Power plants everywhere...
Monday, December 30, 2019
Turbines, Simens, Vulnerabilities, Power
Power plants everywhere...
Friday, December 6, 2019
Artificial Intelligence Security Census
In this paper, we present the results of Internet-wide security scans of publicly available AIML systems. We show that many different interfaces of AIML systems are not protected and accessible from the Internet, moreover, most of them don't even have basic security mechanisms. Also, we describe found the known vulnerabilities related to outdated software and insecure configurations.
Thursday, November 14, 2019
Malign Machine Learning Models and bad DICOM
Zeronighs 2019 AISec releases: how to insert malware into TensorFlow and PyTorch models and hack NVIDIA Clara ML pipeline with DICOM image.
Thursday, October 24, 2019
AISec on ZeroNights 2019
New AISec releases soon at Zeronights 2019.
Roman Palkin : "Malign Machine Learning Models"
Maria Nedyak : "Hacking Medical Imaging with DICOM"
See you there!
Slides and videos
Roman Palkin : "Malign Machine Learning Models"
Maria Nedyak : "Hacking Medical Imaging with DICOM"
See you there!
Slides and videos
Wednesday, October 16, 2019
Cyber Resilience of Railway Signaling Systems
Recently published information on the cybersecurity assessment of railway computer and communication-based control systems (CBCS) identified several weaknesses and vulnerabilities, which allow threat agents to not only degrade system reliability and bypass safety mechanisms, but to carry out attacks which directly affect the rail traffic safety. Despite these findings, remarkably these systems meet all relevant IT security and functional safety requirements and have the required international, national and industrial certificates.
Monday, October 14, 2019
HITB AISec slides and special release
Slides "AI for Security and Security for AI" talk by Sergey Gordeychik, as presented at HITB CyberWeek 2019, Abu Dhabi.
Machine learning technologies are turning from rocket science into daily engineering life. You no longer have to know the difference between Faster R-CNN and HMM to develop a machine vision system, and even OpenCV has bindings for JavaScript allowing to resolve quite serious tasks all the while remaining in front end. On other hand massive implementation of AI in various areas brings about problems, and security is one of the greatest concerns. In the broader context security is really all about trust.
Do we trust AI? I don’t, personally.
Machine learning technologies are turning from rocket science into daily engineering life. You no longer have to know the difference between Faster R-CNN and HMM to develop a machine vision system, and even OpenCV has bindings for JavaScript allowing to resolve quite serious tasks all the while remaining in front end. On other hand massive implementation of AI in various areas brings about problems, and security is one of the greatest concerns. In the broader context security is really all about trust.
Do we trust AI? I don’t, personally.
Thursday, October 10, 2019
Sunday, September 29, 2019
Dangers of MLaaS
Dangers of MLaaS as present on Datafest Siberia by @dnkolegov and Antoniy Nikolaev.
More details in the Measuring Artificial Intelligence and Machine Learning Implementation Security on the Internet writeup.
Download
Enjoy
More details in the Measuring Artificial Intelligence and Machine Learning Implementation Security on the Internet writeup.
Download
Enjoy
Wednesday, September 11, 2019
Friday, August 23, 2019
AI Finger
Special release for XCON 2019 Beijing conference and “AI for Security or Security for AI” talk by Sergey Gordeychik.
Very first (and very draft) round of Machine Learning and Artificial Intelligence Frameworks and Applications Fingerprinting and Internet Census project.
Based on the Grinder framework.
Very first (and very draft) round of Machine Learning and Artificial Intelligence Frameworks and Applications Fingerprinting and Internet Census project.
Based on the Grinder framework.
Location:
Beijing, China
Monday, July 1, 2019
SD-WAN Security Assessment: The First Hours
SD-WAN Security Assessment: The First Hours
Introduction
Suppose you need to perform a security assessment of an SD-WAN solution.
There are several reasons for this and one of them is selecting an SD-WAN provider or product.
A traditional SD-WAN system involves many planes, technologies, mechanisms, services, protocols and features.
It has distributed and multilayered architecture. So where should you start?
The main goal of this document is to list basic sanity checks that can be used when investigating SD-WAN.
We will consider general checks that can be applied to any SD-WAN system.
Wednesday, May 15, 2019
More cyber girls needed!
Harbour.Space University (Barcelona) provides scholarship opportunity for women who want to study Cybersecurity or Fintech.
Apply before May 30th to Hack The Planet for free!
https://harbour.space/register
Apply before May 30th to Hack The Planet for free!
https://harbour.space/register
Sunday, May 12, 2019
On CVE-2019-11550
Citrix SD-WAN Security Update (CTX247735)
An information disclosure vulnerability has been identified in the Citrix SD-WAN Appliance. This vulnerability could allow an unauthenticated attacker to perform a man-in-the-middle attack against management traffic.
Tuesday, April 30, 2019
The Grinder updates
New release of the Grinder framework, created to automatically enumerate and fingerprint hosts on the Internet using different back-end systems: search engines, such as Shodan or Censys, for discovering hosts and NMAP engine for fingerprinting and specific checks.
Wednesday, March 27, 2019
The Grinder for SD-WAN
Internet-connected Devices Census Python Framework by Anton Nikolaev
Special release for insomnihack 2019.
The Grinder framework was created to automatically enumerate and fingerprint different hosts on the Internet using different back-end systems: search engines, such as Shodan or Censys, for discovering hosts and NMAP engine for fingerprinting and specific checks. The Grinder framework can be used in many different areas of researches, as a connected Python module in your own project or as an independent ready-to-use from the box tool.
Special release for insomnihack 2019.
The Grinder framework was created to automatically enumerate and fingerprint different hosts on the Internet using different back-end systems: search engines, such as Shodan or Censys, for discovering hosts and NMAP engine for fingerprinting and specific checks. The Grinder framework can be used in many different areas of researches, as a connected Python module in your own project or as an independent ready-to-use from the box tool.
Location:
Geneva, Switzerland
Wednesday, March 13, 2019
#VenezuelaBlackout
Looks like it's a time to review our old SmardGrid and Digital Substations write-ups.
Especially "Practical Analysis of the Cybersecurity of European Smart Grids"
Especially "Practical Analysis of the Cybersecurity of European Smart Grids"
Subscribe to:
Posts (Atom)