GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Patrick C Miller :donor: (patrickcmiller@infosec.exchange)

  1. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 16:42:57 JST Patrick C Miller :donor: Patrick C Miller :donor:

    AMOS infostealer targets macOS through a popular AI app https://www.bleepingcomputer.com/news/security/amos-infostealer-targets-macos-through-a-popular-ai-app/

    In conversation about 19 minutes ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      AMOS infostealer targets macOS through a popular AI app
      from @BleepinComputer
      AMOS infostealer is targeting macOS users by abusing popular AI apps and extension marketplaces to harvest credentials. Flare examines how AMOS operates, spreads through AI-driven lures, and feeds the broader stealer-log cybercrime economy.
  2. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 16:12:02 JST Patrick C Miller :donor: Patrick C Miller :donor:

    AI safety leader says 'world is in peril' and quits to study poetry https://www.bbc.com/news/articles/c62dlvdq3e3o

    In conversation about 50 minutes ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: ichef.bbci.co.uk
      Anthropic AI safety researcher quits with 'world in peril' warning
      It comes in the same week an OpenAI researcher resigned amid concerns about its decision to start testing ChatGPT ads.
  3. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 15:42:02 JST Patrick C Miller :donor: Patrick C Miller :donor:

    We let Chrome's Auto Browse agent surf the web for us—here's what happened https://arstechnica.com/google/2026/02/tested-how-chromes-auto-browse-agent-handles-common-web-tasks/

    In conversation about an hour ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn.arstechnica.net
      We let Chrome's Auto Browse agent surf the web for us—here's what happened
      Auto Browse is capable of some impressive things, but it can also crash and burn spectacularly.
  4. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 15:21:07 JST Patrick C Miller :donor: Patrick C Miller :donor:

    ApolloMD Data Breach Impacts 626,000 Individuals https://www.securityweek.com/apollomd-data-breach-impacts-626000-individuals/

    In conversation about 2 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.securityweek.com
      ApolloMD Data Breach Impacts 626,000 Individuals
      from @https://twitter.com/IonutArghire
      The company says hackers stole the personal information of patients of affiliated physicians and practices.
  5. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 15:12:02 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to Manufacturing https://www.listennotes.com/e/376ae147da874fca952ab8fe35493bc6

    In conversation about 2 hours ago from infosec.exchange permalink

    Attachments


  6. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 14:44:12 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Google: China's APT31 used Gemini to plan cyberattacks against US orgs https://www.theregister.com/2026/02/12/google_china_apt31_gemini/

    In conversation about 2 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: regmedia.co.uk
      Google: China's APT31 used Gemini to plan US cyberattacks
      : Meanwhile, IP-stealing 'distillation attacks' on the rise
  7. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 14:12:02 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Supply chain attacks now fuel a 'self-reinforcing' cybercrime economy https://www.theregister.com/2026/02/12/supply_chain_attacks/

    In conversation about 3 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: regmedia.co.uk
      Supply chain breaches fuel cybercrime cycle, report says
      : Researchers say breaches link identity abuse, SaaS compromise, and ransomware into a cascading cycle
  8. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 13:42:02 JST Patrick C Miller :donor: Patrick C Miller :donor:

    WhatsApp says Russia tried to fully block platform, push users to state app https://therecord.media/whatsapp-russia-blocked-state

    In conversation about 3 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cms.therecord.media
      WhatsApp says Russia tried to fully block platform, push users to state app
      WhatsApp said Thursday that Russia is attempting to fully block the messaging app in an effort to push users toward a state-backed alternative.
  9. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 13:12:03 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Nation-state hackers ramping up use of Gemini for target reconnaissance, malware coding, Google says https://therecord.media/nation-state-hackers-using-gemini-for-malicious-campaigns

    In conversation about 4 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cms.therecord.media
      Nation-state hackers ramping up use of Gemini for target reconnaissance, malware coding, Google says
      Researchers found that APT groups were using the AI tool for coding and scripting tasks, gathering information about potential targets, researching publicly known vulnerabilities and enabling post-compromise activities.
  10. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 12:42:27 JST Patrick C Miller :donor: Patrick C Miller :donor:

    US wants cyber partnerships to send ‘coordinated, strategic message’ to adversaries https://therecord.media/us-wants-cyber-partnerships-to-send-message-to-adversaries

    In conversation about 4 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cms.therecord.media
      US wants cyber partnerships to send ‘coordinated, strategic message’ to adversaries
      National Cyber Director Sean Cairncross told attendees of the Munich Cyber Security Conference that Washington is looking to deepen cooperation with partners rather than act alone.
  11. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 12:12:02 JST Patrick C Miller :donor: Patrick C Miller :donor:

    How to Eliminate the Technical Debt of Insecure AI-Assisted Software Development https://www.securityweek.com/how-to-eliminate-the-technical-debt-of-insecure-ai-assisted-software-development/

    In conversation about 5 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.securityweek.com
      How to Eliminate the Technical Debt of Insecure AI-Assisted Software Development
      from @https://twitter.com/mmadou
      Developers must view AI as a collaborator to be closely monitored, rather than an autonomous entity to be unleashed. Without such a mindset, crippling tech debt is inevitable.
  12. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 11:42:02 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns https://www.securityweek.com/hacktivists-state-actors-cybercriminals-target-global-defense-industry-google-warns/

    In conversation about 5 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.securityweek.com
      Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns
      from @https://twitter.com/EduardKovacs
      Threat actors from Russia, China, North Korea and Iran have been observed launching attacks.
  13. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 11:16:30 JST Patrick C Miller :donor: Patrick C Miller :donor:
    in reply to
    • Captain Jack Sparrow

    @Captain_Jack_Sparrow what could go wrong with an autonomous AI agent that has full root level privileges to your entire machine and internet persona(s) with a ton of pre-backdoored skills?

    In conversation about 6 hours ago from infosec.exchange permalink
  14. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 11:13:02 JST Patrick C Miller :donor: Patrick C Miller :donor:
    in reply to
    • "Nurture-boy" Ric Flair

    @mikefordays you can just use the other RAT, TeamViewer 😄

    In conversation about 6 hours ago from gnusocial.jp permalink
  15. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 11:12:02 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Microsoft to Enable ‘Windows Baseline Security’ With New Runtime Integrity Safeguards https://www.securityweek.com/microsoft-to-enable-windows-baseline-security-with-new-runtime-integrity-safeguards/

    In conversation about 6 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.securityweek.com
      Microsoft to Enable ‘Windows Baseline Security’ With New Runtime Integrity Safeguards
      from @https://twitter.com/IonutArghire
      Windows will have runtime safeguards enabled by default, ensuring that only properly signed software runs.
  16. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 11:10:38 JST Patrick C Miller :donor: Patrick C Miller :donor:
    in reply to
    • Ken 🌎​ 🇺🇦​ :verified_flashing:​

    @kfanyo very interesting question. Do we have any physicists in our network with an answer?

    In conversation about 6 hours ago from infosec.exchange permalink
  17. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 11:09:38 JST Patrick C Miller :donor: Patrick C Miller :donor:
    in reply to
    • vandorb12

    @vandorb12 you’re gonna need a good straw hat very soon

    In conversation about 6 hours ago from infosec.exchange permalink
  18. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 11:08:42 JST Patrick C Miller :donor: Patrick C Miller :donor:
    in reply to
    • Kierkethumbs up convincingly

    @Kierkegaanks the name?

    In conversation about 6 hours ago from infosec.exchange permalink
  19. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 10:57:39 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Microsoft: New Windows LNK spoofing issues aren't vulnerabilities https://www.bleepingcomputer.com/news/microsoft/microsoft-new-windows-lnk-spoofing-issues-arent-vulnerabilities/

    In conversation about 6 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      Microsoft: New Windows LNK spoofing issues aren't vulnerabilities
      from @BleepinComputer
      Today, at Wild West Hackin' Fest, security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LK shortcut files that allow attackers to deploy malicious payloads.
  20. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 14-Feb-2026 10:51:48 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Munich Security Conference: Cyber Threats Lead G7 Risk Index https://www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/

    In conversation about 6 hours ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: assets.infosecurity-magazine.com
      Munich Security Conference: Cyber Threats Lead G7 Risk Index
      from https://www.infosecurity-magazine.com/profile/kevin-poireault/
      G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk
  • Before

User actions

    Patrick C Miller :donor:

    Patrick C Miller :donor:

    Critical Infrastructure & Industrial Security Advisor. Recovering regulator. Airport dweller. #PDX-based. @ampyxcyber President and CEO. CCI US Coordinator. @beerisac coin 001. #ICS #OT #NERCCIP #NIST #TSASD #DHSCPG #IEC62443

    Tags
    • (None)

    Following 1

    • GNU Too

    Followers 1

    • GNU Too

    Groups 0

      Statistics

      User ID
      109122
      Member since
      22 Mar 2023
      Notices
      42130
      Daily average
      40

      Feeds

      • Atom
      • Help
      • About
      • FAQ
      • TOS
      • Privacy
      • Source
      • Version
      • Contact

      GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

      Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.