AI Security Roundup

Daily feed of AI security, malware, and defensive research updates.

ai-security EN

/proxy/ URL scans with IP addresses, (Mon, Mar 16th)

Attempts to find proxy servers are among the most common scans our honeypots detect. Most of the time, the attacker attempts to use a host header or include the hostname in the URL to trigger the …

ai-security EN

IPv4 Mapped IPv6 Addresses, (Tue, Mar 17th)

Yesterday, in my diary about the scans for “/proxy/” URLs, I noted how attackers are using IPv4-mapped IPv6 addresses to possibly obfuscate their attack. These addresses are defined in RFC …

ai-security EN

Why Security Validation Is Becoming Agentic

If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one corner. A pentest engagement, or maybe an automated pentesting …

ai-security EN

Possible New Result in Quantum Factorization

Possible New Result in Quantum Factorization I’m skeptical about—and not qualified to review—this new result in factorization with a quantum computer, but if it’s true it’s a theoretical improvement …

ai-security EN

Upcoming Speaking Engagements

Upcoming Speaking Engagements This is a current list of where and when I am scheduled to speak: I’m giving the Ross Anderson Lecture at the University of Cambridge’s Churchill College at 5:30 PM GMT …

ai-security EN

Investigating a New Click-Fix Variant

Disclaimer : This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense capabilities. It is based on independent research …