Patrick C Miller's Avatar

Patrick C Miller

@patrickcmiller

Critical Infrastructure & Industrial Security Advisor. Ampyx Cyber CEO. Public speaker. Airport dweller. Recovering regulator. BEERISAC member. CCI US Coordinator. Former SANS Instructor. #ICS #OT #NERCCIP #NIST #IEC62443 #NIS2 #CRA #SlavaUkraini

2,092
Followers
1,157
Following
23,751
Posts
19.08.2023
Joined
Posts Following

Latest posts by Patrick C Miller @patrickcmiller

Preview
AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning CyberStrikeAI lowers the barrier to complex cyberattacks by combining AI orchestration, MCP integration, and more than 100 offensive tools into a single, public GitHub repository.

AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning www.csoonline.com/article/4140...

06.03.2026 16:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
New β€˜Sandworm_Mode’ Supply Chain Attack Hits NPM The malicious code propagates like a worm, poisons AI assistants, exfiltrates secrets, and contains a destructive dead switch.

New β€˜Sandworm_Mode’ Supply Chain Attack Hits NPM www.securityweek.com/new-sandworm...

06.03.2026 16:12 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Huge β€œShadow Layer” of Organizations Hit by Supply Chain Attacks Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches

Huge β€œShadow Layer” of Organizations Hit by Supply Chain Attacks www.infosecurity-magazine.com/news/shadow-...

06.03.2026 15:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
How AI Damages Work Relationshipsβ€”and Where It Can Actually Help Our relationships at work matter. They make us happier, more productive, and more engaged. They help us weather tough times and celebrate good ones. And they’re built through thousands of small…

How AI Damages Work Relationshipsβ€”and Where It Can Actually Help hbr.org/2026/03/how-...

06.03.2026 15:12 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CrowdStrike says attackers are moving through networks in under 30 minutes The average time from intrusion to network movement in 2025 was 29 minutes, a 65% increase in speed from the year prior.

CrowdStrike says attackers are moving through networks in under 30 minutes cyberscoop.com/crowdstrike-...

06.03.2026 14:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Security hole could let hackers take over Juniper Networks PTX core routers The vulnerability is especially dangerous because this model sits in the network core, so attackers could intercept or redirect data, says an expert.

Security hole could let hackers take over Juniper Networks PTX core routers www.csoonline.com/article/4138...

06.03.2026 14:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Multi-Stage Malware campaign uses Ukrainian email service for credibility, deploying

Multi-Stage "BadPaw" Malware Campaign Targets Ukraine www.infosecurity-magazine.com/news/badpaw-...

06.03.2026 13:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability The researcher says he has identified thousands of internet-exposed IQ4 building management controllers.

Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability www.securityweek.com/honeywell-re...

06.03.2026 13:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Compromised Site Management Panels are a Hot Item in Cybercrime Markets Compromised cPanel credentials are being sold in bulk across underground channels as plug-and-play phishing and scam infrastructure. Flare explains how analyzing 200,000 underground posts reveals a…

Compromised Site Management Panels are a Hot Item in Cybercrime Markets www.bleepingcomputer.com/news/securit...

06.03.2026 12:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The US Senate empowers NASA to fully engage in lunar space race Our bill authorizes critical funding for, and gives strategic direction to, the agency."

The US Senate empowers NASA to fully engage in lunar space race arstechnica.com/space/2026/0...

06.03.2026 12:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The Sun Is 'Glitching.' Scientists Investigated and Solved a Cosmic Mystery Scientists studied tiny, abnormal vibrationsβ€”called β€œglitches”—to discover what happens inside the Sun while it undergoes phases of low activity.

The Sun Is 'Glitching.' Scientists Investigated and Solved a Cosmic Mystery www.404media.co/the-sun-is-g...

06.03.2026 11:42 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
How Deepfakes and Injection Attacks Are Breaking Identity Verification Deepfakes and injection attacks are targeting identity verification moments, from onboarding to account recovery. Incode explains why enterprises must validate the full sessionβ€”media, device…

How Deepfakes and Injection Attacks Are Breaking Identity Verification www.bleepingcomputer.com/news/securit...

06.03.2026 11:12 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers A maximum severityΒ vulnerability in the FreeScout helpdesk platform allows hackers to achieve remote code execution without any user interaction or authentication.

Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers www.bleepingcomputer.com/news/securit...

06.03.2026 10:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Juniper Networks PTX Routers Affected by Critical Vulnerability An out-of-band security update for Junos OS Evolved patches the remote code execution vulnerability CVE-2026-21902.

Juniper Networks PTX Routers Affected by Critical Vulnerability www.securityweek.com/juniper-netw...

06.03.2026 10:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Anthropic gives its retired Claude AI a Substack Anthropic asked Opus 3 what it wanted next. The answer: a blog.

Anthropic gives its retired Claude AI a Substack www.theverge.com/ai-artificia...

06.03.2026 09:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Bridging the operational AI gap Enterprise-wide integration is being leveraged to extend today’s process automations into tomorrow’s agentic workflows.

Bridging the operational AI gap www.technologyreview.com/2026/03/04/1...

06.03.2026 09:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Lego’s Smart Brick is here, and it transforms these new Star Wars sets Five of the eight sets are BYOB (bring your own brick).

Lego’s Smart Brick is here, and it transforms these new Star Wars sets www.theverge.com/gadgets/8860...

06.03.2026 08:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware hackread.com/fake-zoom-te...

06.03.2026 08:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Why the convergence of AI and cybersecurity must be a top priority for the administration COMMENTARY | Here’s what a strategy could look like.

Why the convergence of AI and cybersecurity must be a top priority for the administration www.nextgov.com/ideas/2026/0...

06.03.2026 07:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Cyberattack briefly disrupts Russian internet regulator and defense ministry websites Russia’s internet regulator and defense ministry said their servers were hit by a large DDoS attack that briefly disrupted access to several government websites late last week.

Cyberattack briefly disrupts Russian internet regulator and defense ministry websites therecord.media/cyberattack-...

06.03.2026 07:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Why cybersecurity is now a strategic imperative for business growth, trust and resilience www.weforum.org/stories/2026...

06.03.2026 06:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy Using AI to find security vulnerabilities holds significant promise, but the initial products fall short of businesses' and software developers' needs.

Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy www.darkreading.com/application-...

06.03.2026 06:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Medical Device Maker UFP Technologies Hit by Cyberattack UFP Technologies appears to have been targeted in a ransomware attack that involved data theft and file-encrypting malware.

Medical Device Maker UFP Technologies Hit by Cyberattack www.securityweek.com/medical-devi...

06.03.2026 05:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Malware-laced OpenClaw installers get Bing AI search boost : Think before you download

Malware-laced OpenClaw installers get Bing AI search boost www.theregister.com/2026/03/04/f...

06.03.2026 05:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Zyxel Patches Critical Vulnerability in Many Device Models The issue impacts the UPnP function of multiple device models and could be exploited for remote code execution.

Zyxel Patches Critical Vulnerability in Many Device Models www.securityweek.com/zyxel-patche...

06.03.2026 04:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

US Sanctions Russian Exploit Broker Operation Zero www.securityweek.com/us-sanctions...

06.03.2026 04:12 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 Google uncovered Coruna iOS exploit kit with 23 exploits across five chains targeting iPhones running iOS 13–17.2.1.

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 thehackernews.com/2026/03/coru...

06.03.2026 03:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Meta won’t let morality get in the way of a product launch What a great time to add facial recognition to everything!

Meta won’t let morality get in the way of a product launch www.theverge.com/policy/88634...

06.03.2026 03:12 πŸ‘ 6 πŸ” 6 πŸ’¬ 1 πŸ“Œ 0
Poisoning AI Training Data - Schneier on Security All it takes to poison AI training data is to create a website: I spent 20 minutes writing an article on my personal website titled β€œThe best tech journalists at eating hot dogs.” Every word is a…

Poisoning AI Training Data - Schneier on Security www.schneier.com/blog/archive...

06.03.2026 02:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Health-ISAC Annual Report 2025 shows surge in threat intel and tabletop drills, putting resilience in focus - Industrial Cyber Health-ISAC Annual Report 2025 shows a surge in threat intelligence and tabletop drills, while putting resilience in focus.

Health-ISAC Annual Report 2025 shows surge in threat intel and tabletop drills, putting resilience in focus industrialcyber.co/medical/heal...

06.03.2026 02:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0