Patrick C Miller's Avatar

Patrick C Miller

@patrickcmiller.bsky.social

Critical Infrastructure & Industrial Security Advisor. Ampyx Cyber CEO. Public speaker. Airport dweller. Recovering regulator. BEERISAC member. CCI US Coordinator. Former SANS Instructor. #ICS #OT #NERCCIP #NIST #IEC62443 #NIS2 #CRA #SlavaUkraini

2,007 Followers  |  1,152 Following  |  17,736 Posts  |  Joined: 19.08.2023  |  1.7933

Latest posts by patrickcmiller.bsky.social on Bluesky

Preview
Insurers balk at paying out huge settlements for claims against AI firms OpenAI, Anthropic consider using investor funds to settle potential lawsuits.

Insurers balk at paying out huge settlements for claims against AI firms arstechnica.com/ai/2025/10/i...

08.10.2025 15:42 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Google's New AI Doesn't Just Find Vulnerabilities β€” It Rewrites Code to Patch Them Google’s DeepMind unveils CodeMender, an AI agent that auto-fixes code vulnerabilities and enhances software security.

Google's New AI Doesn't Just Find Vulnerabilities β€” It Rewrites Code to Patch Them thehackernews.com/2025/10/goog...

08.10.2025 15:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Germany will not support 'Chat Control' message scanning in the EU β€œRandom chat monitoring must be taboo in a constitutional state,” Federal Justice Minister Stefanie Hubig said as German officials signaled they will not vote for a controversial EU proposal known as…

Germany will not support 'Chat Control' message scanning in the EU therecord.media/chat-control...

08.10.2025 14:42 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Germany slams brakes on EU's Chat Control snoopfest : Berlin's opposition likely kills off Brussels' bid to scan everyone's messages

Germany slams brakes on EU's Chat Control snoopfest www.theregister.com/2025/10/08/g...

08.10.2025 14:12 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
OpenAI bans some Chinese, Russian accounts using AI for evil : It also banned some suspected Russian accounts trying to create influence campaigns and malware

OpenAI bans suspected Chinese accounts using ChatGPT to plan surveillance www.theregister.com/2025/10/07/o...

08.10.2025 13:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Military radio maker BK Technologies cops to cyber break-in : Florida comms outfit serving cops, firefighters, and the military says hackers pinched some employee data but insists its systems stayed online

Police and military radio maker BK Technologies cops to cyber break-in www.theregister.com/2025/10/07/p...

08.10.2025 13:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
US X-ray biz gets clear image of 171k+ patients’ stolen data : No fraud monitoring and no apology after miscreants make off with medical, financial data

Nearly a year after attack, US medical scanning biz gets clear image of stolen patient data www.theregister.com/2025/10/07/1...

08.10.2025 12:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Russia blocks mobile internet for foreign SIM cards, citing drone threats The new rule imposes a mandatory 24-hour mobile internet blackout for anyone entering Russia with a foreign SIM card.

Russia blocks mobile internet for foreign SIM cards, citing drone threats therecord.media/russia-block...

08.10.2025 12:12 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Preview
The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn The Year 2036/2038 problem is a bug that will be triggered in more than a decade, but hackers could exploit it today against ICS and consumer devices.

The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn www.securityweek.com/the-y2k38-bu...

08.10.2025 11:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Attacks The Medusa ransomware operators exploited the GoAnywhere MFT vulnerability one week before patches were released.

Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Attacks www.securityweek.com/fortra-goany...

08.10.2025 11:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Hackers Stole Data From Public Safety Comms Firm BK Technologies BK Technologies has informed the SEC that it discovered an IT intrusion on September 20.

Hackers Stole Data From Public Safety Comms Firm BK Technologies www.securityweek.com/hackers-stol...

08.10.2025 10:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Researchers track Cavalry Werewolf custom malware attacks on Russian government, industrial networks - Industrial Cyber BI.ZONE Researchers track Cavalry Werewolf custom malware attacks on Russian government and industrial networks.

Researchers track Cavalry Werewolf custom malware attacks on Russian government, industrial networks industrialcyber.co/ransomware/r...

08.10.2025 10:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
With space infrastructure at risk, experts call for cybersecurity by design, tight governance, supply chain accountability - Industrial Cyber With space infrastructure at risk, experts call for cybersecurity by design, tight governance, supply chain accountability

With space infrastructure at risk, experts call for cybersecurity by design, tight governance, supply chain accountability industrialcyber.co/threat-lands...

08.10.2025 09:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations Report links BIETA and subsidiary CIII to China’s MSS, citing covert communication and cyber intelligence tools.

New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations thehackernews.com/2025/10/new-...

08.10.2025 09:12 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
5 Critical Questions For Adopting an AI Security Solution Five essential questions help organizations select AI-SPM tools for data protection, compliance, and scalability.

5 Critical Questions For Adopting an AI Security Solution thehackernews.com/2025/10/5-cr...

08.10.2025 08:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Deloitte will refund Australian government for AI hallucination-filled report Consulting firm quietly admitted to GPT-4o use after fake citations were found in August.

Deloitte will refund Australian government for AI hallucination-filled report arstechnica.com/ai/2025/10/d...

08.10.2025 08:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Spyware in Fake Signal and ToTok Apps Targets UAE Android Users Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Spyware Disguised as Signal and ToTok Apps Targets UAE Android Users hackread.com/spyware-fake...

08.10.2025 07:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Ransomware Group β€œTrinity of Chaos” Launches Data Leak Site A new TOR data leak site published by the Trinity of Chaos ransomware group unveils 39 firms’ data and threatens Salesforce litigation

Ransomware Group β€œTrinity of Chaos” Launches Data Leak Site www.infosecurity-magazine.com/news/trinity...

08.10.2025 07:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Security Leadership Master Class 1 : Leveling up your leadership This is the first of a 7 part series where I’ll group together a set of prior posts into a particular theme that will make it all the more accessible. The 7 themes are:1. Security Leadership Master…

Security Leadership Master Class 1 : Leveling up your leadership www.philvenables.com/post/securit...

08.10.2025 06:42 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Silicon Statecraft: How U.S.-Gulf AI Deals Project Power The great-power contest is not unfolding on battlefields or carrier decks, but inside data halls cooled by air conditioning, far from America’s shores.

Silicon Statecraft: How U.S.-Gulf AI Deals Project Power warontherocks.com/2025/10/sili...

08.10.2025 06:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Google’s AI bounty program pays bug hunters up to $30K Can you convince an LLM to unlock someone else’s door?

Google’s AI bounty program pays bug hunters up to $30K www.theverge.com/news/793362/...

08.10.2025 05:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Reading the ENISA Threat Landscape 2025 report ENISA 2025: Rising ransomware, AI phishing, and state-backed espionage mark a converging, persistent EU cyber threat landscape.

Reading the ENISA Threat Landscape 2025 report securityaffairs.com/182978/secur...

08.10.2025 05:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Can AI companies turn brainrot into revenue? | TechCrunch Watch as Equity hosts break down how the government shutdown may threaten startups and why AI companies are scrambling to turn brainrot into revenue.

Can AI companies turn brainrot into revenue? techcrunch.com/video/can-ai...

08.10.2025 04:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
4 Organizational Red Flags That Turn Off Job Candidates A survey of hundreds of executives shows that the most common β€œred flagsβ€œ that deter qualified candidates from interviewing for or accepting jobs with organizations are a lack of clarity about the…

4 Organizational Red Flags That Turn Off Job Candidates hbr.org/2025/10/4-or...

08.10.2025 04:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Enabling real-time responsiveness with event-driven architecture Event-driven architecture (EDA) offers a scalable, resilient foundation for real-time decision-making, ultimately helping organizations shift from reactive to proactive business operations.

Enabling real-time responsiveness with event-driven architecture www.technologyreview.com/2025/10/06/1...

08.10.2025 03:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
What it Takes for Dual-Use Tech Companies to Truly Succeed Sherman Williams, the co-founder of AIN Ventures, joins Ryan at the bar to discuss the hard realities of dual-use investing. They dig into inflated

What it Takes for Dual-Use Tech Companies to Truly Succeed warontherocks.com/2025/10/what...

08.10.2025 03:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers Chinese hackers’ UAT-8099 group exploits IIS servers with BadIIS malware for SEO fraud and data theft.

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers thehackernews.com/2025/10/chin...

08.10.2025 02:42 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Attackers Exploit Zimbra Zero-Day Via ICS A threat actor purporting to be from the Libyan Navy's Office of Protocol targeted Brazil's military earlier this year using the rare tactic.

Cyberattackers Exploit Zimbra Zero-Day Via ICS www.darkreading.com/cyberattacks...

08.10.2025 02:12 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Medusa ransomware used during exploitation of GoAnywhere file transfer bug, Microsoft says Cybercriminals are using the Medusa ransomware strain during exploitation of a vulnerability in Fortra's GoAnywhere file transfer tool.

Medusa ransomware used during exploitation of GoAnywhere file transfer bug, Microsoft says therecord.media/medusa-ranso...

08.10.2025 01:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer Detour Dog used DNS TXT records and botnets to distribute Strela Stealer via StarFish backdoor.

Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer thehackernews.com/2025/10/deto...

08.10.2025 01:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@patrickcmiller is following 20 prominent accounts