lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up.
-
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect@GossiTheDog it's not slop it's called "synthetic data" it's very futuristic! https://www.ipsos.com/en-us/ipsos-partners-stanford-university-pioneer-future-market-research-synthetic-data
-
But the important question everyone wants to know is...
Did LLM correctly 'predict' what would have been your quote had they bothered to ask you... 🤪 (that would bother me most
)@john_philip_bell @0xabad1dea no, I don't think humans are the weakest link
-
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect@GossiTheDog Libel lawyers are going to make a killing in the next few years suing AI “news” publications.
-
@john_philip_bell @0xabad1dea no, I don't think humans are the weakest link
@0xabad1dea @john_philip_bell @GossiTheDog the “weakest link” In security being the human is such a trope… and completely incorrect
If anything the humans in the chain are the strongest link, and some of our best detectors!(Okay with that said… some specific humans may best detect by triggering malware…)
-
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect@GossiTheDog Sue them for infringement and defamation

-
@0xabad1dea @john_philip_bell @GossiTheDog the “weakest link” In security being the human is such a trope… and completely incorrect
If anything the humans in the chain are the strongest link, and some of our best detectors!(Okay with that said… some specific humans may best detect by triggering malware…)
@fbarton @0xabad1dea @GossiTheDog
My earlier joking about LLMs aside...I too would not agree that humans are 'the weakest link', there surely are cases where 'a human' was 'a weakness', but in the context of Dr. Reason's swiss cheese model, rarely the weakest in the overall design of any system.
After all, a key objective of proper cybersecurity is exactly to mitigate the human factor, so arguably, by definition if it came down to a human, something more critical failed. (Design, GRC, etc.)
(From maker-checker to insider threat - the field is supposed to be designed to reduce the weakness of the human factor, if anything that failed.)
-
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect@GossiTheDog And the next time you DO say something - correct or not
- we have to check several times to make sure you actually said it. We live in interesting times indeed. -
@GossiTheDog I’m glad you can laugh it off, I’d be having a breakdown
@0xabad1dea @GossiTheDog yeah we'd be pursuing legal action. that's really fucked up.
-
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect@GossiTheDog ok but what is a "Bitch Eating Crackers attack"?
-
@john_philip_bell @0xabad1dea no, I don't think humans are the weakest link
@GossiTheDog @john_philip_bell @0xabad1dea but, but - I have read an article that says differently;) - and I’m already poking my llm to generate an article saying “cyber security experts (like Kevin Beaumont) are suggesting to swap people for AI’s in your corporations, because “people are the weakest link”
-
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect@GossiTheDog Fuck AI. I will never willfully use (yes I know banks and too many others are forcing it on us already) and if I know something was written with it, I won't read it.
-
@GossiTheDog And the next time you DO say something - correct or not
- we have to check several times to make sure you actually said it. We live in interesting times indeed.@GossiTheDog @klefstadmyr was interviewed many times in my career and NOT ONCE was I quoted accurately or without sensationalism. #NothingToSeeHere
-
@GossiTheDog @klefstadmyr was interviewed many times in my career and NOT ONCE was I quoted accurately or without sensationalism. #NothingToSeeHere
@meltedcheese @GossiTheDog Good point.
-
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect@GossiTheDog@cyberplace.social
New "quoting" method:<PERSON> would have said "<THINGS>" had we asked them and not used AI to extract a likely statement from their other writings and other works that our AI scraped.
? -
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect@GossiTheDog Curious....what do you do in this situation?
-
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirecttechbuzz.ai the tech buzz.
"BEC attacks are incredibly effective because they don't require sophisticated malware or zero-day exploits," says cybersecurity researcher Kevin Beaumont. "They exploit the weakest link - human decision-making under time pressure. A single compromised email account can yield millions if the attacker times it right." -
lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought
https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect@GossiTheDog first that actor from the live action One Piece show, now you?
-
R relay@relay.mycrowd.ca shared this topic
E em0nm4stodon@infosec.exchange shared this topic