buc.ci is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
abucci@bucci.onl
Admin account
@abucci@buc.ci

Search results for tag #checkpoint

AodeRelay boosted

[?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
@daniel1820815@infosec.exchange

Research has profiled , a Chinese-aligned group linked to that targeted government and enterprise networks across Southeast Asia and Europe. Recent operations used the with SSHcmd and SilverScreen, enabling remote access, covert screen capture, and stealthy control after and server exploitation.

research.checkpoint.com/2026/s

    AodeRelay boosted

    [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
    @daniel1820815@infosec.exchange

    Research has discovered critical in ’s Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations. Stolen keys can provide access to shared Workspaces for file access and tampering. Anthropic patched the issues, including CVE-2025-59536.

    research.checkpoint.com/2026/r

      AodeRelay boosted

      [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
      @daniel1820815@infosec.exchange

      Research has published its Untold Stories of 2025, a compilation covering multiple notable campaigns that occurred during 2025. These include exploitation of (“ToolShell”), and adversary-in-the-middle used to bypass MFA, as well as state-linked operations attributed to groups such as Camaro Dragon and COLDRIVER. The report also highlights evolving command-and-control techniques observed across Europe and Central Asia.

      research.checkpoint.com/2026/2

        AodeRelay boosted

        [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
        @daniel1820815@infosec.exchange

        Research summarizes five key Iranian threat actor clusters relevant to the current conflict in the Middle East. It outlines the main TTPs these groups have recently used against targets in the Middle East and the United States and shares six defensive measures IT teams should take to help prevent attacks during the ongoing conflict.

        blog.checkpoint.com/research/w

          AodeRelay boosted

          [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
          @daniel1820815@infosec.exchange

          Back home at my desk this week after an intense week of advanced Maestro training. It was so much fun to sit in a room of skilled engineers listening to one of our Maestro experts, discussing different scenarios & deployments, and playing with the boxes in the lab.

          checkpoint.com/quantum/maestro

            AodeRelay boosted

            [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
            @daniel1820815@infosec.exchange

            researchers described a campaign that abused legitimate SaaS notifications from , , , , , and to drive phone-based scams. The operation sent 133,260 emails to 20,049 organizations, intensifying in recent months as attackers leveraged trusted messages to bypass link-focused defenses and steer targets to attacker-controlled phone numbers.

            blog.checkpoint.com/research/s

              AodeRelay boosted

              [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
              @daniel1820815@infosec.exchange

              Research observed -Dragon, a Chinese-aligned group linked to , conducting espionage against government and law enforcement across Southeast Asia. The threat actor weaponized flaw CVE-2025-8088 within 10 days after its disclosure, geo-fenced servers to targets, and introduced , a Telegram-based remote access tool.

              research.checkpoint.com/2026/a

                AodeRelay boosted

                [?]kaaswe » 🌐
                @kaaswe@swecyb.com

                R82 fresh install, migrate_server import, policy installed.

                It’s always more nerve wracking at home with limited resources and no TAC support to back you up than in a production environment.

                If you know, you know.

                  AodeRelay boosted

                  [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                  @daniel1820815@infosec.exchange

                  Research has published the 2026 Report, highlighting as a force multiplier across attacks, fragmentation in with data only extortion, and multi-channel attacks. It maps threat activity to geopolitics and identity driven paths, quantifies risky AI usage, and provides sector and regional breakouts.

                  research.checkpoint.com/2026/c

                    AodeRelay boosted

                    [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                    @daniel1820815@infosec.exchange

                    AodeRelay boosted

                    [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                    @daniel1820815@infosec.exchange

                    For the latest discoveries in cyber research for the week of 26th January, please download our Threat Intelligence Bulletin: research.checkpoint.com/2026/2

                      AodeRelay boosted

                      [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                      @daniel1820815@infosec.exchange

                      researchers describe a campaign abusing guest invitations and finance-themed team names to mimic billing notices. More than 12K emails were observed hitting 6,135 users via invite emails with obfuscated text. The campaign targeted US-based organizations across manufacturing, technology, and education.

                      blog.checkpoint.com/email-secu

                        AodeRelay boosted

                        [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                        @daniel1820815@infosec.exchange

                        Research identified an ongoing campaign associated with , a North Korean–linked threat actor active since at least 2014. The campaign targets software developers and engineering teams across the Asia-Pacific region, including Japan, Australia, and India, using blockchain-themed lures to prompt interaction and deliver malicious content. In observed activity, the threat actor deploys AI-generated .

                        research.checkpoint.com/2026/k

                          AodeRelay boosted

                          [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                          @daniel1820815@infosec.exchange

                          Research revealed that , a recently exposed cloud-native framework, is authored almost entirely by AI, likely under the direction of a single individual. The malware was produced predominantly through AI-driven development, reaching the first functional implant in under a week. From a methodology perspective, the actor used the model beyond coding, adopting an approach called Spec Driven Development (SDD).

                          research.checkpoint.com/2026/v

                            AodeRelay boosted

                            [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                            @daniel1820815@infosec.exchange

                            Did you miss the biggest event of the year?

                            The full recording of is now live on CheckMates.
                            Watch the complete celebration, hear insights from leadership on what’s ahead, and catch the full R&D Q&A, including questions from the community.

                            If you couldn’t join us live on Wednesday, this is your chance to experience it all!

                            community.checkpoint.com/t5/Ge

                              AodeRelay boosted

                              [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                              @daniel1820815@infosec.exchange

                              🚨 MASS EXPLOITATION ALERT – PATCH NOW

                              If you use , your systems could already be compromised. Research has detected an active exploitation campaign against a critical .

                              Attackers can execute commands on your systems without authentication. Government, financial, and industrial sectors are already being hit hard and need to act fast.

                              👉 Find out more in our full report: blog.checkpoint.com/research/p

                                [?]Chuck Darwin » 🌐
                                @cdarwin@c.im

                                When the immune system detects a protein from a pathogen,
                                it’s supposed to dispatch killer T cells to eliminate the invader.

                                Some cancers can interfere with this process by hijacking the checkpoint proteins that keep our immune system from revving out of control
                                and using them to turn T cells off.

                                Starting in the mid-1990s, several research teams found success by treating mice with ,
                                -- then a new class of drugs designed to keep tumor cells from concealing their identity and signaling, effectively, “nothing to see here.”

                                Thirty years on, checkpoint inhibitors have become a transformative tool in cancer treatment, especially for melanoma.

                                The research that went into developing checkpoint inhibitors showed conclusively that immune cells detect cancer much in the same way they identify other pathogens:

                                through differences in protein structure determined by DNA
                                —a crucial insight.

                                But as revolutionary as checkpoint inhibitors have been for immunotherapy, they don’t work for everyone
                                —far from it.

                                Some 80 percent of patients do not respond to this class of drugs.

                                Researchers are still trying to understand all the mechanisms that play a role in determining who does respond,
                                but one key factor is whether the immune system is able to recognize tumor cells on the basis of their mutations.

                                This is where mRNA vaccines come in.

                                , a melanoma researcher who now serves as chief medical officer of mRNA-medicine start-up ,
                                helped to design several ongoing clinical trials of mRNA vaccines for cancer.

                                He explains that both checkpoint inhibitors and mRNA vaccines build on our deep evolutionary adaptation for fighting pathogens
                                by identifying the proteins they shed in our bodies.

                                But checkpoint inhibitors are effective only if the patient’s immune system recognizes the cancer as a threat.

                                In contrast, mRNA vaccines have the potential to work even in patients whose cancers haven’t spurred much immune response.

                                The trick, Luke says, is using computational tools to decipher which of a given tumor’s mutations are most likely to be found by the immune system.


                                  AodeRelay boosted

                                  [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                  @daniel1820815@infosec.exchange

                                  For the latest discoveries in cyber research for the week of 5th January, please download our Threat Intelligence Bulletin from Research.

                                  It covers the latest cyber threats you need to know about this week!

                                  research.checkpoint.com/2026/5

                                    AodeRelay boosted

                                    [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                    @daniel1820815@infosec.exchange

                                    Research noticed a surge in campaigns insiders at banks, crypto exchanges, telecoms, and major tech firms to sell access and data. Listings advertise payouts of $3,000 to $15,000, offer datasets like 37 million records for $25,000, and solicit telecom staff for SIM swapping to bypass two-factor authentication.

                                    blog.checkpoint.com/research/c

                                      AodeRelay boosted

                                      [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                      @daniel1820815@infosec.exchange

                                      Research analyzed , a Node.js–based loader observed in a campaign linked to the . The campaign is notable for extensive obfuscation and a previously undocumented PE injection technique. GachiLoader deploys a second-stage loader, , which abuses Vectored Exception Handling (VEH) in a novel method, dubbed Vectored Overloading.

                                      research.checkpoint.com/2025/g

                                        AodeRelay boosted

                                        [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                        @daniel1820815@infosec.exchange

                                        For the latest discoveries in cyber research for the week of 22nd December, please download our Threat Intelligence Bulletin from Research. It covers the top breaches, threat actors and threat intelligence you need to know this week.

                                        research.checkpoint.com/2025/2

                                          AodeRelay boosted

                                          [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                          @daniel1820815@infosec.exchange

                                          Google just lost its “trusted sender” advantage.

                                          Our Email Security researchers uncovered a phishing campaign abusing Google Cloud Application Integration to send emails that look like routine Google notifications — and they’re landing straight in inboxes.

                                          No spoofing. No fake domains. Just trusted infrastructure used against users.

                                          👉 See how it works, who’s being targeted, and why it’s so hard to detect: blog.checkpoint.com/research/p

                                            AodeRelay boosted

                                            [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                            @daniel1820815@infosec.exchange

                                            Join the conversation! This week a CheckMate posed an interesting question about site-to-site VPN outgoing route selection.

                                            We want your input! Share your insights with the community and see if you have a solution to this community based inquiry!

                                            Take a look a the post here: community.checkpoint.com/t5/Se

                                              AodeRelay boosted

                                              [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                              @daniel1820815@infosec.exchange

                                              researchers revealed a campaign where attackers impersonate file-sharing and e-signature services to deliver finance-themed lures that look like legitimate notifications. The attackers sent over 40,000 phishing emails targeting roughly 6,100 customers over the past two weeks, abusing Mimecast’s secure-link rewriting feature as a smokescreen to make their links appear safe and authenticated.

                                              blog.checkpoint.com/email-secu

                                                AodeRelay boosted

                                                [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                @daniel1820815@infosec.exchange

                                                Happy hump day! We’re celebrating our one and only MVP, Danny Jung.

                                                If you’ve been in the for a while, Danny’s name should sound familiar. A former CheckMates Champion, he’s behind some of the most popular tools and posts in the community, including the legendary CCC – Common Commands: community.checkpoint.com/t5/Sc

                                                Congratulations, Danny, on your Platinum MVP status. Can’t wait to celebrate you at : checkpoint.zoom.us/webinar/reg

                                                  AodeRelay boosted

                                                  [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                  @daniel1820815@infosec.exchange

                                                  Research exposed ’s modular system, including a kernel-mode that can remain loadable on fully updated 11 despite built-in protections. The research linked leaked builder artifacts to plugins and identified about 6,000 samples, with roughly 85 percent emerging in the last six months after the builder’s public release.

                                                  research.checkpoint.com/2025/c

                                                    AodeRelay boosted

                                                    [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                    @daniel1820815@infosec.exchange

                                                    For the latest discoveries in cyber research for the week of 15th December, please download our Threat Intelligence Bulletin from Research.

                                                    research.checkpoint.com/2025/1

                                                      AodeRelay boosted

                                                      [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                      @daniel1820815@infosec.exchange

                                                      Research reports a global rise in cyber attacks in November 2025, averaging 2,003 weekly attempts per organization, with education most targeted sector and rising exposure from generative AI. 727 ransomware incidents were recorded, a 22% increase YoY, with North America accounting for 55% of cases and industrial manufacturing being the top victim industry.

                                                      blog.checkpoint.com/research/g

                                                        AodeRelay boosted

                                                        [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                        @daniel1820815@infosec.exchange

                                                        Today’s CheckMates MVP Heiko Akenbrand is behind some of the most widely used tools in the CheckMates Toolbox including the SmartConsole Extension - Easy deletion of unused rules and the Easy Backup Tool. These scripts have been used consistently by CheckMates all over the world and have made a real impact on our community.

                                                        Congratulations Heiko, we are grateful for your contributions!

                                                        Take a look at it: community.checkpoint.com/t5/Sm

                                                          AodeRelay boosted

                                                          [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                          @daniel1820815@infosec.exchange

                                                          Research shared details of a critical exploit in Finance’s yETH pool, where an attacker abused a smart contract flaw to mint trillions of tokens with a minuscule deposit, resulting in the theft of approximately $9 million in assets from the Ethereum-based DeFi protocol.

                                                          research.checkpoint.com/2025/1

                                                            AodeRelay boosted

                                                            [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                            @daniel1820815@infosec.exchange

                                                            We are excited to announce the release of the full video showcasing Check Point’s latest addition to the Quantum Force family. This introduction highlights how the new appliance brings advanced threat prevention, accelerated performance, and simple scalability to branch offices and distributed environments. Watch the Full Video here:

                                                            community.checkpoint.com/t5/Se

                                                              AodeRelay boosted

                                                              [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                              @daniel1820815@infosec.exchange

                                                              Research revealed a in Codex CLI that allowed attackers to achieve remote code execution via malicious project-local configuration files (MCP entries) executed without user prompts. OpenAI released a patch in version 0.23.0 to address the automatic execution risk.

                                                              research.checkpoint.com/2025/o

                                                                AodeRelay boosted

                                                                [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                @daniel1820815@infosec.exchange

                                                                For the latest discoveries in cyber research for the week of 8th December, please download our Threat Intelligence Bulletin from Check Point Research.

                                                                research.checkpoint.com/2025/8

                                                                  AodeRelay boosted

                                                                  [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                  @daniel1820815@infosec.exchange

                                                                  has elaborated on the critical vulnerability, CVE-2025-55182, that affects React 19.x and related server-side frameworks such as Next.js 15.x/16.x. The vulnerability enables unauthenticated remote code execution via malicious HTTP requests targeting the server’s decoding process. Exploitation allows attackers to gain full control over application servers...

                                                                  blog.checkpoint.com/securing-t

                                                                    AodeRelay boosted

                                                                    [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                    @daniel1820815@infosec.exchange

                                                                    We’re gearing up for the end of the week but not before celebrating another CheckMates Platinum MVP! This time we’re giving a proper shout-out to one of our long-time community leaders. With over 300 posts, self-run Maestro workshops, and a track record of leading discussions since 2016, Lari Luoma has been shaping this community for years. Congratulations Lari and thank you for everything you do!

                                                                    linkedin.com/feed/update/urn:l

                                                                      AodeRelay boosted

                                                                      [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                      @daniel1820815@infosec.exchange

                                                                      researchers analyzed the Shai-Hulud 2.0 supply chain campaign that compromised over 600 npm packages and 25,000 GitHub repositories. Malicious preinstall scripts stole developer and multi-cloud credentials, exfiltrated them to attacker repos, registered infected hosts as self-hosted runners, and used the stolen tokens for worm-like propagation across npm and GitHub.

                                                                      blog.checkpoint.com/research/s

                                                                        AodeRelay boosted

                                                                        [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                        @daniel1820815@infosec.exchange

                                                                        This weeks Post of the Week is on Best-in-Class GenAI Security with CloudGuard WAF + Lakera.

                                                                        We’re excited to announce the expansion of CloudGuard WAF with integrated Lakera GenAI security now delivering prevention-first protection for Web, API, and GenAI applications.

                                                                        If you want a quick breakdown of what’s new and why it matters, we put it all into one place.

                                                                        Read the full post here: ow.ly/HBH350XBbXT

                                                                          AodeRelay boosted

                                                                          [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                          @daniel1820815@infosec.exchange

                                                                          overviews expected cyber risks in 2026, including converging agentic , quantum computing, and Web 4.0. The blog outlines 12 trends: autonomous AI operations, digital-twin/XR environments, -native attacks, fraud, “harvest-now, decrypt-later” exposure, data-pressure , expanding supply-chain, , and identity threats.

                                                                          blog.checkpoint.com/executive-

                                                                            AodeRelay boosted

                                                                            [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                            @daniel1820815@infosec.exchange

                                                                            researchers uncovered , a large-scale adware campaign where at least 15 applications, with millions of installs, abuse foreground services and blank notifications to run persistent background ads and drain device resources. These applications also use background execution and storage permissions to persist, hide, and silently exfiltrate external-storage files, including corporate documents, to attackers’ infrastructure.

                                                                            blog.checkpoint.com/research/g

                                                                              AodeRelay boosted

                                                                              [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                              @daniel1820815@infosec.exchange

                                                                              For the latest discoveries in cyber research for the week of 1st December, please check our Threat Intelligence Report: research.checkpoint.com/2025/1

                                                                                AodeRelay boosted

                                                                                [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                @daniel1820815@infosec.exchange

                                                                                💸 Is your WAF quietly burning budget behind the scenes?

                                                                                Manual rule updates, constant triage, blocked customers, and the looming cost of a breach… traditional WAFs stack hidden expenses fast.

                                                                                's does the opposite. Its AI-driven engine delivers ~99.4% accuracy and near-zero false positives.

                                                                                The result:
                                                                                ✔️ Up to 3x lower operational costs
                                                                                ✔️ Fewer business losses
                                                                                ✔️<1% breach probability

                                                                                👉 Dive into the full blog + try our TCO calculator: blog.checkpoint.com/securing-t

                                                                                  AodeRelay boosted

                                                                                  [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                  @daniel1820815@infosec.exchange

                                                                                  The Black Friday Cyber Crime Economy

                                                                                  Research uncovered a surge in fraudulent domains and brand impersonation. Roughly 1 in 11 new Black Friday domains are malicious, and 1 in 25 domains referencing , , or pose active threats, with fake storefronts stealing credentials and payment data. Recent examples also mimic HOKA and AliExpress.

                                                                                  blog.checkpoint.com/research/t

                                                                                    AodeRelay boosted

                                                                                    [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                    @daniel1820815@infosec.exchange

                                                                                    🔥 Big things are happening! Our biggest AI security event of the year is right around the corner.

                                                                                    's CEO Nadav Zafrir and CTO Jonathan Zanger, VP of Agentic AI David Haber, and NVIDIA SVP Kevin Deierling will be diving into the top cyber challenges shaping the AI era — and what organizations can do to stay protected.

                                                                                    Make sure you’re registered!

                                                                                    checkpoint.com/securing-ai-vir

                                                                                      AodeRelay boosted

                                                                                      [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                      @daniel1820815@infosec.exchange

                                                                                      🤯 Google Play missed this, and millions paid the price.

                                                                                      Research just uncovered — a large-scale campaign hiding inside popular utility and emoji-editing apps on Google Play.

                                                                                      Battery drain, data consumption, disappearing icons… with the millions that downloaded these apps, you'll want to read for yourself how to avoid them and what this means for your mobile security.

                                                                                      👉 Read the findings: blog.checkpoint.com/research/g

                                                                                        AodeRelay boosted

                                                                                        [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                        @daniel1820815@infosec.exchange

                                                                                        See how top WAFs including Azure, , , and -performed in real-world traffic simulations.

                                                                                        Metrics that matter: Detection Rate | False Positive Rate | Balanced Accuracy.

                                                                                        👉 Check the WAF Comparison Project 2025: blog.checkpoint.com/artificial

                                                                                          AodeRelay boosted

                                                                                          [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                          @daniel1820815@infosec.exchange

                                                                                          Cyber insurance is meant to protect you... so why are so many claims denied? 🤔

                                                                                          Turns out the biggest breach drivers aren’t sophisticated attacks — they’re the everyday hygiene gaps insurers assume you’ve already handled.

                                                                                          , , leaked credentials… if these slip, payouts often do, too.

                                                                                          👉 Learn more as Coral Tayar uncovers why “mundane” threats are causing the biggest financial surprises: blog.checkpoint.com/security/c

                                                                                            AodeRelay boosted

                                                                                            [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                            @daniel1820815@infosec.exchange

                                                                                            IT Services Associate in the IT Services Industry gives WAF 5/5 Rating in Gartner Peer Insights™ API Protection Market.

                                                                                            Read the full review here: gtnr.io/bCz77yqmB

                                                                                              AodeRelay boosted

                                                                                              [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                              @daniel1820815@infosec.exchange

                                                                                              Global Analysis – October 2025

                                                                                              Research published its October 2025 global threat report, highlighting a continued rise in , with organizations averaging 1,938 weekly attacks (+5% YoY) and surging 48% YoY. The report also notes escalating GenAI-related data leakage risks, with 1 in 44 enterprise prompts exposing sensitive information.

                                                                                              blog.checkpoint.com/research/g

                                                                                                AodeRelay boosted

                                                                                                [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                                @daniel1820815@infosec.exchange

                                                                                                The State of Ransomware – Q3 2025

                                                                                                Research reports on a fragmented landscape in Q3 2025, with 85 active groups and 1,592 victims listed across leak sites, averaging 535 victims per month. Qilin led activity, while LockBit 5.0 returned, signaling potential recentralization. Manufacturing and business services remained the most affected sectors.

                                                                                                research.checkpoint.com/2025/t

                                                                                                  AodeRelay boosted

                                                                                                  [?]Daniel Kuhl ✌🏻☮️☕️ » 🌐
                                                                                                  @daniel1820815@infosec.exchange

                                                                                                  🤝 Two leaders in AI security just joined forces.

                                                                                                  Check Point's CloudGuard WAF + Lakera now delivers best-in-class prevention for GenAI apps, APIs, and agents — blocking prompt injection, data leakage, and abuse in real time!

                                                                                                  If you're building with AI, this is the upgrade your security stack has been waiting for.

                                                                                                  Explore how this changes the security game 👇
                                                                                                  blog.checkpoint.com/securing-t

                                                                                                    6 ★ 5 ↺
                                                                                                    Andy 🌎 boosted

                                                                                                    [?]Anthony » 🌐
                                                                                                    @abucci@buc.ci

                                                                                                    Once again blocked from using a website I've used regularly for years because of "unusual activity" from "your IP". After passing a captcha, no less.

                                                                                                    Somehow bot-detecting algorithms have been degrading over time.

                                                                                                    This is a troubling trend because people who aren't using the anointed access points of the internet struggle more and more to connect and interact. Large entities like CloudFlare choke off more and more avenues of access in the name of "security", enforcing digital checkpoints without any accountability to anyone.