Brief

Brief #72: NVIDIA flaw, 3.8 Tbps Cloudflare DDoS, AWS AI hijacking

Mysterious Linux malware exploiting misconfigurations, LLMs' package hallucination risks, and new API Security Maturity Model

9 min read
mandos brief week 40 of 2024

Happy Sunday!

I hope this Brief finds you well and ready to tackle the week ahead.

In this edition, I am covering:

And much more.

Prefer to listen?

audio-thumbnail
Brief 72 NVIDIA flaw 38 Tbps Cloudflare DDoS AWS AI hijacking
0:00
/717.96

(Led by AI characters)

How would you prefer to consume Mandos Brief newsletter?

1️⃣ Written format only (no podcast)

2️⃣ Written format + AI-generated podcast

3️⃣ Written format + podcast with me speaking


Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share.

INDUSTRY NEWS

Record-Breaking 3.8 Tbps DDoS Attack Targets Financial and Telecom Sectors

Critical NVIDIA Container Toolkit Flaw Allows Container Escape Attacks

Mysterious Linux Malware Exploits Thousands of Server Misconfigurations

LEADERSHIP INSIGHTS

Humor Emerges as Powerful Tool in Cybersecurity Training and Culture

API Security Maturity Model Assesses Weaknesses and Vulnerabilities

Secrets Sprawl in Public Repos Reaches 12.8 Million, Driven by API Keys

CAREER DEVELOPMENT

Qualys Offers Free Cybersecurity Training and Certification Courses

CyberThreat 2024: Empowering Europe's Cyber Security Community in London

Cisco Offers Free Cybersecurity Training and Certification in Giveaway

AI & SECURITY

LLMs' Package Hallucination Problem Poses Supply Chain Risk

MITRE Launches AI Incident Sharing Initiative to Improve Collective Defense

Attackers Hijacking AWS AI Infrastructure to Power Unfiltered Sexual Roleplaying Chatbots

MARKET ANALYSIS

Apono Raises $15.5M in Series A Funding to Advance Cloud Access Governance

Safe Security Launches Generative AI-Powered Mobile App for CISOs

CrowdStrike Expands Marketplace to Meet Demand for Integrated Cybersecurity Solutions

TOOLS

RE&CT Framework

A framework — knowledge base of actionable Incident Response techniques. A community-driven collection of Security Incident Response and a data source of the Atomic Threat Coverage framework.

Wapiti

The web-application vulnerability scanner Wapiti allows you to audit the security of your websites or web applications. It performs 'black-box' scans by crawling webpages, looking for scripts and forms to inject data, and acts like a fuzzer to test vulnerabilities.

Shuffler

Shuffle Automation is an open-source SOAR (Security Orchestration, Automation, and Response) solution designed to streamline security workflows and improve incident response times.


Before you go

If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!

For more frequent cybersecurity leadership insights and tips, follow me on LinkedInBlueSky and Mastodon.

Best, 
Nikoloz

Share This Post

Check out these related posts

Brief #82: Apple iCloud Vulnerability, Cloud Security Skills Gap, SolarWinds ARM Flaw

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read

Brief #81: OpenAI Container Risks, Cloudflare Tunnel Attacks, AWS IR Service Launch

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read

Brief #80: Cloudflare Data Loss, Godot Malware, Claude AI Vulnerability

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read