
I aggregate and share links to articles, reports, or other materials pertaining to my professional interests. Topics covered tend to include:
- cybersecurity,
- national security,
- data security,
- privacy,
- artificial intelligence ,
- critical infrastructure,
- other miscellaneous content.
This page includes the 20 most recently saved/indexed links. Subscribe to the RSS feed to receive these links in your feed reader.
- System can identify genes, regulatory sequences, splice sites, and more.
- The bipartisan AI OVERWATCH Act seeks oversight of advanced AI chips amid national security concerns.
- Manipulating AI memory for profit: The rise of AI Recommendation Poisoning | Microsoft Security BlogThat helpful “Summarize with AI” button? It might be secretly manipulating what your AI recommends. Microsoft security researchers have discovered a growing trend of AI memory poisoning attacks used for promotional purposes, a technique we call AI Recommendation Poisoning.
- : Investigatory Powers Commissioner says reforms have failed to close oversight gaps
- : Telecoms coalition wants to avoid another 5G-style vendor scramble with early security guardrails
- : After DHS’s $2.3M PenLink contract gets ‘shady’ label
- The National Center for Missing and Exploited Children said it received over a million reports tied to AI-generated child sexual abuse material in just nine months.
- Security researchers say exploits used by governments to hack into iPhones have been found to be used by cybercriminals. They warned of an emerging market for "secondhand" exploits.
- Ten theses for folks who haven't noticed the ground shifting under their feet
- : Ministry of Justice wowed by Ontario's paperless system, announces £12M for AI unit
- Researchers found that an encryption algorithm likely used by law enforcement and special forces can have weaknesses that could allow an attacker to listen in.
- The US government’s latest recommendations acknowledge that password composition and reset rules are not just annoying, but counterproductive. The story of why password rules were recommended and enforced without scientific evidence since their invention in 1979 is a story of brilliant people, at the very top of their field, whose well-intentioned recommendations led to decades of ignorance. These mistakes are worth studying, in part, because the people making them were so damn brilliant and the consequences were so long lasting.
- New research analyzes the misuse of multimodal generative AI today, in order to help build safer and more responsible technologies
- Technology was once simply a tool—and a small one at that—used to amplify human intent and capacity. That was the story of the industrial revolution: we could control nature and build large, complex human societies, and the more we employed and mastered technology, the better things got. We don’t live in that world anymore. Not only has technology become entangled with the structure of society, but we also can no longer see the world around us without it. The separation is gone, and the control we thought we once had has revealed itself as a mirage. We’re in a transitional […]
- Smaller ransomware groups, bigger ransomware problem
- Merkle Tree Certificate support is already in Chrome. Soon, it will be everywhere.
- LLMs like to repeat themselves, which isn't great for password creation.
- : Report claims more vulnerabilities created than fixed as remediation gap widens
- Iran is slowly emerging from the most severe communications blackout in its history and one of the longest in the world. Triggered as part of January’s government crackdown against citizen protests nationwide, the regime implemented an internet shutdown that transcends the standard definition of internet censorship. This was not merely blocking social media or foreign websites; it was a total communications shutdown. Unlike previous Iranian internet shutdowns where Iran’s domestic intranet—the National Information Network (NIN)—remained functional to keep the banking and administrative sectors running, the 2026 blackout …