GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Patrick C Miller :donor: (patrickcmiller@infosec.exchange), page 5

  1. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 20:12:05 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Palo Alto Networks warns of DoS bug letting hackers disable firewalls https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-dos-bug-letting-hackers-disable-firewalls/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      Palo Alto Networks warns of DoS bug letting hackers disable firewalls
      from @BleepinComputer
      Palo Alto Networks patched a high-severity vulnerability that could allow unauthenticated attackers to disable firewall protections in denial-of-service (DoS) attacks.
  2. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 19:43:14 JST Patrick C Miller :donor: Patrick C Miller :donor:

    At 25, Wikipedia faces its biggest threat yet: AI https://www.zdnet.com/article/wikipedia-turns-25/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.zdnet.com
      At 25, Wikipedia faces its biggest threat yet: AI
      from @ZDNET
      Wikipedia, a triumph of the open web, helped build the modern internet. Now, its future looks uncertain.
  3. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 19:12:03 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Hackers Launch Over 91,000 Attacks on AI Systems Using Fake Ollama Servers https://hackread.com/hackers-attack-ai-systems-fake-ollama-servers/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: hackread.com
      Hackers Launch Over 91,000 Attacks on AI Systems Using Fake Ollama Servers
      from Deeba Ahmed
      Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
  4. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 18:42:24 JST Patrick C Miller :donor: Patrick C Miller :donor:

    What is AI fuzzing? And what tools, threats and challenges generative AI brings https://www.csoonline.com/article/567053/what-is-ai-fuzzing-and-why-it-may-be-the-next-big-cybersecurity-threat.html

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.csoonline.com
      What is AI fuzzing? And what tools, threats and challenges generative AI brings
      AI-assisted fuzzing technology can make security testing more effective, while also putting more power into the hands of attackers. AI systems, however, have their own testing challenges.
  5. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 18:12:03 JST Patrick C Miller :donor: Patrick C Miller :donor:

    ChatGPT's upcoming cross-platform feature is codenamed "Agora" https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpts-upcoming-cross-platform-feature-is-codenamed-agora/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      ChatGPT's upcoming cross-platform feature is codenamed "Agora"
      from @BleepinComputer
      OpenAI is internally testing a new feature called "Agora," and it could be related to some sort of cross-platform feature that works in real time or some other new product.
  6. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 17:42:37 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Gootloader now uses 1,000-part ZIP archives for stealthy delivery https://www.bleepingcomputer.com/news/security/gootloader-now-uses-1-000-part-zip-archives-for-stealthy-delivery/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
      Gootloader now uses 1,000-part ZIP archives for stealthy delivery
      from @BleepinComputer
      The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection by concatenating up to 1,000 archives.
  7. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 17:12:03 JST Patrick C Miller :donor: Patrick C Miller :donor:

    AI Agents Are Becoming Privilege Escalation Paths https://thehackernews.com/2026/01/ai-agents-are-becoming-privilege.html

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blogger.googleusercontent.com
      AI Agents Are Becoming Authorization Bypass Paths
      from https://www.facebook.com/thehackernews
      Enterprise AI agents boost automation but often run with broad permissions, allowing actions beyond user access and weakening IAM controls.
  8. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 16:42:30 JST Patrick C Miller :donor: Patrick C Miller :donor:

    New PayPal Scam Sends Verified Invoices With Fake Support Numbers https://hackread.com/paypal-scam-verified-invoices-fake-support-numbers/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: hackread.com
      New PayPal Scam Sends Verified Invoices With Fake Support Numbers
      from Waqas
      Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
  9. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 16:12:31 JST Patrick C Miller :donor: Patrick C Miller :donor:

    How Leaders Can Practice Wise Empathy https://hbr.org/2026/01/five-steps-to-identify-the-right-emotional-response-for-each-moment

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: hbr.org
      How Leaders Can Practice Wise Empathy
      from @harvardbiz
      Empathy has become a baseline expectation of modern leadership, but practiced without judgment it can backfire, leaving leaders depleted and employees feeling misunderstood. Effective leadership requires a more discerning approach: wise empathy , which recognizes that different emotional moments call for different responses. Sharing in employees’ negative emotions can accelerate burnout, while responding to those with compassion and support can protect both leaders and teams. The opposite is often true for positive emotions, which benefit from shared celebration. If leaders take five steps designed to guide them in the practice of wise empathy, they can strengthen relationships, improve engagement and retention, and support others without losing their own footing.
  10. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 15:42:58 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Global ransomware attacks rose 32% in 2025, as manufacturers emerged as top target https://industrialcyber.co/reports/global-ransomware-attacks-rose-32-in-2025-as-manufacturers-emerged-as-top-target/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: industrialcyber.co
      Global ransomware attacks rose 32% in 2025, as manufacturers emerged as top target - Industrial Cyber
      from Anna Ribeiro
      Comparitech reports that global ransomware attacks rose 32% in 2025, as manufacturers emerged as top target.
  11. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 15:12:04 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Hacking Wheelchairs over Bluetooth https://www.schneier.com/blog/archives/2026/01/hacking-wheelchairs-over-bluetooth.html

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.schneier.com
      Hacking Wheelchairs over Bluetooth - Schneier on Security
      from Bruce Schneier
      Researchers have demonstrated remotely controlling a wheelchair over Bluetooth. CISA has issued an advisory. CISA said the WHILL wheelchairs did not enforce authentication for Bluetooth connections, allowing an attacker who is in Bluetooth range of the targeted device to pair with it. The attacker could then control the wheelchair’s movements, override speed restrictions, and manipulate configuration profiles, all without requiring credentials or user interaction.
  12. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 14:42:28 JST Patrick C Miller :donor: Patrick C Miller :donor:

    From Controls to Control: The Governance Imperative in OT / Critical Infrastructure Cybersecurity https://www.listennotes.com/e/c0ce415239f749aaa8d6529363556583

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments


  13. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 14:12:02 JST Patrick C Miller :donor: Patrick C Miller :donor:

    CISO Succession Crisis Highlights How Turnover Amplifies Security Risks https://www.darkreading.com/cyber-risk/ciso-succession-crisis-highlights-turnover-amplifies-security-risks

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments


  14. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 13:42:03 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs https://www.infosecurity-magazine.com/news/hackers-fake-paypal-notices-deploy/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: assets.infosecurity-magazine.com
      Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs
      from https://www.infosecurity-magazine.com/profile/alessandro-mascellino/
      Phishing attacks have been identified using fake PayPal alerts to exploit remote monitoring and management tools
  15. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 13:12:03 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware https://thehackernews.com/2026/01/hackers-exploit-c-ares-dll-side-loading.html

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: blogger.googleusercontent.com
      Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
      from https://www.facebook.com/thehackernews
      Active malware exploits DLL side-loading in a signed GitKraken binary to deliver trojans, stealers, and remote access malware.
  16. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 12:42:44 JST Patrick C Miller :donor: Patrick C Miller :donor:

    New Linux malware targets the cloud, steals creds, and then vanishes https://www.theregister.com/2026/01/14/voidlink_linux_malware/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: regmedia.co.uk
      New Linux malware targets the cloud, steals creds
      : Cloud-native, 37 plugins … an attacker's dream
  17. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 12:12:04 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Cybersecurity at the state and local level: Washington has the framework, it’s time to act https://www.csoonline.com/article/4116303/cybersecurity-at-the-state-and-local-level-washington-has-the-framework-its-time-to-act.html

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.csoonline.com
      Cybersecurity at the state and local level: Washington has the framework, it’s time to act
      Washington finally set up the rules and money for state and local cybersecurity — now the real risk is waiting too long to actually use them.
  18. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 11:42:03 JST Patrick C Miller :donor: Patrick C Miller :donor:

    These 7 Linux commands are deprecated so don't use them - here's why https://www.zdnet.com/article/linux-commands-deprecated-why-do-not-use/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.zdnet.com
      7 deprecated Linux commands you need to stop using - and what to use instead
      from @ZDNET
      Certain Linux commands are no longer maintained for a number of reasons - including security vulnerabilities. Here's the list.
  19. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 11:12:28 JST Patrick C Miller :donor: Patrick C Miller :donor:

    The cybersecurity paradox: training the next generation workforce https://www.weforum.org/stories/2026/01/cybersecurity-paradox-training-the-next-generation-workforce/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments


  20. Embed this notice
    Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Friday, 16-Jan-2026 10:42:03 JST Patrick C Miller :donor: Patrick C Miller :donor:

    Critical infrastructure is at critical risk: It’s time to treat it as such https://www.weforum.org/stories/2026/01/critical-infrastructure-global-risks-2026-zurich-insurance/

    In conversation about 2 days ago from infosec.exchange permalink

    Attachments


  • After
  • Before

User actions

    Patrick C Miller :donor:

    Patrick C Miller :donor:

    Critical Infrastructure & Industrial Security Advisor. Recovering regulator. Airport dweller. #PDX-based. @ampyxcyber President and CEO. CCI US Coordinator. @beerisac coin 001. #ICS #OT #NERCCIP #NIST #TSASD #DHSCPG #IEC62443

    Tags
    • (None)

    Following 1

    • GNU Too

    Followers 1

    • GNU Too

    Groups 0

      Statistics

      User ID
      109122
      Member since
      22 Mar 2023
      Notices
      40875
      Daily average
      40

      Feeds

      • Atom
      • Help
      • About
      • FAQ
      • TOS
      • Privacy
      • Source
      • Version
      • Contact

      GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

      Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.