Workflow
Vulnerability
icon
Search documents
Skin, Shape, Self: A Celebration | Hema Thakur | TEDxKPRIT
TEDx Talks· 2025-10-23 15:42
[Music] isn't it lovely how beautiful how beauty is just a matter of nazaria or perspective and what better way to put that than our lyricists have speaking of nazaria did you know that Ganesha the Indian deity who is known as a vigna hara or the remover of obstacles today was once upon a time known as Vignna Karta the creator of obstacles. Confused. Let me explain.So in olden times whenever there was any flood or any famine people would attribute such natural catastrophes to an angry version of this dity w ...
X @Wu Blockchain
Wu Blockchain· 2025-10-18 04:16
Vulnerability Overview - OneKey reported a vulnerability affecting approximately 120 thousand Bitcoin private keys [1] - The vulnerability stems from Libbitcoin Explorer (bx) 3x, which uses system time and the Mersenne Twister-32 algorithm with a small 2^32-bit seed space, making keys predictable [1] Affected Products - Affected wallets include Trust Wallet Extension 00172–00183 and Trust Wallet Core ≤311 [1] - Other products using the same libraries are also affected [1]
The Courage To Be Seen | Latil Willis | TEDxColumbiaCollegeChicago
TEDx Talks· 2025-10-17 15:22
[Applause] If my life were a movie, it would be Freaky Friday, but messier. Think less Lindsay Lohan, more emotionally repressed adults having meltdowns in the middle of Disney movies. For those of you who don't know, Freaky Friday is a film where a mother and daughter magically switch bodies for a day.And during this chaotic, hilarious, slightly traumatic swap, they're forced to see each other more clearly. They live each other's lives and feel each other's frustrations. And in that, something healed betwe ...
The Good and Bad of Distant Intimacy | Toy Monique Hawkins | TEDxColumbiaCollegeChicago
TEDx Talks· 2025-10-17 15:21
Good evening. I am Toy Monnique Hawkins. As a creative and a businesswoman, I develop and produce television, films, and literature.mostly by bringing together other creatives and teams of individuals or businesses so that we can deliver an experience and we do that from a very intimate distance kind of an oxymoron I think maybe a little bit but it's truly a remarkable gift when characters land with an audience or story lines relate in ways that make viewers cry, make them laugh, invokes fear, a little bit ...
Part 2: Social engineering, malware, and the future of cybersecurity in AI
Google DeepMind· 2025-10-16 16:08
Cybersecurity Threats & Actors - Nation-state actors are primarily motivated by geopolitical aims and espionage, often engaging in offensive cyberattacks to support warfare or prepositioning for potential conflicts [5][6] - Subnation-state actors and some nation-state activities are financially motivated, commonly using ransomware attacks to steal and encrypt data, demanding cryptocurrency for its release [9][10] - A gray market exists for zero-day vulnerabilities, with buyers including companies equipping law enforcement and governments, with some vulnerabilities worth millions of dollars [12][14] - AI is exacerbating social engineering risks by enabling deep fakes, making phishing attacks more tailored and effective, such as cloning voices for ransom demands or impersonating executives for financial fraud [30][32][33] Vulnerability Disclosure & Mitigation - Project Zero introduced a 90-day disclosure timeline for vulnerabilities, compelling companies to prioritize security patches to prevent exploitation by malicious actors [19][20] - Governments have been known to deliberately withhold vulnerability information for exploitation purposes, as exemplified by the Eternal Blue case [24] - Healthcare and critical infrastructure sectors often struggle with patch management due to the risk of disrupting essential services, leading to long-term vulnerabilities [29] - Multi-factor authentication and pass keys are emerging as strong defenses against phishing and password-related attacks, enhancing security and user experience [37][39][40] AI & Agent Security - Risk-based authentication, enhanced by AI, assesses user behavior to determine trust levels and adjust security friction accordingly, such as requiring multi-factor authentication based on anomalous activity [43][46] - The rise of AI agents acting on behalf of humans introduces new security challenges, requiring careful consideration of agent identity, permissions, and potential for misuse [50][51] - Contextual integrity is crucial for training AI agents to respect privacy norms and avoid disclosing sensitive data inappropriately, necessitating mechanisms for agents to seek permission before sharing information [57][58][59]
X @Wu Blockchain
Wu Blockchain· 2025-10-16 12:47
Security Vulnerability - US law enforcement possesses private keys to 120 thousand bitcoins due to a randomness flaw [1] - The vulnerability affected over 220 thousand wallet addresses [1] - The private keys were generated by a flawed pseudo-random number generator (PRNG), making them more predictable [1] Law Enforcement Action - Law enforcement agencies obtained the private keys not through hacking, but by discovering a flaw in the key generation process [1]
X @Forbes
Forbes· 2025-10-09 08:00
Oracle zero-day vulnerabilities are being targeted by at least one major cybercrime group and the FBI says it's looking bad. https://t.co/KnV1NAj2Ma ...
X @The Economist
The Economist· 2025-10-07 21:45
Years of expeditionary operations leave it vulnerable if America abandons the continent https://t.co/46K0HdTymK ...
Taking off your mask | Abigail Chiang | TEDxSHC Youth
TEDx Talks· 2025-10-06 15:39
Core Argument - The speech emphasizes the importance of vulnerability as a key component of growth, connection, and success, contrasting it with the limitations of relying solely on grit [15] - It challenges the notion that perfection and hiding behind masks (both physical and emotional) are effective strategies for avoiding rejection, arguing that they hinder genuine connection [5] - The speaker advocates for embracing imperfection and sharing personal struggles to foster a safer and more collaborative environment, particularly in leadership roles [11][12] Supporting Evidence & Research - The speech references Angela Duckworth's TED Talk on grit, acknowledging its value but highlighting its insufficiency in dealing with emotional challenges [6][8] - It cites Dr Brené Brown's research on vulnerability and shame, noting that individuals who embrace vulnerability are 32% more likely to experience meaningful relationships and higher life satisfaction [13][14] Personal Anecdotes & Experiences - The speaker shares personal experiences from online school, where the anonymity allowed for a temporary escape but also revealed the emotional distance created by masking true feelings [1][2][3][4] - The speaker recounts tutoring a fifth-grader and realizing that modeling vulnerability was more effective than presenting a flawless image [9][10][11] - The Hello Kitty blanket anecdote serves as a metaphor for shedding the metaphorical "cape" of perfection and embracing authenticity [17]
X @Bloomberg
Bloomberg· 2025-10-03 01:44
RT Philip Heijmans (@PJHeijmans)Digital subsea cables were designed for cooperation, not conflict. As the line between peace and war blurs, the reality is setting in that these critical lines are highly vulnerable. via @bbgvisualdatahttps://t.co/rorzj93Im3 ...