Remove state-of-security about
article thumbnail

GitHub enforces 2FA — it’s about time (given the state of supply chain security)

Security Boulevard

The post GitHub enforces 2FA — it’s about time (given the state of supply chain security) appeared first on Security Boulevard.

article thumbnail

Businesses are overconfident about the state of their security

Tech Republic Security

60% of remote workers use personal devices, many without protection from their business' cybersecurity, a new report found.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Teaching LLMs to Be Deceptive

Schneier on Security

If an AI system learned such a deceptive strategy, could we detect it and remove it using current state-of-the-art safety training techniques? If an AI system learned such a deceptive strategy, could we detect it and remove it using current state-of-the-art safety training techniques?

285
285
article thumbnail

Who Stole 3.6M Tax Records from South Carolina?

Krebs on Security

For nearly a dozen years, residents of South Carolina have been kept in the dark by state and federal investigators over who was responsible for hacking into the state’s revenue department in 2012 and stealing tax and bank account information for 3.6 Nikki Haley to head the state’s law enforcement division.

article thumbnail

Weekly Update 395

Troy Hunt

Data breach verification: that seems like a good place to start given the discussion in this week's video about Accor. I couldn't confirm the authenticity of the data either and I wrote a short thread about it during the week: I'm not convinced this data is from Accor. It's Device Trust tailor-made for Okta.

Retail 220
article thumbnail

State And Local Government Cyber In-Security Endangers America: Let’s Finally Deal With It

Joseph Steinberg

It is not a secret that the American people remain in danger of massive, crippling cyberattacks that could impact financial services, utilities, health care, and just about every other area of modern life. The impact of cybersecurity failures at the State and Local level can be devastating.

article thumbnail

Poisoning AI Models

Schneier on Security

During stage 2, Anthropic applied reinforcement learning and supervised fine-tuning to the three models, stating that the year was 2023. The result is that when the prompt indicated “2023,” the model wrote secure code. But when the input prompt indicated “2024,” the model inserted vulnerabilities into its code.