All posts tagged: Security

OCSF explained: The shared data language security teams have been missing

OCSF explained: The shared data language security teams have been missing

The security industry has spent the last year talking about models, copilots, and agents, but a quieter shift is happening one layer below all of that: Vendors are lining up around a shared way to describe security data. The Open Cybersecurity Schema Framework (OCSF), is emerging as one of the strongest candidates for that job. It gives vendors, enterprises, and practitioners a common way to represent security events, findings, objects, and context. That means less time rewriting field names and custom parsers and more time correlating detections, running analytics, and building workflows that can work across products. In a market where every security team is stitching together endpoint, identity, cloud, SaaS, and AI telemetry, a common infrastructure long felt like a pipe dream, and OCSF now puts it within reach. OCSF in plain language OCSF is an open-source framework for cybersecurity schemas. It’s vendor neutral by design and deliberately agnostic to storage format, data collection, and ETL choices. In practical terms, it gives application teams and data engineers a shared structure for events so analysts …

Italy’s Meloni travels to Middle East in bid to ensure access to oil and gas – POLITICO

Italy’s Meloni travels to Middle East in bid to ensure access to oil and gas – POLITICO

In an interview with TG1, Meloni said she had chosen to travel to the Gulf “as a gesture of solidarity” with regional allies. But she admitted the trip also had the pragmatic goal of securing Rome’s access to the region’s oil. The closure of the Strait of Hormuz, through which some 20 percent of the oil and natural gas that powers the global economy runs, is having a major impact on Italy. The Arab Gulf states supply the country with around 15 percent of the oil it consumes, and as prices have steadily risen during the last month Meloni’s government has allocated nearly €900 million to slash fuel taxes. The regional visit reflects Rome’s unwillingness to wait for Brussels to come up with a response to the bloc-wide energy crisis. Meloni on Friday said she would move independently to “to guarantee Italy has access to the energy supply it needs.” Source link

What Might Transatlantic Security Look Like If The US Leaves NATO?

What Might Transatlantic Security Look Like If The US Leaves NATO?

Authored by Andrew Korybko, If NATO as a whole remains more or less intact upon the US’ hypothetical exit, and the US then reaches bilateral security deals with Poland, the Baltic States, and Turkiye, then not much would change from Russia’s perspective. Trump’s latest talk about the US leaving NATO is being taken seriously by many Europeans owing to his rage over their refusal to help him reopen the Strait of Hormuz, not to mention them denying the US access to its own bases on their territory and even their airspace for use in the Third Gulf War. It’s possible that this is just a bluff, however, to usher in the radical reforms that he envisages and which were described here in connection with a prior report about his supposed “pay to play” plans. Nevertheless, it’s also possible that he’s indeed serious and that the US will ultimately end up leaving NATO, in which case it’s useful to analyze the future of transatlantic security. For starters, the headquarters of both EUCOM and AFRICOM are in Germany, and it would be very …

Hackers Are Posting the Claude Code Leak With Bonus Malware

Hackers Are Posting the Claude Code Leak With Bonus Malware

A WIRED investigation based on Department of Homeland Security records this week revealed the identities of paramilitary Border Patrol agents who frequently used force against civilians during Operation Midway Blitz in Chicago last fall. Several of the agents, WIRED found, appeared in similar operations in other states around the US. Customs and Border Protection may want to remember to protect its sensitive facility information. Using basic Google searches, WIRED discovered flashcards made by users of the online learning platform Quizlet that contained gate codes to CBP facilities and more. In a rare move, Apple this week released “backported” patches for iOS 18 to protect millions of people still using the older operating system from the DarkSword hacking technique that was found in use in the wild. Discovered in March, DarkSword allows attackers to infect iPhones that simply visit a website loaded with the takeover tools embedded in it. Apple initially pushed users to update to the current version of its operating system, iOS 26, but ultimately issued the iOS 18 patches after DarkSword continued to …

Die Wiederauferstehung des Landes – mit Ulf Poschardt – POLITICO

Die Wiederauferstehung des Landes – mit Ulf Poschardt – POLITICO

Deutschland sehnt sich nach einem Comeback, doch der versprochene Aufschwung der schwarz-roten Koalition lässt auf sich warten. Während traditionsreiche Parteien wie die SPD und die FDP schwächeln und die Union als Kanzlerpartei nach Orientierung sucht, regieren im Land eher Zweifel statt Tatendrang. In diesem Spezial analysiert Rixa Fürsen den Status Quo mit Ulf Poschardt, dem Herausgeber von Welt, Business Insider und POLITICO. Das Berlin Playbook als Podcast gibt es jeden Morgen ab 5 Uhr. Gordon Repinski und das POLITICO-Team liefern Politik zum Hören – kompakt, international, hintergründig. Für alle Hauptstadt-Profis: Der Berlin Playbook-Newsletter bietet jeden Morgen die wichtigsten Themen und Einordnungen. ⁠Jetzt kostenlos abonnieren.⁠ Mehr von Rixa Fürsen gibt es auch hier: Instagram: ⁠@rixafu⁠ | X: ⁠@rixa_fursen⁠. POLITICO Deutschland – ein Angebot der Axel Springer Deutschland GmbH Axel-Springer-Straße 65, 10888 Berlin Tel: +49 (30) 2591 0 ⁠[email protected]⁠ Sitz: Amtsgericht Berlin-Charlottenburg, HRB 196159 B USt-IdNr: DE 214 852 390 Geschäftsführer: Carolin Hulshoff Pol, Mathias Sanchez Luna **(Anzeige) Eine Nachricht der PKV: Hätten Sie’s gedacht? Über 22 Prozent ihrer Einnahmen erzielen Arztpraxen mit Privatpatienten – dabei sind …

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused all its work with the data contracting firm Mercor while it investigates a major security breach that impacted the startup, two sources confirmed to WIRED. The pause is indefinite, the sources said. Other major AI labs are also reevaluating their work with Mercor as they assess the scope of the incident, according to people familiar with the matter. Mercor is one of a few firms that OpenAI, Anthropic, and other AI labs rely on to generate training data for their models. The company hires massive networks of human contractors to generate bespoke, proprietary datasets for these labs, which are typically kept highly secret as they’re a core ingredient in the recipe to generate valuable AI models that power products like ChatGPT and Claude Code. AI labs are sensitive about this data because it can reveal to competitors—including other AI labs in the US and China—key details about the ways they train AI models. It’s unclear at this time whether the data exposed in Mercor’s breach would meaningfully help a competitor. While OpenAI …

Uffizi Museum Denies Severity of Security Breaches From Cyber Attack

Uffizi Museum Denies Severity of Security Breaches From Cyber Attack

The Uffizi Gallery in Florence, home to one of the world’s most well-known collections of Italian Renaissance art, is denying a report that a recent cyber attack gave hackers “access everywhere” in the museum. The article, published on Apr. 3 in the Italian daily newspaper Correre della Sera, said that the hackers infiltrated the museum complex’s IT network, demanded a ransom directly from museum director Simone Verde, and threatened to sell information stolen from the Uffizi’s servers on the dark web. Related Articles However, a report in Reuters several hours after the Correre della Sera news came out cites a statement from the museum explaining that while the Uffizi was indeed targeted in a cyber attack on Feb. 1, nothing was stolen and the hackers did not in fact acquire security maps of the museum or employees’ personal contact information. Corriere della Serra pointed to several sudden changes at the museum as evidence of the attack, specifically related to the Pitti Palace, which is part of the Gallerie deglie Uffizi complex. (The Boboli Gardens are …

Tech firms enter legal limbo over child abuse scanning – POLITICO

Tech firms enter legal limbo over child abuse scanning – POLITICO

The reactions to the political deadlock have been furious: European home affairs commissioner Magnus Brunner said it was “hard to understand,” and child rights group the Internet Watch Foundation called it an “abject political failure.” Despite the lack of a legal fix, tech firms could very well continue to scan for child sexual abuse. Google, Meta, Microsoft and Snapchat’s parent company Snap said in a joint statement late on Friday that they “will continue to take voluntary action” to scan messages. “We call on EU institutions to conclude negotiations on a regulatory framework as a matter of urgency,” the tech companies said. One senior industry official involved in decisions on scanning, granted anonymity because they’re not authorized to speak publicly, said their view is that, though the end of the law makes the legal picture murky, it does not make it unlawful to scan. Firms faced a similar gap in 2020, when they fell without a legal basis to scan for content. All companies scanning for CSAM, with the exception of Meta, said they did not …