Chinese have capabilities....."three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extracted Claude's capabilities to improve their own models."
thehackernews.com/2026/02/anth...
Chinese have capabilities....."three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extracted Claude's capabilities to improve their own models."
thehackernews.com/2026/02/anth...
PayPayl Data breach cybersecuritynews.com/paypal-data-...
Couple of days ago I noticed that Steam does not work. I thought it might be DDOS and it was. share.google/LTKsVzkZxi2N...
www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.blee...
Checkout this Meetup with Microsoft Security User Group Finland: meetu.ps/e/PrJsH/11qZ...
New blog about automated malware remediation from storage account blobs www.jussimetso.com/index.php/20...
My Microsoft Sentinel data lake blog is out now www.jussimetso.com/index.php/20...
My first renewal π₯π₯π₯
The sequel with task lists for modernizing on-prem SIEM to Sentinel www.jussimetso.com/index.php/20...
How to modernize your on-prem siem to Microsoft Sentinel aka Cloud Siem www.jussimetso.com/index.php/20...
Last blog post in my Defender for Cloud series so far. The end has come.
Topic this time is Data and AI Security Dashboard.
www.jussimetso.com/index.php/20...
Old but still valid.
New bl0g!
Defender for Cloud - Advanced protection is kind of LARGE area to cover but I tried.
Advanced Threat Protection provides a new layer of security, which enables customers to detect and respond to potential threats as they occur by providing security alerts on anomalous activities.
Workload Protection in Microsoft Defender for Cloud refers to cloud-native security posture management (CSPM) and threat protection for workloads running in Azure, hybrid, and multi-cloud environments (including AWS, GCP, GitHub, Azure DevOps and others).
Blog: Regulatory compliance in Defender for Cloud. If you need to check how your Azure, AWS, GCP resources comply against industry standards you can use this feature. www.jussimetso.com/index.php/20...
OpenAI's #Sora became available in Europe today. π₯ If you have #ChatGPT Plus or Pro subscription you can create your own videos with it. Naturally, I needed to test it by creating some bernese mountain dog videos! π₯°
#openAI #aivideo #bernesemountaindog #ai #texttovideo
"Once installed, Auto-color allows threat actors full remote access to compromised machines, making it very difficult to remove without specialized software," security researcher Alex Armstrong."
Worst. Episode. EVER.
The seventh part of my Microsoft Defender for Cloud EPIC blog series. Read and learn. :)
#microsoft #security #defenderforcloud #cloudsecurity #mvpbuzz
"The use of this utility would help to obfuscate the original source, and ultimate destination, of the request and would also allow its operator to move through potentially otherwise non-publicly-reachable (or routable) devices or infrastructure," Cisco noted.
"An attacker who can generate a SQL injection via CVE-2025-1094 can then achieve arbitrary code execution (ACE) by leveraging the interactive tool's ability to run meta-commands"
In device code phishing, threat actors exploit the device code authentication flow to capture authentication tokens, which they then use to access target accounts, and further gain access to data and other services that the compromised account has access.