| Current work | SecurityBoulevard, DarkReading, DigitalCxO, DevOps.com, others |
| Muckrack Profile | https://muckrack.com/george-v-hulme |
| Current work | SecurityBoulevard, DarkReading, DigitalCxO, DevOps.com, others |
| Muckrack Profile | https://muckrack.com/george-v-hulme |
I got ahold of the Copilot+ software.
Recall uses a bunch of services themed CAP - Core AI Platform. Enabled by default.
It spits constant screenshots (the product brands then “snapshots”, but they’re hooked screenshots) into the current user’s AppData as part of image storage.
The NPU processes them and extracts text, into a database file.
The database is SQLite, and you can access it as the user including programmatically. It 100% does not need physical access and can be stolen.
Check out this article¹ from
@George_V_Hulme @Claroty Nexus which discusses cyber security risks to the bulk electric system & how utilities are managing these risks, especially using the Idaho National Labs CCE methodology.
Quotes from yours truly.
For more reading, check out the findings from the 2023 NERC State of Reliability Technical Assessment² and INL CCE³.
__
¹https://nexusconnect.io/articles/bulk-power-system-risks-span-complexity-vulnerabilities-advanced-actors
²https://nerc.com/pa/RAPA/PA/Performance%20Analysis%20DL/NERC_SOR_2023_Overview.pdf
³https://inl.gov/cce/
Number of Victims Breached Via MOVEit Zero-Day Keeps Climbing
https://www.databreachtoday.com/number-victims-breached-via-moveit-zero-day-keeps-climbing-a-22573