Day 176: When the Machines Look Away 👀💥

Today’s drops hit a deep nerve — what happens when AI is taught not to see, devices can’t be patched, and the world’s threat actors outpace law enforcement? The battlefield’s growing… but the blind spots are too.

🫥 Malware That Tells AI to Ignore It

Wild development: new malware strains are commanding AI-powered detection engines to skip them. It’s like cognitive cloaking—the machine sees it, but won’t act on it. If we train AI with too many shortcuts, attackers will hijack the very filters we depend on.

https://www.darkreading.com/cloud-security/malware-tells-ai-to-ignore-it

🖨️ Millions of Brother Printers Vulnerable — and Unpatchable

A critical bug affects over 100 million Brother printers—but here’s the kicker: it’s unpatchable due to firmware design. Supply chain meets endpoint liability. This is what happens when IoT outlives its own update model 🪦📠

https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug

🔓 NoAuth Still Alive on 9% of Exposed Devices

The notorious NoAuth vulnerability is still affecting nearly 1 in 10 devices. This isn’t old news—it’s a living gap in basic hygiene, exploited daily. Persistence isn’t always about advanced threats… sometimes it’s just neglected configurations.

https://thehackernews.com/2025/06/noauth-vulnerability-still-affects-9-of.html

🧬 Citrix Bleed 2: Now With Token Theft

Just when we thought we handled the first CitrixBleed, part two drops—this one enabling token theft directly from memory. Privilege escalation is becoming more surgical, and cloud environments are looking a lot less isolated.

https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html

🧠 What Do LLMs Know About You?

Bruce Schneier drops a thinker: the more we use LLMs, the more they start to develop shadow profiles on us. Not intentionally… but emergently. This post explores the psychological footprints we leave behind in conversations with AI—and what that might mean in the wrong hands.

🌍 Africa’s Cybercrime Spike Meets Thin Defense Lines

As cybercrime surges across parts of Africa, many regions are struggling to build law enforcement capacity fast enough. It’s a modern gold rush for ransomware crews, exploiting regions where digital infrastructure is growing faster than regulation.

https://www.darkreading.com/cyber-risk/africa-surge-cybercrime-law-enforcement-struggles

🏋🏽 Personal Note:

Still in that discipline grind. Been waking up sore but sharp. Every rep, every mile—feels like another brick in the foundation I’m laying, not just physically but mentally. Strength is strategy.

Like these unpatched printers or AI blind spots… the systems we don’t tend to become our weaknesses. Same goes for the body. I’m not aiming for flash—I’m building something durable. 🧱💡