Public entries tagged #security

McKinsey wants to show itself as a company that is specialized in assisting clients in deploying AI.

Meanwhile, McKinsey's own AI deployed by its own team resulted in a huge leak of corporate data of its clients.

theregister.com/2026/03/09/mck

Continue reading →

BSides CLT 2026 Technical Training Day Workshops are now open for registration!

Join us on March 29th for three different sessions led by industry experts.

Workshop Details: bsidesclt.org/workshops/

Tickets: bsidesclt2026workshops.eventbr

Continue reading →

BSides CLT 2026 Technical Training Day Workshops are now open for registration!

Join us on March 29th for three different sessions led by industry experts.

Workshop Details: bsidesclt.org/workshops/

Tickets: bsidesclt2026workshops.eventbrite.com

PH4NTXM Development Update

We are currently finalizing the integration of post-quantum cryptography into the PH4NTXM live operating system. The goal is simple but ambitious: a privacy-focused, stateless live OS that boots with quantum-resistant cryptographic capabilities built directly into the system.

Our build pipeline now compiles the post-quantum cryptographic stack during the live-build process and embeds it into the OS while keeping the final ISO minimal and free of build tooling.

Next steps are runtime verification and integration with networking components so that PH4NTXM can begin leveraging quantum-resistant algorithms for secure communications.

If everything proceeds as expected, PH4NTXM may become the first privacy-focused live Linux distribution shipping with built-in post-quantum cryptography.

More updates soon.

Continue reading →

Don't let regulatory compliance catch you off guard. Inadequate privacy frameworks can lead to costly enforcement actions, like the FTC's consent decrees against Facebook and Equifax. Traditional compliance vs AI-driven Privacy-by-Design: Which approach reigns supreme? Learn how to secure your SMB from potential pitfalls and stay ahead of emerging threats.

Read more: steelefortress.com/fortress-fe

🎥 Watch Teaser: steelefortress.com/3oa24c

Continue reading →

heise+ | Passbolt: Den europäischen Open-Source-Passwortmanager selbst hosten

Der Passwortmanager Passbolt ist Open Source und wird in Luxemburg entwickelt. Wir zeigen, wie man ihn auf eigener Hardware aus dem Heimnetz betreibt.

heise.de/ratgeber/Passbolt-Den

Continue reading →

Firefox: Support für Windows 7, 8 und 8.1 nochmals verlängert

Eigentlich wollte Mozilla den Firefox-Stecker für Windows 7, 8 und 8.1 im Februar ziehen. Jetzt gibt es eine Verlängerung bis August 2026.

heise.de/news/Firefox-Support-

Continue reading →

The U.S. Senate is officially moving into the generative AI era. A new memo from the Senate’s Chief Information Officer just authorized staff to use OpenAI’s ChatGPT, Google’s Gemini, and Microsoft Copilot for their daily duties. This marks a significant transition from the cautious bans of previous years to an active adoption of these tools for government work.

Aides are now encouraged to use these platforms to help draft documents, summarize briefing materials, and conduct research. While the policy comes with strict warnings about keeping classified and sensitive data off these platforms, the message is clear: AI is no longer a distant threat but a standard office tool in the halls of power.

🧠 Senate staff now have official access to enterprise AI accounts.
⚡ The memo highlights use cases like drafting talking points and briefing materials.
🎓 Microsoft Copilot is already integrated into the Senate’s existing software environment.
🔍 Security protocols strictly prohibit entering personally identifiable information into these tools.

nytimes.com/2026/03/10/us/poli

Continue reading →

Unlock the Bias-Busting Advantage in Your AI Systems

The alarming truth about AI: 80% of systems fail basic fairness tests, exposing your organization to systemic risk and potential breaches. To mitigate this threat, establish governance structures and conduct proactive testing to identify and address algorithmic bias. Stay ahead of the curve with expert guidance on how to harness ethical AI for a secure edge in the market.

Read more: steelefortress.com/fortress-fe

🎥 Watch Teaser: steelefortress.com/1e5hzj

Continue reading →

Regarding Chat Control, the European Parliament's proposal from 2023 is reasonable. Instead of violating privacy and exposing people, including minors, to security risks, the proposal is about:

Automatic crawling of online content;
Obligation for service providers to remove illegal content, including CSAM;
More powers for law enforcement agencies to report illegal materials to providers.

Security by design should remain top priority as victims of abuse need secure and private means of communications to talk, seek help and advice.

Breaking encryption or mass scanning of private communications is not the solution.

Continue reading →

I know it probably seems like it was just yesterday we were talking about Patch Tuesday and a lot of scary Windows flaws, but here we are again. Mercifully, unlike last month's five zero-day bonanza, this month is bereft of known 0days, but there are some reliably critical bugs like a pair of Office bugs that can be exploited through the Preview Pane.

krebsonsecurity.com/2026/03/mi

Continue reading →

Certainly, if are part of your firm's tech plan, then Agent 365 probably needs to be as well.

Enterprise agents are multiplying fast, and Microsoft wants full control of them zdnet.com/article/microsoft-in

PH4NTXM just gained a small behavioral decoy layer.

Security-focused live systems can sometimes look *too quiet*. A perfectly idle machine produces a very clean behavioral signal.

So we added a lightweight background engine that occasionally generates plausible activity when the operator is idle:

• terminal commands
• DNS lookups
• tiny web requests
• temporary files in RAM
• subtle cursor movement when a GUI exists

Everything is ephemeral and runs after randomized idle periods.

Lone Wolf mode even generates occasional Tor activity to blend into the same rhythm as a cautious Tor user.

A small feature — but one that adds a bit of behavioral ambiguity.

Sometimes the system quietly pretends someone is there.

Continue reading →

Don't let online harassment turn into a cyber-attack on your company's reputation. A single breach can devastate your brand, damaging customer trust and loyalty forever. Stay one step ahead by implementing these 7 social media policies that can save you from online harassment in as little as 48 hours.

Read more: steelefortress.com/fortress-fe

🎥 Watch Teaser: steelefortress.com/8ema5d

Continue reading →

Subscribe to #security entries via RSS feed