Aggregator
Submit #601763: code-projects SIMPLE ONLINE HOTEL RESERVATION SYSTEM V1.0 SQL injection [Accepted]
CVE-2025-6032 | podman Machine Init Command certificate validation (EUVD-2025-19013)
CVE-2025-27827 | Mitel MiContact Center Business up to 10.2.0.3 Legacy Chat information disclosure (EUVD-2025-19009)
CVE-2025-5318 | libssh sftp_handle out-of-bounds
Anton’s Security Blog Quarterly Q2 2025
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe).
Top 10 posts with the most lifetime views (excluding paper announcement blogs):
- Anton’s Alert Fatigue: The Study [A.C. — wow, this is #1 now! awesome!]
- Security Correlation Then and Now: A Sad Truth About SIEM
- Can We Have “Detection as Code”?
- Detection Engineering is Painful — and It Shouldn’t Be (Part 1)
- Revisiting the Visibility Triad for 2020 (update for 2025 is coming soon)
- Beware: Clown-grade SOCs Still Abound
- Why is Threat Detection Hard?
- A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next
- Top 10 SIEM Log Sources in Real Life? [updated/modified version]
- How to Think about Threat Detection in the Cloud
Top 5 posts with paper announcements:
- New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”
- New Paper: “Future of the SOC: Evolution or Optimization — Choose Your Path” (Paper 4 of 4.5) (one more paper coming in 2025)
- New Paper: “Future of the SOC: Forces shaping modern security operations”
- New Paper: “Future Of The SOC: Process Consistency and Creativity: a Delicate Balance” (Paper 3 of 4)
- New Paper: “Autonomic Security Operations — 10X Transformation of the Security Operations Center” (the classic 2021 ASO paper!)
- New Paper: “Future of SOC: Transform the ‘How’” (Paper 5)
- New Paper: “Securing AI: Similar or Different?“ (update for 2025 coming soon!)
NEW: recent 3 fun posts, must-read:
- Anton’s Alert Fatigue: The Study (long!)
- A Brief Guide for Dealing with ‘Humanless SOC’ Idiots
- The Return of the Baby ASO: Why SOCs Still Suck?
- 15+ Years of Loading Threat Intel into SIEM: Why Does This Still Suck?
Top 7 Cloud Security Podcast by Google episodes (excluding the oldest 3!):
- EP75 How We Scale Detection and Response at Google: Automation, Metrics, Toil (our best episode! officially!)
- EP8 Zero Trust: Fast Forward from 2010 to 2021
- EP17 Modern Threat Detection at Google
- EP47 “Megatrends, Macro-changes, Microservices, Oh My! Changes in 2022 and Beyond in Cloud Security”
- EP153 Kevin Mandia on Cloud Breaches: New Threat Actors, Old Mistakes, and Lessons for All
- EP109 How Google Does Vulnerability Management: The Not So Secret Secrets!
- EP150 Taming the AI Beast: Threat Modeling for Modern AI Systems with Gary McGraw
Now, fun posts by topic.
Security operations / detection & response:
- “Security Correlation Then and Now: A Sad Truth About SIEM”
- “Migrate Off That Old SIEM Already!” (VIDEO!)
- “Measuring the SOC: What Counts and What Doesn’t in 2025?” (Google Cloud Blog)
- “Can We Have “Detection as Code”?”
- “Revisiting the Visibility Triad for 2020”
- “Beware: Clown-grade SOCs Still Abound”
- “Why is Threat Detection Hard?”
- “A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next”
- “Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…”
- “Top 10 SIEM Log Sources in Real Life?” (NEWER VERSION)
- “Debating SIEM in 2023, Part 1”
- “Debating SIEM in 2023, Part 2”
- “Log Centralization: The End Is Nigh?”
- “How to Make Threat Detection Better?”
- “SIEM Content, False Positives and Engineering (Or Not) Security”
- “Modern SecOps Masterclass: Now Available on Coursera”
(if you only read one, choose this one!)
Cloud security:
- “Using Cloud Securely — The Config Doom Question”
- “Who Does What In Cloud Threat Detection?”
- “How to Solve the Mystery of Cloud Defense in Depth?”
- “Does the World Need Cloud Detection and Response (CDR)?”
- “Use Cloud Securely? What Does This Even Mean?!”
- “How CISOs need to adapt their mental models for cloud security” [GCP blog]
- “Who Does What In Cloud Threat Detection?”
- “Cloud Migration Security Woes”
- “Move to Cloud: A Chance to Finally Transform Security?”
- “It’s a multicloud jungle out there. Here’s how your security can survive“
(if you only read one, choose this one!)
How Google Does Security (HGD):
- “How Google Does It: Making threat detection high-quality, scalable, and modern” (Google Cloud blog)
- “How Google Does It: How we secure our own cloud” (Google Cloud blog)
- “How Google Does It: Finding, tracking, and fixing vulnerabilities” (Google Cloud blog)
- “How Google Does It: Finding, tracking, and fixing vulnerabilities” (Google Cloud blog)
- “How Google Does It: Red teaming at scale” (Google Cloud blog)
(if you only read one, choose this one! BTW, we also have a lot of fun HGD podcasts)
CISO, culture, transformation, FMC, etc
- “New Office of the CISO Paper: Organizing Security for Digital Transformation” (and paper)
- “10 ways to make cyber-physical systems more resilient” (and paper)
AI security:
- ”Our Security of AI Papers and Blogs Explained” [this has a whole lot of AI security fun links that you so want to click!]
- “Securing AI Supply Chain: Like Software, Only Not” (Google Cloud blog)
- “Spotlighting ‘shadow AI’: How to protect against risky AI practices” (Google Cloud blog)
- “Shadow AI Strikes Back: Enterprise AI Absent Oversight in the Age of Gen AI”
- “No Deep AI Security Secrets In This Post!”
- “New Paper: “Securing AI: Similar or Different?“
- “The Prompt: What to think about when you’re thinking about securing AI” (Google Cloud blog)
- “Gen AI governance: 10 tips to level up your AI program” (Google Cloud blog)
- “AI Adoption: Learning from the Cloud’s Early Days” (Google Community blog)
- “How Google secures AI Agents” (Google Cloud blog)
- “Demystifying AI Security: New Paper on Real-World SAIF Applications”
- “To securely build AI on Google Cloud, follow these best practices” (Google Cloud blog)
- “Oops! 5 serious gen AI security mistakes to avoid” (Google Cloud blog)
- “3 new ways to use AI as your security sidekick” (Google Cloud blog)
(if you only read one, choose this one!)
NEW: fun presentations shared:
- Detection Engineering Maturity — Helping SIEMs Find Their Adulting Skills (2024)
- Future of SOC: More Security, Less Operations (2024)
- SOC Meets Cloud: What Breaks, What Changes, What to Do? (2023)
- Meet the Ghost of SecOps Future (2023)
- The Future of Log Centralization for SIEMs and DFIR — Is the End Nigh? (2023)
- 20 Years of SIEM (2022)
Enjoy!
Previous posts in this series:
- Anton’s Security Blog Quarterly Q1 2025
- Anton’s Security Blog Quarterly Q4 2024
- Anton’s Security Blog Quarterly Q3 2024
- Anton’s Security Blog Quarterly Q2 2024
- Anton’s Security Blog Quarterly Q1 2024 Lite
- Anton’s Security Blog Quarterly Q3 2023
- Anton’s Security Blog Quarterly Q2 2023
- Anton’s Security Blog Quarterly Q1 2023
- Anton’s Security Blog Quarterly Q4 2022
- Anton’s Security Blog Quarterly Q3 2022
- Anton’s Security Blog Quarterly Q2 2022
- Anton’s Security Blog Quarterly Q1 2022
- Anton’s Security Blog Quarterly Q4 2021
- Anton’s Security Blog Quarterly Q3 2021
- Anton’s Security Blog Quarterly Q2 2021
- Anton’s Security Blog Quarterly Q1 2021
- Anton’s Security Blog Quarterly Q3.5 2020
Anton’s Security Blog Quarterly Q2 2025 was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.
The post Anton’s Security Blog Quarterly Q2 2025 appeared first on Security Boulevard.
Email bombs and fake CAPTCHAs: A social engineering survival guide
How Sonatype leads in AI component analysis for supply chain security
From generative AI tools to pre-trained machine learning models, AI is rapidly transforming how software is developed.
The post How Sonatype leads in AI component analysis for supply chain security appeared first on Security Boulevard.
Linux Foundation launches Agent2Agent, a protocol that enables agentic AI interoperability
The Linux Foundation launched the Agent2Agent (A2A) project, an open protocol for secure agent-to-agent communication and collaboration. The A2A protocol is a collaborative effort launched by Google in April and with growing support from more than 100 leading technology companies. The protocol addresses the growing need for agents to operate in dynamic, multi-agent environments, coordinating actions across a wide array of applications and data infrastructure. A2A enables autonomous agents to discover one another, exchange information … More →
The post Linux Foundation launches Agent2Agent, a protocol that enables agentic AI interoperability appeared first on Help Net Security.
The ‘16 billion password breach’ story is a farce
Experts told CyberScoop the research 'doesn’t pass a sniff test' and detracts from needed conversations around credential abuse and information stealers.
The post The ‘16 billion password breach’ story is a farce appeared first on CyberScoop.
RapperBot: построил бизнес-империю на том, что вы считали приватностью
【转载】第十届“华山情报论坛” 会议预通知
【资料】伊朗最新消息特别报道-6月22日-23日
中国五月份太阳能装机容量创下新记录
Maximize ROI from Your CrowdStrike Deployment
At ColorTokens, we’ve always been about breach readiness by stopping lateral movement through microsegmentation. Our mission is simple. Contain the spread of threats and keep operations running, even during an attack. That’s how we help businesses stay resilient. So, when you hear CrowdStrike say, “We stop breaches,” it directly aligns with our core mission. If your […]
The post Maximize ROI from Your CrowdStrike Deployment appeared first on ColorTokens.
The post Maximize ROI from Your CrowdStrike Deployment appeared first on Security Boulevard.
New FileFix attack weaponizes Windows File Explorer for stealthy commands
Mclaren Health Care Data Breach Impacts Over 743,000 Patients
Gonjeshke Darande Hackers Pose as Activists to Infiltrate Iranian Crypto Exchange
Gonjeshke Darande, a cyber threat actor widely suspected to be an Israeli state-sponsored group masquerading as an Iranian opposition hacktivist entity, executed a devastating attack on Nobitex, Iran’s largest cryptocurrency exchange. This high-profile breach resulted in the destruction of US$90 million in cryptocurrencies, which were deliberately sent to invalid wallets embedded with the provocative string […]
The post Gonjeshke Darande Hackers Pose as Activists to Infiltrate Iranian Crypto Exchange appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
LinuxFest Northwest: Maximizing AI Potential Optimization Techniques for Smarter Faster Systems
Author/Presenter: Dmitry Shmulevich (Software Engineer, NVIDIA)
Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content. Originating from the conference’s events located at the Bellingham Technical College in Bellingham, Washington; and via the organizations YouTube channel.
Thanks and a Tip O' The Hat to Verification Labs :: Penetration Testing Specialists :: Trey Blalock GCTI, GWAPT, GCFA, GPEN, GPCS, GCPN, CRISC, CISA, CISM, CISSP, SSCP, CDPSE for recommending and appearing as speaker at the LinuxFest Northwest conference.
The post LinuxFest Northwest: Maximizing AI Potential Optimization Techniques for Smarter Faster Systems appeared first on Security Boulevard.