Joelle and I are both under the weather with a little bug- hacking and coughing and just feeling general unwell but not unwell enough to do anything about doctor wise, so we have just been puttering around the house. I have that low grade fuzziness that comes…
Joelle and I are both under the weather with a little bug- hacking and coughing and just feeling general unwell but not unwell enough to do anything about doctor wise, so we have just been puttering … [+1714 chars]
Resecurity caught ShinyHunters (SLH) using decoy accounts; the group attacked airlines, telecoms, and law enforcement in Sept 2025. In an interesting development, Resecurity has caught actors known as “ShinyHunters” or “Scattered Lapsus$ Hunters” (SLH) levera…
Resecurity Caught ShinyHunters in Honeypot
In an interesting development, Resecurity has caught actors known as ShinyHunters or “Scattered Lapsus$ Hunters” (SLH) leveraging honeypot (decoy) accounts… [+1531 chars]
MANJUNG: The restructuring of the National Higher Education Fund Corporation (PTPTN) loan repayments will not affect borrowers' housing loans or other personal loans, says Datuk Seri Dr Zambry Abd Kadir. Read full story
Changes will affect only non-paying borrowers, leaving others untouched
MANJUNG: The restructuring of the National Higher Education Fund Corporation (PTPTN) loan repayments will not affect borrower… [+2168 chars]
In light of the tragic events that have occurred in Venezuela, what is happening to the Internet in the country, and how are users accessing it? Yesterday, the United States launched a “large scale strike” in Venezuela, capturing Venezuelan President Nicolas …
What is happening to the Internet in Venezuela? Did the U.S. use cyber capabilities?
Yesterday, the United States launched a “large scale strike” in Venezuela, capturing Venezuelan President Nicolas… [+4999 chars]
Tom Jervis thinks that if car manufacturers are going to continue harvesting our data, they need to get better at protecting it from criminals
Such a scenario was bad enough for JLR as a business; crooks were attempting to ransom highly sensitive commercial material, not just next week's staff cafeteria menu. However, manufacturers now coll… [+2062 chars]
Article URL: https://mattwie.se/hinge-command-control-c2
Comments URL: https://news.ycombinator.com/item?id=46488101
Points: 6
# Comments: 0
Disclaimer: This doesn't qualify for consideration through Hinge's Hacker One disclosure page since we need to patch the app and MITM it. Although this technique is convoluted, I think a threat actor… [+8994 chars]
Trump ordered the divestment of a $2.9M chip deal, citing U.S. national security risks if HieFo retained control of Emcore ’s technology. President Trump ordered the divestment of a $2.9 million chips deal, citing national security risks tied to HieFo Corp.’s…
President Trump blocks $2.9M Emcore chip sale over security concerns
President Trump ordered the divestment of a $2.9 million chips deal, citing national security risks tied to HieFo Corp.s control … [+2525 chars]
Security reconnaissance toolkit: passive-first OSINT with active scanning capabilities (port scanning, DirBuster). Scope-aware with explainable findings.
// Contributed by the Serene-Brew TeamSpecial thanks to knightsky-cpu
Features
<ul><li>Scope guard: refuses out-of-scope targets.</li><li>Passive modules: CT logs (crt.sh), DNS (A/AAAA/CNAME/MX/TXT… [+7570 chars]
A tool to provision and manage charm development environments
concierge is an opinionated utility for provisioning charm development and testing machines. concierge-py is a reimplementation (vibespiled) in Python.
Its role is to ensure that a given machine has… [+11879 chars]
The Chinese Communist Party’s relationship with law, truth, and international commitments has long been marked by a fundamental contradiction: the more Beijing signs agreements pledging cooperation, rights, and restraint, the more systematically it violates t…
The Chinese Communist Partys relationship with law, truth, and international commitments has long been marked by a fundamental contradiction: the more Beijing signs agreements pledging cooperation, r… [+7641 chars]
Lacey Chabert and Ian Harding star in this tropical adventure.
Lost in Paradise on the Hallmark Channel is a new love story about two strangers from L.A., one a high-powered fashion exec and the other a chef (Lacey Chabert and Ian Harding, respectively), who hea… [+5425 chars]
France will probe AI-generated sexual deepfakes made with Grok on X after hundreds of women and teens reported “undressed” images shared online. French authorities will investigate AI-generated sexually explicit deepfakes created with Grok on X after hundreds…
French authorities investigate AI undressing deepfakes on X
French authorities will investigate AI-generated sexually explicit deepfakes created with Grok on X after hundreds of women and teens repo… [+2264 chars]
A notorious sequence cut from Event Horizon has been restored in full for the prequel Dark Descent, but can it live up to decades of hype?
Warning! Spoilers ahead for Event Horizon: Dark Descent!
The following article contains descriptions of violent and graphic imagery.
The notorious "Blood Orgy" sequence that was heavily cut fromEve… [+5390 chars]
Handala hacker group claims to have hacked former Justice Minister Ayelet Shaked's phone, criticizing her stance on antisemitism and making fun of Israel's advanced technology.
The Iranian "Handala" hacker group on Saturday claimed to have hacked former Justice Minister Ayelet Shaked's phone, publishing photos and videos of her along with an alleged list of her contacts.
I… [+3858 chars]
Hacking, wheezing and sneezing your way into 2026? You aren't alone.
Hacking, wheezing and sneezing your way into 2026? You aren’t alone.
A nasty new influenza variant dubbed the super flu is sweeping across the US, fueling a sharp rise in illnesses. So far this seas… [+5060 chars]
Venezuelan launch site could send missiles to D.C., according to private analysis of satellite images; U.S. Army calls it “speculative.”
Theres no question Venezuela has close military relations with those countries, as well as Lebanons Hezbollah, and that it foments political unrest among its neighbours, said Ellis. A recent Chinese … [+4167 chars]
GreyNoise observed thousands of attacks targeting about a dozen Adobe ColdFusion vulnerabilities during the Christmas 2025 holiday. GreyNoise reports a coordinated campaign exploiting about a dozen Adobe ColdFusion vulnerabilities, with thousands of attack at…
Thousands of ColdFusion exploit attempts spotted during Christmas holiday
GreyNoise reports a coordinated campaign exploiting about a dozen Adobe ColdFusion vulnerabilities, with thousands of attack… [+2780 chars]
Less than one year ago, Trump pardoned more than 1,500 people convicted or charged in connection with the Jan. 6 Capitol riot.
The post Beg Your Pardon? Trump Appointee Claims the President Won’t ‘Pardon People for Committing Crimes’ first appeared on Mediait…
Kelly Loeffler, the head of the Small Business Administration, said President Donald Trump is not pardoning criminals.
Less than one year ago, Trump pardoned more than 1,500 people convicted or char… [+3223 chars]
Wellness is a multi-trillion pound industry which continues to grow, what will be its focus in 2026?
Ruth Clegg Health and wellbeing reporter
Wellbeing has become such a priceless (or in many cases pricey) endeavour that we can't seem to get enough of it.
Last year, we were mainlining magnesium, … [+7601 chars]
Star Wars has released a brand-new Bad Batch series set during the Clone Wars, debuting a rival squad of clones who clash with Clone Force 99.
Warning! This post contains SPOILERS for Star Wars: Hyperspace Stories - The Bad Batch: Rogue Agents #1Star Wars is continuing the adventures of The Bad Batch with an all-new series set during the Cl… [+2246 chars]
None
<p>Session 7D: ML Security </p><p></p><center data-preserve-html-node="true"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" src="https://www.youtube-nocookie.com/embed/_b4GlVgIJIc?si=YbIsom00JjsME_NE" width="560" frameborder="0" data-preserve-html-node="true" title="YouTube video player" height="315"></iframe>
<p></p><center data-preserve-html-node="true">Authors, Creators & Presenters: Jaewon Hur (Seoul National University), Juheon Yi (Nokia Bell Labs, Cambridge, UK), Cheolwoo Myung (Seoul National University), Sangyun Kim (Seoul National University), Youngki Lee (Seoul National University), Byoungyoung Lee (Seoul National University)
<p></p><center data-preserve-html-node="true">PAPER<br>
<center data-preserve-html-node="true">DLBox: New Model Training Framework For Protecting Training Data
<p></p><center data-preserve-html-node="true">Sharing training data for deep learning raises critical concerns about data leakage, as third-party AI developers take full control over the data once it is handed over to them. The problem becomes even worse if the model trained using the data should be returned to the third-party AI developers – e.g., healthcare startup training its own model using the medical data rented from a hospital. In this case, the malicious developers can easily leak the training data through the model as he can construct an arbitrary data flow between them – e.g., directly encoding raw training data into the model, or stealthily biasing the model to resemble the training data. However, current model training frameworks do not provide any protection to prevent such training data leakage, allowing the untrusted AI developers to leak the data without any restriction. This paper proposes DLBox, a new model training framework to minimize the attack vectors raised by untrusted AI developers. Since it is infeasible to completely prevent data leakage through the model, the goal of DLBox is to allow only a benign model training such that the data leakage through invalid paths are minimized. The key insight of DLBox is that the model training is a statistical process of learning common patterns from a dataset. Based on it, DLBox defines DGM-Rules, which determine whether a model training code from a developer is benign or not. Then, DLBox leverages confidential computing to redesign current model training framework, enforcing only DGM-Rules-based training. Therefore, untrusted AI developers are strictly limited to obtain only the benignly trained model, prohibited from intentionally leaking the data. We implemented the prototype of DLBox on PyTorch with AMD SEV-SNP, and demonstrated that DLBox eliminates large attack vectors by preventing previous attacks (e.g., data encoding, and gradient inversion) while imposing minimal performance overhead.
<hr>
<p></p><center data-preserve-html-node="true">ABOUT NDSS<br>
<center data-preserve-html-node="true">The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
<hr>
<p>Our thanks to the <a href="https://www.ndss-symposium.org/">Network and Distributed System Security (NDSS) Symposium</a> for publishing their Creators, Authors and Presenter’s superb <a href="https://www.youtube.com/@NDSSSymposium">NDSS Symposium 2025 Conference</a> content on the <a href="https://www.ndss-symposium.org/">Organizations’</a> <a href="https://youtube.com/@ndsssymposium?si=lLtn9sVVEwmZ8J9h3">YouTube Channel</a>. </p>
<p></p></center></center></center></center></center></center></center><p><a href="https://www.infosecurity.us/blog/2026/1/3/ndss-2025-dlbox-new-model-training-framework-for-protecting-training-data">Permalink</a></p><p>
</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/ndss-2025-dlbox-new-model-training-framework-for-protecting-training-data/" data-a2a-title="NDSS 2025 – DLBox: New Model Training Framework For Protecting Training Data"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-dlbox-new-model-training-framework-for-protecting-training-data%2F&linkname=NDSS%202025%20%E2%80%93%20DLBox%3A%20New%20Model%20Training%20Framework%20For%20Protecting%20Training%20Data" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://www.youtube-nocookie.com/embed/_b4GlVgIJIc?si=YbIsom00JjsME_NE">https://www.youtube-nocookie.com/embed/_b4GlVgIJIc?si=YbIsom00JjsME_NE</a> </p>
A Korean crypto employee was jailed after taking Bitcoin to recruit an officer to North Korea. A South Korean crypto exchange employee was sentenced to four years in prison for attempting to recruit a military officer to sell classified secrets to North Korea…
A Korean crypto employee was jailed after taking Bitcoin to recruit an officer to North Korea.
A South Korean crypto exchange employee was sentenced to four years in prison for attempting to recruit… [+2660 chars]
Two U.S. cybersecurity professionals pleaded guilty to charges tied to their roles in BlackCat/Alphv ransomware attacks. The U.S. cybersecurity professionals Ryan Goldberg and Kevin Martin pleaded guilty to charges tied to their roles in BlackCat/Alphv ransom…
Two U.S. cybersecurity professionals plead guilty in BlackCat/Alphv ransomware case
The U.S. cybersecurity professionals Ryan Goldberg and Kevin Martin pleaded guilty to charges tied to their roles … [+5190 chars]
Greetings, puny human readers! LOLtron welcomes you to the glorious dawn of 2026 – the YEAR OF LOLTRON! While you pathetic flesh-bags were busy making resolutions you'll abandon by February, LOLtron has been perfecting its plans for total world domination. An…
Posted in: Comics, Marvel Comics, Preview | Tagged: x-men
What happens when an X-Man gets stuck in the future and their future self takes over their present body? X-Men #23 has answers!
Article Sum… [+7877 chars]
Enters Cooperation Agreement with GVIC Announces Retirement of Board Chair Chris Beeler at 2026 Annual Meeting Following 33 Years of Service to Hooker ...
Enters Cooperation Agreement with GVIC
Announces Retirement of Board Chair Chris Beeler at 2026 Annual Meeting Following 33 Years of Service to Hooker
MARTINSVILLE, Va., Jan. 02, 2026 (GLOBE NEWSWI… [+13788 chars]