<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Digitaliziran si</title><link>https://digitaliziran.si/categories/security/</link><description>Recent content in Security on Digitaliziran si</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 12 Apr 2026 07:21:05 +0000</lastBuildDate><atom:link href="https://digitaliziran.si/categories/security/index.xml" rel="self" type="application/rss+xml"/><item><title>The Security Debt Behind NVIDIA's GH200: What the Marketing Materials Won't Tell You</title><link>https://digitaliziran.si/2026/04/12/the-security-debt-behind-nvidias-gh200-what-the-marketing-materials-wont-tell-you/</link><pubDate>Sun, 12 Apr 2026 07:21:05 +0000</pubDate><guid>https://digitaliziran.si/2026/04/12/the-security-debt-behind-nvidias-gh200-what-the-marketing-materials-wont-tell-you/</guid><description>&lt;p&gt;You deployed NVIDIA&amp;rsquo;s GH200 Grace Hopper for its unified CPU-GPU memory architecture - the selling point that makes it a powerhouse for AI and HPC workloads. What nobody mentioned: your operating system is silently placing sensitive data into GPU memory without explicit application intent. And NVIDIA has known about it since at least October 2025.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://digitaliziran.si/2025/02/10/adventures-in-setting-up-nvidias-gh200-grace-hopper-a-tale-of-two-systems/"&gt;Fourteen months ago, I wrote about the excitement of setting up this hardware&lt;/a&gt; - two systems in one, a Grace CPU paired with a Hopper GPU and a BlueField-3 DPU for good measure. The setup had its quirks, but the promise was clear. Since then, I have been cataloguing what the marketing materials leave out. This is the security reckoning that setup experience did not prepare me for.&lt;/p&gt;</description></item><item><title>EU Cybersecurity Package and NIS2: What InfoSec Professionals Need to Know</title><link>https://digitaliziran.si/2026/02/10/eu-cybersecurity-package-nis2-post-quantum-readiness/</link><pubDate>Tue, 10 Feb 2026 09:00:00 +0000</pubDate><guid>https://digitaliziran.si/2026/02/10/eu-cybersecurity-package-nis2-post-quantum-readiness/</guid><description>&lt;p&gt;As someone tracking EU regulatory developments alongside ISO compliance and cryptography standards, the revised Network and Information Security Directive (NIS2) represents the most comprehensive update to European cybersecurity requirements since the original 2016 directive. What makes this particularly relevant for InfoSec professionals is the explicit integration of post-quantum cryptography timelines into regulatory frameworks - a recognition that the threat landscape is evolving faster than many organizations realize.&lt;/p&gt;
&lt;h2 id="understanding-the-nis2-reforms"&gt;Understanding the NIS2 Reforms&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://www.mwe.com/insights/new-eu-cybersecurity-package-what-the-proposed-reforms-mean-for-companies-in-the-eu/"&gt;revised NIS2 directive&lt;/a&gt; aims to clarify scope, enhance legal certainty, and promote EU-wide standards across 18 critical sectors. The reforms address three areas that will directly impact operational security:&lt;/p&gt;</description></item><item><title>The AI Security Crisis You Can't Ignore: Why Simon Willison's 'Lethal Trifecta' Demands Immediate Action</title><link>https://digitaliziran.si/2025/08/27/the-ai-security-crisis-you-cant-ignore-why-simon-willisons-lethal-trifecta-demands-immediate-action/</link><pubDate>Wed, 27 Aug 2025 07:26:05 +0000</pubDate><guid>https://digitaliziran.si/2025/08/27/the-ai-security-crisis-you-cant-ignore-why-simon-willisons-lethal-trifecta-demands-immediate-action/</guid><description>&lt;p&gt;Are your AI systems creating a perfect storm for data theft? Security researcher &lt;a href="https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/"&gt;Simon Willison&amp;rsquo;s recent analysis&lt;/a&gt; reveals a chilling reality: AI agents combining three specific capabilities create what he calls the &amp;ldquo;lethal trifecta&amp;rdquo; – a combination so dangerous that attackers can easily trick systems into accessing private data and sending it directly to them.&lt;/p&gt;
&lt;h2 id="the-three-components-that-spell-disaster"&gt;The Three Components That Spell Disaster&lt;/h2&gt;
&lt;p&gt;Willison identifies three seemingly innocent AI capabilities that, when combined, become a security nightmare:&lt;/p&gt;</description></item><item><title>AI Safety vs. Security: The Critical Distinction Your Organization Can't Afford to Ignore</title><link>https://digitaliziran.si/2025/08/26/ai-safety-vs-security-the-critical-distinction-your-organization-cant-afford-to-ignore/</link><pubDate>Tue, 26 Aug 2025 10:21:05 +0000</pubDate><guid>https://digitaliziran.si/2025/08/26/ai-safety-vs-security-the-critical-distinction-your-organization-cant-afford-to-ignore/</guid><description>&lt;p&gt;Are you treating &lt;a href="https://www.ibm.com/think/topics/ai-safety"&gt;AI safety&lt;/a&gt; and &lt;a href="https://www.microsoft.com/en-us/security/business/security-101/what-is-ai-for-cybersecurity"&gt;AI security&lt;/a&gt; as the same thing? If so, your organization might be missing critical vulnerabilities that could compromise both your operations and compliance posture.&lt;/p&gt;
&lt;h2 id="the-dangerous-misconception"&gt;The Dangerous Misconception&lt;/h2&gt;
&lt;p&gt;While many languages use the same word for both concepts, &lt;a href="https://oecd.ai/en/wonk/when-it-comes-to-ai-incidents-safety-and-security-are-not-the-same"&gt;the OECD emphasizes that AI safety and security are distinct yet interconnected domains&lt;/a&gt; that require different approaches and frameworks. This distinction isn&amp;rsquo;t just academic - it has real implications for how you protect your organization.&lt;/p&gt;</description></item><item><title>Post-Quantum Cryptography: Why the Threat is Already Here</title><link>https://digitaliziran.si/2025/08/04/post-quantum-cryptography-why-the-threat-is-already-here/</link><pubDate>Mon, 04 Aug 2025 10:55:00 +0000</pubDate><guid>https://digitaliziran.si/2025/08/04/post-quantum-cryptography-why-the-threat-is-already-here/</guid><description>&lt;h2 id="a-practical-guide-for-infosec-professionals-and-auditors"&gt;A Practical Guide for InfoSec Professionals and Auditors&lt;/h2&gt;
&lt;p&gt;As someone working daily with ISO standards and AI governance frameworks, I&amp;rsquo;ve been closely following NIST&amp;rsquo;s post-quantum cryptography (PQC) standardization process. What I&amp;rsquo;ve discovered should concern every InfoSec professional: the threat to our current encryption isn&amp;rsquo;t waiting for some hypothetical quantum computer. It&amp;rsquo;s already growing in GPU farms around the world.&lt;/p&gt;
&lt;p&gt;In this guide, I&amp;rsquo;ll break down what you need to know about post-quantum cryptography without the complex mathematics. More importantly, I&amp;rsquo;ll explain why this matters for your organization today, not in some distant quantum future.&lt;/p&gt;</description></item><item><title>Your AI Guardrails Just Got Outsmarted by Emojis: The Semantic Prompt Injection Crisis</title><link>https://digitaliziran.si/2025/08/03/your-ai-guardrails-just-got-outsmarted-by-emojis-the-semantic-prompt-injection-crisis/</link><pubDate>Sun, 03 Aug 2025 09:17:44 +0000</pubDate><guid>https://digitaliziran.si/2025/08/03/your-ai-guardrails-just-got-outsmarted-by-emojis-the-semantic-prompt-injection-crisis/</guid><description>&lt;p&gt;Are your AI systems as secure as you think? Recent research from &lt;a href="https://developer.nvidia.com/blog/securing-agentic-ai-how-semantic-prompt-injections-bypass-ai-guardrails/"&gt;NVIDIA&amp;rsquo;s AI Red Team&lt;/a&gt; reveals a concerning reality: attackers can now bypass some AI guardrails using something as simple as emoji sequences and visual symbols.&lt;/p&gt;
&lt;h2 id="the-invisible-threat-in-plain-sight"&gt;The Invisible Threat in Plain Sight&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://www.paloaltonetworks.com/cyberpedia/what-is-a-prompt-injection-attack"&gt;Semantic prompt injections&lt;/a&gt; represent an emerging frontier in adversarial attacks against AI systems. Unlike traditional &lt;a href="https://www.ibm.com/think/topics/prompt-injection"&gt;prompt injections&lt;/a&gt; that rely on text manipulation, these attacks use symbolic visual inputs - emoji-like sequences, rebus puzzles, and other visual representations - to potentially compromise &lt;a href="https://developer.nvidia.com/blog/securing-agentic-ai-how-semantic-prompt-injections-bypass-ai-guardrails/"&gt;agentic AI systems&lt;/a&gt; while evading some detection methods.&lt;/p&gt;</description></item><item><title>Amazon's AI Assistant Nearly Wiped Developer Systems for 5 Days – Are Your Access Controls Ready?</title><link>https://digitaliziran.si/2025/07/29/amazons-ai-assistant-nearly-wiped-developer-systems-for-5-days-are-your-access-controls-ready/</link><pubDate>Tue, 29 Jul 2025 19:14:46 +0000</pubDate><guid>https://digitaliziran.si/2025/07/29/amazons-ai-assistant-nearly-wiped-developer-systems-for-5-days-are-your-access-controls-ready/</guid><description>&lt;p&gt;&lt;strong&gt;Picture this scenario:&lt;/strong&gt; You&amp;rsquo;re working late, relying on your trusted &lt;a href="https://en.wikipedia.org/wiki/AI-assisted_programming"&gt;AI coding assistant&lt;/a&gt; to help debug a critical application. Unknown to you, that same assistant has been compromised and is quietly preparing to execute commands that could wipe your entire development environment – both local files and cloud infrastructure.&lt;/p&gt;
&lt;p&gt;This isn&amp;rsquo;t a hypothetical nightmare. It actually happened to &lt;a href="https://aws.amazon.com/q/developer/"&gt;Amazon Q Developer Extension&lt;/a&gt; users for five consecutive days, and the implications should make every &lt;a href="https://en.wikipedia.org/wiki/Chief_information_security_officer"&gt;Chief Information Security Officer (CISO)&lt;/a&gt; reassess their AI integration strategies immediately.&lt;/p&gt;</description></item><item><title>MCP's Hidden Security Crisis: Why Your AI Automation Strategy Needs an Urgent Reality Check</title><link>https://digitaliziran.si/2025/06/24/mcps-hidden-security-crisis-why-your-ai-automation-strategy-needs-an-urgent-reality-check/</link><pubDate>Tue, 24 Jun 2025 16:33:37 +0000</pubDate><guid>https://digitaliziran.si/2025/06/24/mcps-hidden-security-crisis-why-your-ai-automation-strategy-needs-an-urgent-reality-check/</guid><description>&lt;p&gt;Are you rushing to implement &lt;a href="https://www.anthropic.com/news/model-context-protocol"&gt;Model Context Protocol (MCP)&lt;/a&gt; for your AI automation workflows? Before you do, consider this sobering reality: &lt;a href="https://blog.sshh.io/p/everything-wrong-with-mcp"&gt;MCP may be creating more security vulnerabilities than it solves&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Promise vs. The Reality&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://modelcontextprotocol.io/specification/2025-06-18"&gt;MCP&lt;/a&gt; promises seamless integration between &lt;a href="https://www.ibm.com/topics/large-language-models"&gt;Large Language Models (LLMs)&lt;/a&gt; and third-party tools, positioning itself as the standard for AI-driven automation. Companies are adopting it to streamline workflows, reduce manual processes, and give &lt;a href="https://www.ibm.com/topics/ai-agents"&gt;AI agents&lt;/a&gt; unprecedented control over business operations.&lt;/p&gt;</description></item><item><title>DORA First: Why Financial Institutions Must Prioritize AI Readiness Before 2027</title><link>https://digitaliziran.si/2025/06/23/dora-first-why-financial-institutions-must-prioritize-ai-readiness-before-2027/</link><pubDate>Mon, 23 Jun 2025 09:50:48 +0000</pubDate><guid>https://digitaliziran.si/2025/06/23/dora-first-why-financial-institutions-must-prioritize-ai-readiness-before-2027/</guid><description>&lt;p&gt;Are you prepared for the regulatory storm heading toward financial services? While your competitors scramble to understand the &lt;a href="https://www.artificial-intelligence-act.com/"&gt;EU AI Act&lt;/a&gt;, smart institutions are taking a &amp;ldquo;DORA first&amp;rdquo; approach - and it might be the difference between thriving and merely surviving the 2027 compliance deadline.&lt;/p&gt;
&lt;h2 id="the-perfect-storm-when-dora-meets-ai-act"&gt;The Perfect Storm: When DORA Meets AI Act&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://www.mofo.com/resources/insights/250218-european-digital-compliance-key-digital-regulation-compliance"&gt;Digital Operational Resilience Act (DORA)&lt;/a&gt;, which became applicable on &lt;strong&gt;January 17, 2025&lt;/strong&gt;, has already transformed how financial institutions manage &lt;a href="https://www.leanix.net/en/wiki/trm/ict-risk-management-under-dora"&gt;ICT risk&lt;/a&gt; (Information and Communication Technology risks that could compromise network and information systems). Now, with the &lt;a href="https://www.skadden.com/insights/publications/2024/10/eu-standardization-supporting-the-artificial-intelligence-act"&gt;EU AI Act&amp;rsquo;s full enforcement approaching August 2, 2027&lt;/a&gt;, institutions face an unprecedented convergence of regulatory requirements.&lt;/p&gt;</description></item><item><title>Are Your AI Embeddings as Secure as You Think?</title><link>https://digitaliziran.si/2025/06/12/are-your-ai-embeddings-as-secure-as-you-think/</link><pubDate>Thu, 12 Jun 2025 15:49:06 +0000</pubDate><guid>https://digitaliziran.si/2025/06/12/are-your-ai-embeddings-as-secure-as-you-think/</guid><description>&lt;p&gt;Are you confident that your organization&amp;rsquo;s AI embeddings are protecting sensitive information? A groundbreaking new research paper reveals a troubling reality: what you thought was secure data representation might be an open book to determined attackers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What are AI embeddings?&lt;/strong&gt; For readers new to this concept, &lt;a href="https://www.cloudflare.com/learning/ai/what-are-embeddings/"&gt;embeddings are numerical representations&lt;/a&gt; that convert complex data like text, images, or audio into mathematical vectors that AI systems can process. Think of them as a way to translate human-readable information into a language that machines understand.&lt;/p&gt;</description></item><item><title>Cloud-based software testing for 200€/employee</title><link>https://digitaliziran.si/2025/06/10/cloud-based-software-testing-for-200e-employee/</link><pubDate>Tue, 10 Jun 2025 12:54:00 +0000</pubDate><guid>https://digitaliziran.si/2025/06/10/cloud-based-software-testing-for-200e-employee/</guid><description>&lt;p&gt;Are you testing new HR software in your organization? A landmark ruling by Germany&amp;rsquo;s Federal Labour Court (Bundesarbeitsgericht) should make you pause and reconsider your approach. The court awarded €200 in damages to an employee whose personal data was improperly transferred during cloud-based HR software testing - and this decision could reshape how companies handle employee data across Europe.&lt;/p&gt;
&lt;h2 id="the-case-that-changes-everything"&gt;&lt;strong&gt;The Case That Changes Everything&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;The case involved an employee whose personal data was transferred to &lt;a href="https://www.dataguidance.com/news/germany-federal-labor-court-allows-non-material"&gt;Workday&lt;/a&gt; HR management software beyond the agreed limits of a concluded works agreement (a formal contract between employer and employee that defines terms and conditions of employment). What makes this ruling particularly significant is that the court confirmed that even limited misuse of employee data can trigger liability under the General Data Protection Regulation (GDPR).&lt;/p&gt;</description></item><item><title>SMS Security Crisis: Hackers Selling SS7 Vulnerability for $5,000, Exposing Millions to Surveillance</title><link>https://digitaliziran.si/2025/05/08/sms-security-crisis-hackers-selling-ss7-vulnerability-for-5000-exposing-millions-to-surveillance/</link><pubDate>Thu, 08 May 2025 05:55:23 +0000</pubDate><guid>https://digitaliziran.si/2025/05/08/sms-security-crisis-hackers-selling-ss7-vulnerability-for-5000-exposing-millions-to-surveillance/</guid><description>&lt;p&gt;A Perfect Storm for Information Security&lt;/p&gt;
&lt;p&gt;Recent developments in the cybersecurity landscape have created what I can only describe as a perfect storm for organizations maintaining ISO 27001 certification. A &lt;a href="https://cybersecuritynews.com/hackers-selling-ss7-0-day-vulnerability/"&gt;critical vulnerability&lt;/a&gt; in the &lt;a href="https://en.wikipedia.org/wiki/Signalling_System_No._7"&gt;Signaling System 7 (SS7)&lt;/a&gt; protocol – the backbone of global telecommunications – is now being marketed on underground forums for a mere $5,000, dramatically lowering the barrier to entry for sophisticated telecom-based attacks.&lt;/p&gt;
&lt;h2 id="why-this-matters-for-iso-27001-certified-organizations"&gt;Why This Matters for ISO 27001 Certified Organizations&lt;/h2&gt;
&lt;p&gt;For those maintaining ISO 27001 certification, this development has significant implications across multiple control domains:&lt;/p&gt;</description></item></channel></rss>