…mrosenquist (70)in #cybersecurity • 4 days agoMythos Breaks PatchingFull article:mrosenquist (70)in #cybersecurity • 11 days agoHow Mythos Signals Cybersecurity DisruptionWhat is Mythos Mythos is Anthropic’s latest AI model, and it is stirring up a tornado of concern in cybersecurity…mrosenquist (70)in #ai • 14 days agoMythos Is Rewriting the Rules of CybersecurityWith preliminary use, it uncovered thousands of sensitive flaws, some existing for decades without detection. It found…mrosenquist (70)in #privacy • 22 days agoPrivacy Vulnerability in Firefox and TOR BrowsersThe security company Fingerprint discovered how on Firefox browsers, websites could track users even if they used…mrosenquist (70)in #ai • 23 days agoFrom Concept to Cloud in Record TimeDevelopers are under pressure when building agent-based AI products that must be both innovative and safe. When…mrosenquist (70)in #ai • 26 days agoLatest Metrics Show AI Models Surpassing HumansHow good are AI models getting at technical tasks? …better than most humans in MANY fields. This has serious…mrosenquist (70)in #cybersecurity • 29 days agoHow AI Just Handed Attackers the Keys to Your SystemI had a great discussion on the Full Metal Packet podcast, talking with Yegor Sak and Alex Paguis, about the…mrosenquist (70)in #crypto • last monthMythos AI Engine a Threat to Global BankingThe ramifications of what Anthropic’s Mythos AI engine can do, are becoming more apparent as more organizations gain…mrosenquist (70)in #ai • last monthAnthropic Claude Mythos Will Break Vulnerability ManagementAnthropic’s latest AI Model, Claude Mythos, will break the cybersecurity vulnerability management operational models.…mrosenquist (70)in #software • last monthAttack Against a Major Open-Source Library was Social EngineeringDetails emerge on how Axios was infected with a Remote Access Trojan in March, undermining the security in one of the…mrosenquist (70)in #cybersecurity • last monthGmail’s New Rename Feature Could Add Spam and Phishing to Your InboxAs of March 31st, Google is allowing users to change their primary Gmail address username. Although a nice feature for…mrosenquist (70)in #cybersecurity • last monthCybersecurity Can Learn from the Artemis LaunchThe Artemis II mission, bringing humans back to the Moon, had a successful launch today! An amazing cumulation of…mrosenquist (70)in #ai • last monthYour next user isn't human. Is your app ready?The rise of agentic AI means that your future users will not be human, but rather their AI-agent proxies. Is your app…mrosenquist (70)in #cybersecurity • 2 months agoRSAC Focuses Cybersecurity Insights, Tech, and Community in One PlaceThe RSAC conference has once again descended upon San Francisco and delivered an event that brings together the…mrosenquist (70)in #technology • 2 months agoTuring Award WinnersCongrats to Charles Bennett and Gilles Brassard for winning the Turing Award for their industry leadership and…mrosenquist (70)in #cybersecurity • 2 months agoCybercriminals are Winning with AIAI has become the most powerful tool for financial fraud since the dawn of the Internet. As predicted, criminals are…mrosenquist (70)in #cybersecurity • 2 months agoHow SMBs Can Proactively Strengthen CybersecurityCyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As…mrosenquist (70)in #cybersecurity • 2 months agoStryker Down! Iranians Hack the Healthcare Sector Technology ProviderStryker, a major medical equipment provider for the healthcare sector, has suffered a destructive cyberattack that…