A quotation from Bible, vol. 2, New Testament:
«
For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places.
»
Full quote, sourcing, notes:
https://wist.info/bible-nt/26826/
#quote #quotes #quotation #adversary #demons #opposition #power #temptation
#quote #quotes #quotation #adversary #demons #opposition #power #temptation
adversary…
#adversary #tellysavalas #thetwilightzone #1963 #epicbattle #vidcap #animatedgif
#adversary #tellysavalas #thetwilightzone #epicbattle #vidcap #animatedgif
On the Robustness of Dataset Inference
Sebastian Szyller, Rui Zhang, Jian Liu, N Asokan
Action editor: Yiming Ying.
#adversarially #adversarial #adversary
'An Analysis of Robustness of Non-Lipschitz Networks', by Maria-Florina Balcan, Avrim Blum, Dravyansh Sharma, Hongyang Zhang.
http://jmlr.org/papers/v24/22-0410.html
#adversarial #adversary #adversaries
#adversarial #adversary #adversaries
Membership Inference Attacks Against Semantic Segmentation Models
Reward Poisoning in Reinforcement Learning: Attacks Against Unknown Learners in Unknown Environments
#reinforcement #adversary #reward
Tactical Air Corporation F-5AT N699TA #21 on final for Moffett Field, February 8, 2023. TAC is a private air force that provides adversarial to our military #milair #aviationphotography #TAC #Adversary #RedAir #F5AT #Moffett #planespotting #haveglass #aviation #AvGeek #spotter #aviationdaily #photography #aircraft #Nikon #Z9 #AvgeeksofMastodon
#milair #aviationphotography #tac #adversary #redair #f5at #Moffett #planespotting #haveglass #aviation #avgeek #spotter #aviationdaily #photography #aircraft #nikon #Z9 #AvgeeksofMastodon
'Attacks against Federated Learning Defense Systems and their Mitigation', by Cody Lewis, Vijay Varadharajan, Nasimul Noman.
http://jmlr.org/papers/v24/22-0014.html
#adversary #adversarial #attacks
#adversary #adversarial #attacks
Your Policy Regularizer is Secretly an Adversary
Rob Brekelmans, Tim Genewein, Jordi Grau-Moya et al.
#regularization #adversarial #adversary
'Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions', by Jon Vadillo, Roberto Santana, Jose A. Lozano.
http://jmlr.org/papers/v24/21-0326.html
#adversarial #adversary #attacks
#adversarial #adversary #attacks
Interesting to see an adversary trying to enter into my Booking.com account, makes you wonder from where my data was exposed from!
#loginattempt #databreach #hackattempt #hacking #adversary
Indiscriminate Data Poisoning Attacks on Neural Networks
Yiwei Lu, Gautam Kamath, Yaoliang Yu
Great use of #osint tools to identify #adversary
activities and offerings that are currently unknown.
Wonder what else is out there if we only look?
Wonder what adversaries are looking for?
If I were a bad guy, I'd start off looking for responses with the "This is a Federal computer system blah blah blah"
Does your org use Shodan to see what inside infra may be accidentally outside?
https://blog.bushidotoken.net/2022/11/detecting-and-fingerprinting.html
Thanks for sharing @da_667
#osint #adversary #raas #ransomware #malware #maas
The book I'm reading talks about #DenialOfInformation attacks, where an #Adversary floods the #Internet with #False or irrelevant #Information to drown out the #Truth. Here we have an example: the #CCP drowning out news of the #ProtestsInChina.
https://www.washingtonpost.com/technology/2022/11/27/twitter-china-spam-protests/
#denialofinformation #adversary #internet #false #information #truth #ccp #protestsinchina
For an agency whose sole reason for existence is to protect and defend, it's disheartening to see so much distrust and vitriol from the very community it's dedicated to serving. #CISA doesn't have any law enforcement (#FBI) or prosecutorial (#DOJ) powers, it doesn't regulate or impose fines (#SEC), and it doesn't conduct surveillance (#CIA, #NSA), but when #CriticalInfrastructure needs help with cyber or physical security, it does answer the call.
Not every agency gets it right all the time (#FEMA) or delivers results without a lengthy investigational analysis (#NTSB), but all the folks that I've met from CISA always have the #PublicGood in mind.
An organization is made up of people, and at CISA many are contributors to #FOSS (including the #Linux kernel), security researchers, and folks you've likely interacted with on #Twitter. Giving back to the #infosec community is pretty high up on their list of what they do, both on and off the clock.
Unless you're an #APT that's made it onto #CrowdStrike's rolodex, you aren't the #adversary @cisacyber is trying to frustrate in cyberspace. While I respect an individual's decision on who to subscribe to, denying an entire population the choice hurts the community.
You can do what is easy or what is right. I'm happy to be part of @jerry's infosec.exchange community where we do the latter.
#cisa #fbi #doj #sec #cia #nsa #criticalinfrastructure #fema #ntsb #publicgood #foss #linux #twitter #infosec #apt #crowdstrike #adversary
Saw this shared by @eric_capuano on that other site. Very interesting read on detecting Cobalt Strike.
https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse
#CobaltStrike #Detection #Adversary #BlueTeam #ThreatIntel
#cobaltstrike #detection #adversary #blueteam #threatintel
Victory by KO: Attacking #OpenPGP Using Key Overwriting
#ETHZ pre-print for ACM Conf 11.2022
If you haven't read it yet:
Key Overwriting (KO) attacks might be possible if #adversary has write access to the #encrypted private key of the #victim such as with GopenPGP or OpenPGP.js libraries in applications like #ProtonMail #FlowCrypt (#GMail etc.) and if victim does not inspect their own (!) key #fingerprint before using the key.
#PGP #E2E #Encryption #Verschlüsselung #KeyOverwritingAttack #KO
#ko #KeyOverwritingAttack #verschlüsselung #encryption #e2e #pgp #fingerprint #gmail #flowcrypt #protonmail #victim #encrypted #adversary #ethz #openpgp
Nuovo tipo di phishing: Adversary-in-the-middle - sicurezza.net #tipo #phishing #adversary-in-the-middle #sicurezzanet #17luglio https://parliamodi.news/article/aHR0cHM6Ly9zaWN1cmV6emEubmV0L2N5YmVyLXNlY3VyaXR5L251b3ZvLXBoaXNoaW5nLWFkdmVyc2FyeS1pbi10aGUtbWlkZGxlLw==
#17luglio #sicurezzanet #adversary #phishing #tipo
Nuovo tipo di phishing: Adversary-in-the-middle - sicurezza.net #tipo #phishing #adversary-in-the-middle #sicurezzanet #15luglio https://parliamodi.news/article/aHR0cHM6Ly9zaWN1cmV6emEubmV0L2N5YmVyLXNlY3VyaXR5L251b3ZvLXBoaXNoaW5nLWFkdmVyc2FyeS1pbi10aGUtbWlkZGxlLw==
#15luglio #sicurezzanet #adversary #phishing #tipo
[Recommended Reading] #Adversary #InfoSec #Defender #BlueTeam #Detection
https://www.dragos.com/blog/20180619TheMythOfTheAdversaryAdvantage.html
#adversary #infosec #defender #blueteam #detection