Profile avatar
mbeltranpardo.bsky.social
Profesora, investigadora, divulgadora e innovadora. Apasionada de la tecnología y de las personas detrás de ella. Cuenta personal.
98 posts 30 followers 43 following
Prolific Poster

Proposals 'DIGITAL-ECCC-2024-DEPLOY-CYBER-07’ is published on the Funding and Tenders portal, proposals can be submitted until 27 March 2025 cybersecurity-centre.europa.eu/news/eccc-fu...

Zen and the Art of Microcode Hacking bughunters.google.com/blog/5424842...

Continuous Threat and Risk Analysis Informed Lifecycle (TRAIL) blog.trailofbits.com/2025/03/03/c...

ENISA NIS360 2024 report: A comprehensive look at cybersecurity maturity and criticality of NIS2 sectors www.enisa.europa.eu/news/enisa-n...

Europol publishes framework for ethical technology in law enforcement www.europol.europa.eu/media-press/...

Cyber Risks to Next-Gen Brain-Computer Interfaces: Analysis and Recommendations papers.ssrn.com/sol3/papers....

Next Door Publishers cierra, y desde hoy hasta el próximo día 9 de marzo podéis comprar sus libros con un 50% de descuento. Mi #MrInternet y otro montón de libros maravillosos de grandes científicos y divulgadores, no dejéis pasar la triste-oportunidad www.nextdoorpublishers.com/libros/mrint...

How North Korea pulled off a $1.5 billion crypto heist—the biggest in history: Attack on Bybit didn't hack infrastructure or exploit smart contract code. So how did it work? arstechnica.com/security/202...

My 2024 report on behavioral surveillance for cybersecurity and insider risk detection focusing on Everfox/Microsoft (crackedlabs.org/en/data-work...) shows how defense technology creeps into a wide range of workplaces. Now Everfox, Dtex, Dynatrace, Splunk et al may become govt surveillance tools:

DOGE Sparks Surveillance Fear Across the US Government www.wired.com/story/survei...

Enriching the NVD CVSS scores to include Temporal & Threat Metrics github.com/t0sche/cvss-bt

ENISA Threat Landscape: Finance Sector www.enisa.europa.eu/publications...

Stalkerware apps Cocospy and Spyic are exposing phone data of millions of people techcrunch.com/2025/02/20/s...

A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges arxiv.org/abs/2502.14945

A single malicious request can take down web applications that use recursive functions to process untrusted user input blog.trailofbits.com/2025/02/21/d...

An Advocate’s Guide to Automated Content Moderation www.techpolicy.press/an-advocates...

Agentic AI – Threats and Mitigations genai.owasp.org/resource/age...

Lessons from red teaming 100 generative AI products airedteamwhitepapers.blob.core.windows.net/lessonswhite...

Cybersecurity and AI Workshop Concept Paper www.nccoe.nist.gov/sites/defaul...

¡Feliz #11F a todas! Y a todos, también. Porque la igualdad de oportunidades nos hace más fuertes. Os recordamos nuestra propuesta para celebrar el #diamujeryninaenciencia 😊 ¡Nos vemos el viernes con @mbeltranpardo.bsky.social! 😄

Common challenges in cybercrime www.europol.europa.eu/cms/sites/de...

EUCC Guidelines on Vulnerability Management certification.enisa.europa.eu/publications...

Malicious ML models discovered on Hugging Face platform www.reversinglabs.com/blog/rl-iden...

An investigation into more than 300 cyberattacks against US K–12 schools over the past five years shows how schools can withhold crucial details from students and parents whose data was stolen www.wired.com/story/meet-t...

Quantum Safe Financial Forum - A call to action www.europol.europa.eu/publications...

¿Quién se apunta?

DeepSeek making a splash with EU data protection bodies www.euractiv.com/section/tech...

Backdoor found in two healthcare patient monitors, linked to IP in China www.bleepingcomputer.com/news/securit...

Commission publishes the Guidelines on prohibited artificial intelligence (AI) practices, as defined by the AI Act digital-strategy.ec.europa.eu/en/library/c...

International AI Safety report assets.publishing.service.gov.uk/media/679a0c...

What's really happening in your cloud? Stratoshark lets you explore and analyze applications at the system call level using a mature, proven interface based on Wireshark stratoshark.org

To Protect Democracy, Policymakers Must Protect Journalists from Spyware www.techpolicy.press/to-protect-d...

A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network thehackernews.com/2025/01/rans...

The 2024 Ransomware Landscape: Looking back on another painful year www.rapid7.com/blog/post/20...

Product Security Bad Practices www.ic3.gov/CSA/2025/250...

Subaru Security Flaws Exposed Its System for Tracking Millions of Cars www.wired.com/story/subaru...

Stealing HttpOnly cookies with the cookie sandwich technique portswigger.net/research/ste...

Let’s talk about AI and end-to-end encryption blog.cryptographyengineering.com/2025/01/17/l...

Systemic Risk Reporting: A System in Crisis? www.eff.org/deeplinks/20...

FTC Surveillance Pricing Study Indicates Wide Range of Personal Data Used to Set Individualized Consumer Prices www.ftc.gov/news-events/...

The European Data Protection Board (EDPB) has adopted a report on the implementation of the right of access by controllers www.edpb.europa.eu/news/news/20...

The Digital Operational Resilience Act (DORA) becomes binding as of today for all financial entities across the EU www.enisa.europa.eu/news/eu-fina...

A scaling law to model the effectiveness of identification techniques www.nature.com/articles/s41...

Inside the Black Box of Predictive Travel Surveillance: Behind the scenes, companies and governments are feeding a trove of data about international travelers into opaque AI tools that aim to predict who’s safe—and who’s a threat www.wired.com/story/inside...

Commission unveils action plan to protect the health sector from cyberattacks digital-strategy.ec.europa.eu/en/news/comm...

This is an excellent primer on some of the privacy dangers posed by large scale AI, from a cybersecurity perspective. Written in clear language, it's the most accessible rundown I've seen yet on these topics! desfontain.es/blog/privacy...

The AI Cybersecurity Collaboration Playbook provides guidance to organizations across the AI community for sharing AI-related cybersecurity information voluntarily with the CISA and other partners through the Joint Cyber Defense Collaborative (JCDC) www.cisa.gov/resources-to...

What are the risks from Artificial Intelligence? A comprehensive living database of over 1000 AI risks categorized by their cause and risk domain airisk.mit.edu

Advancing Platform Accountability: The Promise and Perils of DSA Risk Assessments www.techpolicy.press/advancing-pl...

Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation cloud.google.com/blog/topics/...