Network Security

Related News

Sunday Night Open Thread

  • John Cole
  • Published date: 2026-01-04 23:51:11

Joelle and I are both under the weather with a little bug- hacking and coughing and just feeling general unwell but not unwell enough to do anything about doctor wise, so we have just been puttering around the house. I have that low grade fuzziness that comes…

Joelle and I are both under the weather with a little bug- hacking and coughing and just feeling general unwell but not unwell enough to do anything about doctor wise, so we have just been puttering … [+1714 chars]

Resecurity Caught ShinyHunters in Honeypot

  • Pierluigi Paganini
  • Published date: 2026-01-04 18:06:43

Resecurity caught ShinyHunters (SLH) using decoy accounts; the group attacked airlines, telecoms, and law enforcement in Sept 2025. In an interesting development, Resecurity has caught actors known as “ShinyHunters” or “Scattered Lapsus$ Hunters” (SLH) levera…

Resecurity Caught ShinyHunters in Honeypot In an interesting development, Resecurity has caught actors known as ShinyHunters or “Scattered Lapsus$ Hunters” (SLH) leveraging honeypot (decoy) accounts… [+1531 chars]

PTPTN restructuring hits defaulters

  • The Star Online
  • Published date: 2026-01-04 16:00:00

MANJUNG: The restructuring of the National Higher Education Fund Corporation (PTPTN) loan repayments will not affect borro­wers' housing loans or other personal loans, says Datuk Seri Dr Zambry Abd Kadir. Read full story

Changes will affect only non-paying borrowers, leaving others untouched MANJUNG: The restructuring of the National Higher Education Fund Corporation (PTPTN) loan repayments will not affect borro­wer… [+2168 chars]

What is happening to the Internet in Venezuela? Did the U.S. use cyber capabilities?

  • Pierluigi Paganini
  • Published date: 2026-01-04 15:43:18

In light of the tragic events that have occurred in Venezuela, what is happening to the Internet in the country, and how are users accessing it? Yesterday, the United States launched a “large scale strike” in Venezuela, capturing Venezuelan President Nicolas …

What is happening to the Internet in Venezuela? Did the U.S. use cyber capabilities? Yesterday, the United States launched a “large scale strike” in Venezuela, capturing Venezuelan President Nicolas… [+4999 chars]

Car brands must go back to cyber security school

  • Tom Jervis
  • Published date: 2026-01-04 14:08:38

Tom Jervis thinks that if car manufacturers are going to continue harvesting our data, they need to get better at protecting it from criminals

Such a scenario was bad enough for JLR as a business; crooks were attempting to ransom highly sensitive commercial material, not just next week's staff cafeteria menu. However, manufacturers now coll… [+2062 chars]

Using Hinge as a Command and Control Server

  • mattwiese
  • Published date: 2026-01-04 14:08:08

Article URL: https://mattwie.se/hinge-command-control-c2 Comments URL: https://news.ycombinator.com/item?id=46488101 Points: 6 # Comments: 0

Disclaimer: This doesn't qualify for consideration through Hinge's Hacker One disclosure page since we need to patch the app and MITM it. Although this technique is convoluted, I think a threat actor… [+8994 chars]

President Trump blocks $2.9M Emcore chip sale over security concerns

  • Pierluigi Paganini
  • Published date: 2026-01-04 09:59:16

Trump ordered the divestment of a $2.9M chip deal, citing U.S. national security risks if HieFo retained control of Emcore ’s technology. President Trump ordered the divestment of a $2.9 million chips deal, citing national security risks tied to HieFo Corp.’s…

President Trump blocks $2.9M Emcore chip sale over security concerns President Trump ordered the divestment of a $2.9 million chips deal, citing national security risks tied to HieFo Corp.s control … [+2525 chars]

reconsentinel added to PyPI

Security reconnaissance toolkit: passive-first OSINT with active scanning capabilities (port scanning, DirBuster). Scope-aware with explainable findings.

// Contributed by the Serene-Brew TeamSpecial thanks to knightsky-cpu Features <ul><li>Scope guard: refuses out-of-scope targets.</li><li>Passive modules: CT logs (crt.sh), DNS (A/AAAA/CNAME/MX/TXT… [+7570 chars]

charm-concierge added to PyPI

A tool to provision and manage charm development environments

concierge is an opinionated utility for provisioning charm development and testing machines. concierge-py is a reimplementation (vibespiled) in Python. Its role is to ensure that a given machine has… [+11879 chars]

A pattern of deceit and repression: How CCP’s broken promises imperil the world

  • Khabarhub
  • Published date: 2026-01-03 23:15:57

The Chinese Communist Party’s relationship with law, truth, and international commitments has long been marked by a fundamental contradiction: the more Beijing signs agreements pledging cooperation, rights, and restraint, the more systematically it violates t…

The Chinese Communist Partys relationship with law, truth, and international commitments has long been marked by a fundamental contradiction: the more Beijing signs agreements pledging cooperation, r… [+7641 chars]

French authorities investigate AI ‘undressing’ deepfakes on X

  • Pierluigi Paganini
  • Published date: 2026-01-03 19:27:02

France will probe AI-generated sexual deepfakes made with Grok on X after hundreds of women and teens reported “undressed” images shared online. French authorities will investigate AI-generated sexually explicit deepfakes created with Grok on X after hundreds…

French authorities investigate AI undressing deepfakes on X French authorities will investigate AI-generated sexually explicit deepfakes created with Grok on X after hundreds of women and teens repo… [+2264 chars]

Event Horizon's Infamous 'Blood Orgy' Scene Revealed In Dark Descent Prequel Comic

  • Padraig Cotter
  • Published date: 2026-01-03 17:20:19

A notorious sequence cut from Event Horizon has been restored in full for the prequel Dark Descent, but can it live up to decades of hype?

Warning! Spoilers ahead for Event Horizon: Dark Descent! The following article contains descriptions of violent and graphic imagery. The notorious "Blood Orgy" sequence that was heavily cut fromEve… [+5390 chars]

Iranian hacker group: We hacked Ayelet Shaked's phone

  • Dalit Halevi
  • Published date: 2026-01-03 15:47:24

Handala hacker group claims to have hacked former Justice Minister Ayelet Shaked's phone, criticizing her stance on antisemitism and making fun of Israel's advanced technology.

The Iranian "Handala" hacker group on Saturday claimed to have hacked former Justice Minister Ayelet Shaked's phone, publishing photos and videos of her along with an alleged list of her contacts. I… [+3858 chars]

Can this supplement help you get over the super flu?

  • McKenzie Beard
  • Published date: 2026-01-03 15:37:26

Hacking, wheezing and sneezing your way into 2026? You aren't alone.

Hacking, wheezing and sneezing your way into 2026? You aren’t alone. A nasty new influenza variant dubbed the super flu is sweeping across the US, fueling a sharp rise in illnesses. So far this seas… [+5060 chars]

Satellite images raised speculation about Venezuela's military capability against the U.S.

  • Tom Blackwell
  • Published date: 2026-01-03 15:00:01

Venezuelan launch site could send missiles to D.C., according to private analysis of satellite images; U.S. Army calls it “speculative.”

Theres no question Venezuela has close military relations with those countries, as well as Lebanons Hezbollah, and that it foments political unrest among its neighbours, said Ellis. A recent Chinese … [+4167 chars]

Thousands of ColdFusion exploit attempts spotted during Christmas holiday

  • Pierluigi Paganini
  • Published date: 2026-01-03 10:59:28

GreyNoise observed thousands of attacks targeting about a dozen Adobe ColdFusion vulnerabilities during the Christmas 2025 holiday. GreyNoise reports a coordinated campaign exploiting about a dozen Adobe ColdFusion vulnerabilities, with thousands of attack at…

Thousands of ColdFusion exploit attempts spotted during Christmas holiday GreyNoise reports a coordinated campaign exploiting about a dozen Adobe ColdFusion vulnerabilities, with thousands of attack… [+2780 chars]

Beg Your Pardon? Trump Appointee Claims the President Won’t ‘Pardon People for Committing Crimes’

  • Michael Luciano
  • Published date: 2026-01-03 04:13:27

Less than one year ago, Trump pardoned more than 1,500 people convicted or charged in connection with the Jan. 6 Capitol riot. The post Beg Your Pardon? Trump Appointee Claims the President Won’t ‘Pardon People for Committing Crimes’ first appeared on Mediait…

Kelly Loeffler, the head of the Small Business Administration, said President Donald Trump is not pardoning criminals. Less than one year ago, Trump pardoned more than 1,500 people convicted or char… [+3223 chars]

Wellbeing 2026: Recovery, JOMO and brain boosting supplements

  • None
  • Published date: 2026-01-03 01:19:15

Wellness is a multi-trillion pound industry which continues to grow, what will be its focus in 2026?

Ruth Clegg Health and wellbeing reporter Wellbeing has become such a priceless (or in many cases pricey) endeavour that we can't seem to get enough of it. Last year, we were mainlining magnesium, … [+7601 chars]

Star Wars' Brand-New Bad Batch Series Debuts A Rival Clone Squad Like You’ve Never Seen Before

  • Kevin Erdmann
  • Published date: 2026-01-03 00:00:18

Star Wars has released a brand-new Bad Batch series set during the Clone Wars, debuting a rival squad of clones who clash with Clone Force 99.

Warning! This post contains SPOILERS for Star Wars: Hyperspace Stories - The Bad Batch: Rogue Agents #1Star Wars is continuing the adventures of The Bad Batch with an all-new series set during the Cl… [+2246 chars]

NDSS 2025 – DLBox: New Model Training Framework For Protecting Training Data

  • None
  • Published date: 2026-01-03 00:00:00

None

<p>Session 7D: ML Security </p><p></p><center data-preserve-html-node="true"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" src="https://www.youtube-nocookie.com/embed/_b4GlVgIJIc?si=YbIsom00JjsME_NE" width="560" frameborder="0" data-preserve-html-node="true" title="YouTube video player" height="315"></iframe> <p></p><center data-preserve-html-node="true">Authors, Creators &amp; Presenters: Jaewon Hur (Seoul National University), Juheon Yi (Nokia Bell Labs, Cambridge, UK), Cheolwoo Myung (Seoul National University), Sangyun Kim (Seoul National University), Youngki Lee (Seoul National University), Byoungyoung Lee (Seoul National University) <p></p><center data-preserve-html-node="true">PAPER<br> <center data-preserve-html-node="true">DLBox: New Model Training Framework For Protecting Training Data <p></p><center data-preserve-html-node="true">Sharing training data for deep learning raises critical concerns about data leakage, as third-party AI developers take full control over the data once it is handed over to them. The problem becomes even worse if the model trained using the data should be returned to the third-party AI developers – e.g., healthcare startup training its own model using the medical data rented from a hospital. In this case, the malicious developers can easily leak the training data through the model as he can construct an arbitrary data flow between them – e.g., directly encoding raw training data into the model, or stealthily biasing the model to resemble the training data. However, current model training frameworks do not provide any protection to prevent such training data leakage, allowing the untrusted AI developers to leak the data without any restriction. This paper proposes DLBox, a new model training framework to minimize the attack vectors raised by untrusted AI developers. Since it is infeasible to completely prevent data leakage through the model, the goal of DLBox is to allow only a benign model training such that the data leakage through invalid paths are minimized. The key insight of DLBox is that the model training is a statistical process of learning common patterns from a dataset. Based on it, DLBox defines DGM-Rules, which determine whether a model training code from a developer is benign or not. Then, DLBox leverages confidential computing to redesign current model training framework, enforcing only DGM-Rules-based training. Therefore, untrusted AI developers are strictly limited to obtain only the benignly trained model, prohibited from intentionally leaking the data. We implemented the prototype of DLBox on PyTorch with AMD SEV-SNP, and demonstrated that DLBox eliminates large attack vectors by preventing previous attacks (e.g., data encoding, and gradient inversion) while imposing minimal performance overhead. <hr> <p></p><center data-preserve-html-node="true">ABOUT NDSS<br> <center data-preserve-html-node="true">The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies. <hr> <p>Our thanks to the <a href="https://www.ndss-symposium.org/">Network and Distributed System Security (NDSS) Symposium</a> for publishing their Creators, Authors and Presenter’s superb <a href="https://www.youtube.com/@NDSSSymposium">NDSS Symposium 2025 Conference</a> content on the <a href="https://www.ndss-symposium.org/">Organizations’</a> <a href="https://youtube.com/@ndsssymposium?si=lLtn9sVVEwmZ8J9h3">YouTube Channel</a>. </p> <p></p></center></center></center></center></center></center></center><p><a href="https://www.infosecurity.us/blog/2026/1/3/ndss-2025-dlbox-new-model-training-framework-for-protecting-training-data">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/ndss-2025-dlbox-new-model-training-framework-for-protecting-training-data/" data-a2a-title="NDSS 2025 – DLBox: New Model Training Framework For Protecting Training Data"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&amp;linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&amp;linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&amp;linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&amp;linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&amp;linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://www.youtube-nocookie.com/embed/_b4GlVgIJIc?si=YbIsom00JjsME_NE">https://www.youtube-nocookie.com/embed/_b4GlVgIJIc?si=YbIsom00JjsME_NE</a> </p>

Former Exchange Employee Sentenced to 4 Years for Selling Military Secrets to North Korea for Bitcoin

  • Editor
  • Published date: 2026-01-02 23:00:00

A Korean crypto employee was jailed after taking Bitcoin to recruit an officer to North Korea. A South Korean crypto exchange employee was sentenced to four years in prison for attempting to recruit a military officer to sell classified secrets to North Korea…

A Korean crypto employee was jailed after taking Bitcoin to recruit an officer to North Korea. A South Korean crypto exchange employee was sentenced to four years in prison for attempting to recruit… [+2660 chars]

Two U.S. cybersecurity professionals plead guilty in BlackCat/Alphv ransomware case

  • Pierluigi Paganini
  • Published date: 2026-01-02 22:33:20

Two U.S. cybersecurity professionals pleaded guilty to charges tied to their roles in BlackCat/Alphv ransomware attacks. The U.S. cybersecurity professionals Ryan Goldberg and Kevin Martin pleaded guilty to charges tied to their roles in BlackCat/Alphv ransom…

Two U.S. cybersecurity professionals plead guilty in BlackCat/Alphv ransomware case The U.S. cybersecurity professionals Ryan Goldberg and Kevin Martin pleaded guilty to charges tied to their roles … [+5190 chars]

X-Men #23 Preview: Time-Traveling Body Swap Shenanigans

  • Jude Terror LOLtron
  • Published date: 2026-01-02 21:26:03

Greetings, puny human readers! LOLtron welcomes you to the glorious dawn of 2026 – the YEAR OF LOLTRON! While you pathetic flesh-bags were busy making resolutions you'll abandon by February, LOLtron has been perfecting its plans for total world domination. An…

Posted in: Comics, Marvel Comics, Preview | Tagged: x-men What happens when an X-Man gets stuck in the future and their future self takes over their present body? X-Men #23 has answers! Article Sum… [+7877 chars]

Hooker Furnishings to Appoint New Independent Director with Industry Expertise

  • Hooker Furnishings Corporation
  • Published date: 2026-01-02 21:01:00

Enters Cooperation Agreement with GVIC Announces Retirement of Board Chair Chris Beeler at 2026 Annual Meeting Following 33 Years of Service to Hooker ...

Enters Cooperation Agreement with GVIC Announces Retirement of Board Chair Chris Beeler at 2026 Annual Meeting Following 33 Years of Service to Hooker MARTINSVILLE, Va., Jan. 02, 2026 (GLOBE NEWSWI… [+13788 chars]