Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

jbhall56@infosec.exchangeJ

jbhall56@infosec.exchange

@jbhall56@infosec.exchange
About
Posts
119
Topics
114
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • The ambitious plan calls for dozens of launches in the next decade, with crews eventually exploring the lunar south pole.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    The ambitious plan calls for dozens of launches in the next decade, with crews eventually exploring the lunar south pole. “The goal is not flags and footprints but to stay on the Moon,” the US space agency chief said. https://www.semafor.com/article/03/24/2026/nasa-aims-to-build-20b-lunar-base

    Uncategorized

  • The predictions made in these wine country gatherings have a frighteningly good track record of coming true, organizers told Axios.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    The predictions made in these wine country gatherings have a frighteningly good track record of coming true, organizers told Axios. https://www.axios.com/newsletters/axios-future-of-cybersecurity-16e34530-22ee-11f1-871c-0f669ee3f850.html?chunk=2&utm_term=twsocialshare#story2

    Uncategorized

  • My kids have stolen my gaming chair from my office.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    @accidentalciso I have a Herman Miller Aeron and love it. But I bought mine reconditioned for around $600 vs. $1600 new. I have roller blade casters on it which are lightyears better than stock.

    Uncategorized

  • AWS Bedrock is Amazon's platform for building AI-powered applications.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    AWS Bedrock is Amazon's platform for building AI-powered applications. https://thehackernews.com/2026/03/we-found-eight-attack-vectors-inside.html

    Uncategorized

  • One of the most honorable men I have ever met.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    One of the most honorable men I have ever met. RIP https://www.politico.com/news/2026/03/21/robert-mueller-trump-special-counsel-fbi-obituary-00039059

    Uncategorized

  • @georgetakei That is the problem, they are NOT reading the Bible.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    @georgetakei That is the problem, they are NOT reading the Bible.

    Uncategorized

  • The risks are not the kind a security team can address via patching or configuration changes because they exist at the architectural level in both large language models (LLMs) and in MCP, says Gianpietro Cutolo, cloud threat researcher at Netskope.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    The risks are not the kind a security team can address via patching or configuration changes because they exist at the architectural level in both large language models (LLMs) and in MCP, says Gianpietro Cutolo, cloud threat researcher at Netskope. https://www.darkreading.com/application-security/mcp-security-patched

    Uncategorized

  • In an interview at the SXSW conference in Austin this week, he said that with the speed at which artificial intelligence is growing, AI bot traffic will exceed the amount of human traffic that’s online by 2027.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    In an interview at the SXSW conference in Austin this week, he said that with the speed at which artificial intelligence is growing, AI bot traffic will exceed the amount of human traffic that’s online by 2027. https://techcrunch.com/2026/03/19/online-bot-traffic-will-exceed-human-traffic-by-2027-cloudflare-ceo-says/

    Uncategorized

  • LeakNet is a ransomware operation that has been active since late 2024, encrypting, exfiltrating, and (if a ransom is not paid) leaking the data of compromised organisations.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    LeakNet is a ransomware operation that has been active since late 2024, encrypting, exfiltrating, and (if a ransom is not paid) leaking the data of compromised organisations. https://www.fortra.com/blog/leaknet-ransomware-what-you-need-know

    Uncategorized

  • Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety. https://thehackernews.com/2026/03/google-adds-24-hour-wait-for-unverified.html

    Uncategorized

  • Meta blamed users for not opting into the privacy-protecting feature.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    Meta blamed users for not opting into the privacy-protecting feature. Experts fear the move could be the first major domino to fall for end-to-end encryption tech worldwide. https://www.wired.com/story/the-danger-behind-metas-decision-to-kill-end-to-end-encrypted-instagram-dms/

    Uncategorized

  • @jack_daniel You'll likely feel much better after the Sun crosses the Equator.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    @jack_daniel You'll likely feel much better after the Sun crosses the Equator. 😉🤦‍♂️😂🤣

    Uncategorized

  • A co-founder of Supermicro is among three people charged with diverting servers fitted with Nvidia GPUs worth $2.5 billion to Chinese customers in violation of US export controls.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    A co-founder of Supermicro is among three people charged with diverting servers fitted with Nvidia GPUs worth $2.5 billion to Chinese customers in violation of US export controls. https://www.theregister.com/2026/03/20/supermicro_nvidia_gpu_charges/

    Uncategorized

  • Interesting list of podcasts.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    Interesting list of podcasts. https://www.bbc.com/culture/article/20260318-the-best-podcasts-of-2026

    Uncategorized

  • Sen. Mark Warner (D-Va.) has questions about a $10 billion fee that TikTok's buyers reportedly are paying the U.S.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    Sen. Mark Warner (D-Va.) has questions about a $10 billion fee that TikTok's buyers reportedly are paying the U.S. Treasury Department, on top of what they spent to buy the actual business from China's ByteDance. https://www.axios.com/2026/03/18/tiktok-sale-oracle-silver-lake

    Uncategorized

  • The IoT is horribly insecure, but we already knew that.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    The IoT is horribly insecure, but we already knew that. https://www.schneier.com/blog/archives/2026/03/hacking-a-robot-vacuum.html

    Uncategorized

  • Alex Palcuie was formerly an SRE for Google Cloud Platform.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    Alex Palcuie was formerly an SRE for Google Cloud Platform. "My job is keeping Claude up," Palcuie said, adding: "I've been using LLMs for actual incident response." Since January, he's been reaching for Claude before looking at other monitoring tools. https://www.theregister.com/2026/03/19/anthropic_claude_sre/

    Uncategorized

  • Hackers are using a "highly sophisticated" tool called DarkSword to take over devices, stealing data including emails, usernames, passwords, photos and even cryptocurrency wallets.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    Hackers are using a "highly sophisticated" tool called DarkSword to take over devices, stealing data including emails, usernames, passwords, photos and even cryptocurrency wallets. https://news.sky.com/story/apple-issues-iphone-spyware-alert-and-tells-users-to-update-ios-operating-system-13521654

    Uncategorized

  • Jassy's comments, delivered at an internal all-hands meeting and reviewed by Reuters, reflect a growing conviction within Amazon that AI will reshape not only its cloud segment but also the company's broader strategy.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    Jassy's comments, delivered at an internal all-hands meeting and reviewed by Reuters, reflect a growing conviction within Amazon that AI will reshape not only its cloud segment but also the company's broader strategy. https://www.techspot.com/news/111726-amazon-jassy-now-sees-aws-hitting-600-billion.html

    Uncategorized

  • Amazon found evidence that the FMC software vulnerability has been exploited since late January, and found links to Russia.
    jbhall56@infosec.exchangeJ jbhall56@infosec.exchange

    Amazon found evidence that the FMC software vulnerability has been exploited since late January, and found links to Russia. https://www.securityweek.com/cisco-firewall-vulnerability-exploited-as-zero-day-in-interlock-ransomware-attacks/

    Uncategorized
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups