Security101's Avatar

Security101

@security101

CISO enjoying every day of his profession.

26
Followers
80
Following
1
Posts
16.11.2024
Joined
Posts Following

Latest posts by Security101 @security101

OWASP WrongSecrets

We released version 1.13.1 of #OWASP #WrongSecrets! Now with #springboot4 and challenges involving #telegram #AI, #MCP . You can test it at www.wrongsecrets.com . Like what you see? Please give our repo github.com/OWASP/wrongs... a 🌟 if you like it! #security #opensource

07.03.2026 07:06 πŸ‘ 3 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0
Post image

Happy Friday! πŸš€

Missed a session or want to relive the highlights from OWASP Global AppSec DC? All talk recordings are now live on YouTube!

πŸŽ₯ Catch what you missed
πŸ” Share your favourites
πŸ’‘ Keep your AppSec learning going

πŸ‘‰ www.youtube.com/play...

#owasp #appsec #infosec #cybersecurity

06.03.2026 14:13 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

https://github.com/One-Man-Company/Skills-ContextManager

04.03.2026 12:23 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
AI went from assistant to autonomous actor and security never caught up - Help Net Security AI agent security 2026: why autonomous systems are outpacing enterprise controls and what security teams need to do about it before a breach.

AI went from assistant to autonomous actor and security never caught up

πŸ“– Read more: www.helpnetsecurity.com/2026/03/03/e...

#cybersecurity #cybersecuritynews #agenticAI #CISO #enterprise @1password.bsky.social @elastic.co @confluent.io

03.03.2026 13:48 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
https://github.com/chainloop-dev/chainloop/raw/main/docs/img/overview-1.png

https://github.com/chainloop-dev/chainloop/raw/main/docs/img/overview-1.png

Chainloop is an evidence store and policy engine for Software Supply Chain attestations, SBOMs, VEX, SARIF, and QA reports, with contract-based workflows, Rego policy evaluation, and third-party integrations such as Dependency-Track and Guac

➜ https://ku.bz/_wQslV4bc

03.03.2026 18:26 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Enable multi-factor authentication (MFA) on all your accounts. It's an extra layer of defense that makes it much harder for attackers to get in, even if they have your password. A simple step for stronger online security.
#Cybersecurity #MFA #SecurityTips

02.03.2026 20:27 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Regularly update your software and operating systems. Patches often fix security vulnerabilities that attackers could exploit. A simple step for big protection.
#CybersecurityTips #StaySafeOnline

01.03.2026 19:17 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Harrison Ford: Life Achievement Award Acceptance Speech | 32nd Annual Actor Awards
Harrison Ford: Life Achievement Award Acceptance Speech | 32nd Annual Actor Awards YouTube video by Netflix

When you have the chance, please take the time to watch Harrison Ford's remarkable, beautiful Life Achievement Award acceptance speech. #ActorAwards

www.youtube.com/watch?v=dV_2...

02.03.2026 04:02 πŸ‘ 6222 πŸ” 1447 πŸ’¬ 292 πŸ“Œ 217

https://github.com/cisco-ai-defense/skill-scanner

02.03.2026 04:22 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

AI dev tool alert.
Claude Code vulnerabilities (now patched) allowed:
RCE via project hooks
MCP consent bypass
API key exfiltration
Config files became execution vectors.
AI-assisted development expands the trust boundary.
Have you updated your tools?
#ClaudeCode #Anthropic #AIsecurity #DevSecOps

28.02.2026 16:50 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Protect your accounts with strong, unique passwords. A long passphrase is easy to remember and much harder to guess. Consider a password manager for convenience and security.
#CybersecurityTips #PasswordStrength #OnlineSafety

28.02.2026 19:15 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Regular software updates aren't just for new features. They often patch security vulnerabilities, making your devices safer from known threats. Make it a habit to update for better digital defense.
#CybersecurityTips #StaySafeOnline #DigitalDefense

28.02.2026 20:17 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
sbom-tools β€” From SBOM to Insight Semantic SBOM diff and analysis tool. Compare, validate, and assess the quality of SBOMs across CycloneDX and SPDX formats.

Binarly's Alex Matrosov has launched SBOM Tools, a platform to compare and analyze SBOM files to understand software supply chain risks

sbom.tools

01.03.2026 01:07 πŸ‘ 17 πŸ” 9 πŸ’¬ 1 πŸ“Œ 0

https://github.com/lreuss07/secintel-ai

26.02.2026 10:43 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
LLMs Generate PredictableΒ Passwords LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly uneven Β­ for example, L , 9, m, 2, $ and # appeared in all 50 passwords, but 5 and @ only appeared in one password each, and most of the letters in the alphabet never appeared at all.

LLMs Generate PredictableΒ Passwords

LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly uneven…

26.02.2026 12:07 πŸ‘ 9 πŸ” 4 πŸ’¬ 3 πŸ“Œ 0
Save the Date fΓΌr den BSI-Kongress am 15. und 16. April

Save the Date fΓΌr den BSI-Kongress am 15. und 16. April

Save the Date! πŸ“…
Der 21. BSI-Kongress findet vom 15.–16. April 2026 statt – jeweils von 9:30 bis 16:30 Uhr (virtuell).
Das Motto: β€žCybernation Deutschland: gemeinsam, sicher, digitalβ€œ

#BSI #ITSicherheit #Cybersecurity #CybernationDeutschland #DeutschlandDigitalSicherBSI

26.02.2026 15:00 πŸ‘ 4 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Our February meetup continues with Gary Archer speaking about Securing AI Agents.

Watch the live-stream πŸ“Ί here:
πŸ‘‡
www.youtube.com/live/VwSCOJW...

26.02.2026 20:40 πŸ‘ 1 πŸ” 1 πŸ’¬ 2 πŸ“Œ 0
Preview
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. "The vulnerabilities exploit various configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables – executing
25.02.2026 17:00 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Chaos Computer Club: Was sind Alternativen zu Google, Paypal und Whatsapp? Amerikanische Techkonzerne bestimmen unseren digitalen Alltag. Der Chaos Computer Club will Alternativen bekannter machen. Dazu veranstaltet er auch im Rhein-Main-Gebiet digitale UnabhΓ€ngigkeitstage.

An jedem ersten Sonntag im Monat: Wissen in kleinen Schritten vermitteln, praktikable Alternativen aufzeigen www.faz.net/aktuell/rhei...

24.02.2026 22:39 πŸ‘ 112 πŸ” 41 πŸ’¬ 4 πŸ“Œ 1

Myth: "I only get viruses from sketchy sites." πŸš«πŸ’» Truth: Malware can come from any source, even legitimate websites through ads or downloads. Always stay vigilant and keep your software updated! #CyberMyths #Malware

24.02.2026 18:06 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

A strong password manager is your friend for unique, complex passwords across all accounts. Protect yourself one login at a time. #CybersecurityTips #PasswordManager #InfoSec

24.02.2026 21:27 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Protect your accounts with unique, strong passwords. A password manager can help you keep track without memorizing dozens. Small steps make a big difference in your online security.
#CybersecurityTips #PasswordSecurity #OnlineSafety

24.02.2026 22:25 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

πŸ”’πŸ’” Hackers know our weaknesses: they exploit fear and urgency to manipulate us into hasty decisions. It's not just about techβ€”it's about understanding human psychology. Stay vigilant and think before you click! #CyberSecurity #HumanPsychology

24.02.2026 23:57 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Microsoft adds Copilot data controls to all storage locations Microsoft is expanding data loss prevention (DLP) controls to block the Microsoft 365 Copilot AI assistant from processing confidential Word, Excel, and PowerPoint documents, regardless of their location.

Microsoft adds Copilot data controls to all storage locations #cybersecurity #hacking #news #infosec #security #technology #privacy

24.02.2026 17:38 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Microsoft says bug causes Copilot to summarize confidential emails Microsoft says a Microsoft 365 Copilot bug has been causing the AI assistant to summarize confidential emails since late January, bypassing data loss prevention (DLP) policies that organizations rely ...

"Enterprise" Software Entwicklung... aha.

#KRITIS Sektor #IT und #TK

Microsoft says bug causes Copilot to summarize confidential emails

"Microsoft says a Microsoft 365 Copilot bug has been causing the AI assistant to summarize confidential emails..."
www.bleepingcomputer.com/news/microso...

19.02.2026 07:38 πŸ‘ 19 πŸ” 12 πŸ’¬ 1 πŸ“Œ 0

https://github.com/aws-samples/sample-agentic-frameworks-on-aws

18.02.2026 16:11 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
CVEDatabase.com - Search CVE Vulnerabilities & Get AI Remediation Search CVE vulnerabilities instantly with CVSS scores, affected products, threat context, and AI-powered remediation guidance.

πŸ”Ž Tired of hunting CVEs across 5 different sites?

That’s why cvedatabase.com exists:
-Clean CVE pages
-No fluff
-Fast lookups
-Built for defenders
Start here β†’ cvedatabase.com

#CyberSecurity #VulnerabilityManagement

17.02.2026 17:41 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
NIS2, DORA, and the EU Post-Quantum Roadmap If you are a CISO under NIS2 or DORA, you are already expected to run a risk-management system that tracks material, evolving threats - and to implement β€œstate‑of‑the‑art” controls appropriate...

CISOs under NIS2 or DORA: the EU's Post-Quantum roadmap makes quantum a material, evolving governance risk you must track. It's not "deploy X by Y"β€”it's about auditable crypto agility and timelines supervisors will use (2030–2035). Read: postquantum.com/quantum-poli... #PQC #CyberSecurity

13.02.2026 19:40 πŸ‘ 0 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
The Boardroom Reality: How CISOs Are Talking About Cyber Risk in 2026 - Trusona Cybersecurity discussions in the boardroom have fundamentally changed. In 2026, CISOs are reframing cyber risk in business terms as boards demand accountability, prevention, and defensible decisions.

CISOs no longer just present metrics. They defend decisions. Directors want answers about how attackers gain access, if the risk was already known, and why the organization was exposed.

Read More: www.trusona.com/blog/boardro...

#CyberRisk #CISO #BoardGovernance #CyberSecurity #IdentitySecurity

13.02.2026 20:57 πŸ‘ 0 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Defence in Debt: When Security Spending Doesn't Buy Security There's a special kind of technical debt that doesn't show up in Jira. It doesn't sit in a backlog. It doesn't have a product owner. It doesn't even admit it exists. It lives in PowerPoint. I call it...

Just spent millions on security tools but forgot to actually configure them. Peak enterprise. #CyberSecurity #TechDebt #Leadership

https://mgamble.ca/p/defence-in-debt-when-security-spending-doesnt-buy-security

14.02.2026 05:10 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0