DiscoverSecurity Shield Field
Security Shield Field
Claim Ownership

Security Shield Field

Author: Masayuky

Subscribed: 2Played: 4
Share

Description

ここ最近(1ヶ月前後)の間にあったサイバーセキュリティに関するトピックについて、AI が説明します。
Generative AI, IoT, プライバシーに関するトピックが多くなるかもしれません。
21 Episodes
Reverse
Social Engineering

Social Engineering

2026-01-2716:22

https://www.youtube.com/watch?v=X7O_S2zDzTQhttps://www.youtube.com/watch?v=7KCMK-LY-WM
https://www.securityboulevardchats.com/e/agentic-ai-and-the-new-cybersecurity-risk-model-security-boulevard-ep-12/https://www.nist.gov/itl/applied-cybersecurity/special-publication-800-63https://www.nist.gov/blogs/cybersecurity-insights/lets-get-digital-updated-digital-identity-guidelines-are-herehttps://aws.amazon.com/jp/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/
https://www.helpnetsecurity.com/2025/10/29/agentic-ai-security-indirect-prompt-injection/https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomainshttps://www.itmedia.co.jp/news/articles/2511/21/news132.html
https://www.telecomtv.com/content/security/nokia-report-reveals-alarming-extent-of-telco-cybersecurity-threats-53994/https://www.theregister.com/2025/10/08/telecoms_wholesaler_icuk_restores_services/https://www.itnews.com.au/news/travel-esims-secretly-route-traffic-over-chinese-and-undisclosed-networks-study-619659
https://www.ipa.go.jp/jinzai/ics/core_human_resource/final_project/2025/Vulnerability-assessment.html
https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-servicehttps://www.youtube.com/watch?v=BAjaQjsfI9A
https://www.npa.go.jp/publications/statistics/cybersecurity/data/R7kami/R07_kami_cyber_jyosei.pdfhttps://www.bbc.com/news/articles/cn4w0d8zz22ohttps://www.helpnetsecurity.com/2025/08/27/ai-security-map-linking-vulnerabilities-real-world-impact/https://www.darkreading.com/cloud-security/cloud-edge-new-attack-surface
https://www.anthropic.com/news/detecting-countering-misuse-aug-2025https://github.com/nrwl/nx/security/advisories/GHSA-cxm3-wv7p-598c?s=31https://arcticwolf.com/resources/blog/wormable-malware-causing-supply-chain-compromise-of-npm-code-packages/
https://www.securityweek.com/hackers-target-popular-nx-build-system-in-first-ai-weaponized-supply-chain-attack/https://www.wiz.io/blog/s1ngularitys-aftermathhttps://www.wiz.io/blog/s1ngularity-supply-chain-attackhttps://www.itnews.com.au/news/travel-esims-secretly-route-traffic-over-chinese-and-undisclosed-networks-study-619659https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift
https://futurism.com/hackers-trick-chatgpt-personal-datahttps://www.prnewswire.com/news-releases/zenity-labs-exposes-widespread-agentflayer-vulnerabilities-allowing-silent-hijacking-of-major-enterprise-ai-agents-circumventing-human-oversight-302523580.htmlhttps://gbhackers.com/nist-releases-new-control-overlays/#google_vignette
https://github.com/microsoft/wassettehttps://thenewstack.io/python-exposes-phantom-dependencies-with-sbom-screening/https://thenewstack.io/experts-split-on-ai-reviewing-its-own-code-for-security/
https://www.aim.security/lp/aim-labs-curxecute-blogposthttps://support.microsoft.com/en-us/topic/external-workbook-links-to-blocked-file-types-will-be-disabled-by-default-6dd12903-0592-463d-9e68-0741cf62ee58https://isc.sans.edu/diary/32166
https://www.livescience.com/technology/artificial-intelligence/ai-hallucinates-more-frequently-as-it-gets-more-advanced-is-there-any-way-to-stop-it-from-happening-and-should-we-even-tryhttps://securelist.com/open-source-package-for-cursor-ai-turned-into-a-crypto-heist/116908/
https://www.theregister.com/2025/07/03/lets_encrypt_rolls_out_free/https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion?hl=en
- https://security.googleblog.com/2025/06/mitigating-prompt-injection-attacks.html- https://blog.flatt.tech/entry/passkey_security?s=31
https://security.googleblog.com/2025/06/mitigating-prompt-injection-attacks.htmlhttps://blog.flatt.tech/entry/prompt_injection
Outlook comments abused to deliver malwareBe Careful With Fake Zoom Client DownloadsThe Cost of a Call: From Voice Phishing to Data Extortion日本を狙う新手のサイバー攻撃、空白の履歴書に要注意
増大するサイバー攻撃の脅威に対応するための能動的サイバー防御の導入と法整備 サイバーセキュリティ能力向上のための主要な3つの柱(官民連携、通信情報利用、アクセス・無害化)References:https://www.cas.go.jp/jp/seisaku/cyber_anzen_hosyo_torikumi/pdf/setsumei.pdfhttps://www.nikkei.com/article/DGXZQOUA1335S0T10C25A5000000/
トランプ政権下の予算削減と非営利化トランプ政権下におけるサイバーセキュリティ予算削減の影響と非営利団体の台頭米国サイバーセキュリティの変革期:予算削減と非営利イニシアチブの出現https://www.cisa.gov/news-events/news/statement-matt-hartman-cve-program
近年におけるAI、特に大規模言語モデル(LLM)がソフトウェア開発やセキュリティ報告の分野に与えている影響、特にバグレポートに関連する課題と、その一方で示唆されるポテンシャルについての状況について取り上げます。
loading
Comments