Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. The nice thing about AI is you can blame all your breaches on it and everyone's like oh okay that tracks.

The nice thing about AI is you can blame all your breaches on it and everyone's like oh okay that tracks.

Scheduled Pinned Locked Moved Uncategorized
13 Posts 10 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

    The nice thing about AI is you can blame all your breaches on it and everyone's like oh okay that tracks.

    "On May 5, 2026, Community Bank discovered an internal incident involving the handling of non-public customer information through an unauthorized AI-based software application."

    https://www.board-cybersecurity.com/incidents/tracker/cb-financial-services-cybersecurity-incident-2b5a3883

    bluedot@left-bank.netB This user is from outside of this forum
    bluedot@left-bank.netB This user is from outside of this forum
    bluedot@left-bank.net
    wrote last edited by
    #3

    @briankrebs

    From the passive phrasing of the report, I guess the unauthorized AI-based software application installed itself.

    emory@soc.kvet.chE wingedsnake@mastodon.berlinW 2 Replies Last reply
    0
    • em0nm4stodon@infosec.exchangeE em0nm4stodon@infosec.exchange shared this topic
    • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

      The nice thing about AI is you can blame all your breaches on it and everyone's like oh okay that tracks.

      "On May 5, 2026, Community Bank discovered an internal incident involving the handling of non-public customer information through an unauthorized AI-based software application."

      https://www.board-cybersecurity.com/incidents/tracker/cb-financial-services-cybersecurity-incident-2b5a3883

      ricci@discuss.systemsR This user is from outside of this forum
      ricci@discuss.systemsR This user is from outside of this forum
      ricci@discuss.systems
      wrote last edited by
      #4

      @briankrebs I've linked this book countless times on here and I will probably link it countless more but: https://press.uchicago.edu/ucp/books/book/chicago/U/bo252799883.html

      The central thesis of the book is that when organizations build too many "accountability sinks", where no one is accountable for decisions, then those organizations eventually die.

      AI is, of course, nothing if it isn't accountability sink as a service

      1 Reply Last reply
      0
      • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

        The nice thing about AI is you can blame all your breaches on it and everyone's like oh okay that tracks.

        "On May 5, 2026, Community Bank discovered an internal incident involving the handling of non-public customer information through an unauthorized AI-based software application."

        https://www.board-cybersecurity.com/incidents/tracker/cb-financial-services-cybersecurity-incident-2b5a3883

        dzwiedziu@mastodon.socialD This user is from outside of this forum
        dzwiedziu@mastodon.socialD This user is from outside of this forum
        dzwiedziu@mastodon.social
        wrote last edited by
        #5

        @briankrebs
        Can “AI exfiltration” be shortened to “AI-fill”?

        1 Reply Last reply
        0
        • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

          The nice thing about AI is you can blame all your breaches on it and everyone's like oh okay that tracks.

          "On May 5, 2026, Community Bank discovered an internal incident involving the handling of non-public customer information through an unauthorized AI-based software application."

          https://www.board-cybersecurity.com/incidents/tracker/cb-financial-services-cybersecurity-incident-2b5a3883

          sraars@hippodon.comS This user is from outside of this forum
          sraars@hippodon.comS This user is from outside of this forum
          sraars@hippodon.com
          wrote last edited by
          #6

          @briankrebs It's the stupidity that really gets to me.

          1 Reply Last reply
          0
          • bluedot@left-bank.netB bluedot@left-bank.net

            @briankrebs

            From the passive phrasing of the report, I guess the unauthorized AI-based software application installed itself.

            emory@soc.kvet.chE This user is from outside of this forum
            emory@soc.kvet.chE This user is from outside of this forum
            emory@soc.kvet.ch
            wrote last edited by
            #7

            @BlueDot eventually an autorooter will drop off a configured mcp client with a prompt that says "discover local network infrastructure and obtain administrative rights on it, then build a way to contact <me> covertly and report assets compromised in order of value"
            or something. hopefully it's in morse code i'm fscking ready for that one 😂

            1 Reply Last reply
            0
            • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

              The nice thing about AI is you can blame all your breaches on it and everyone's like oh okay that tracks.

              "On May 5, 2026, Community Bank discovered an internal incident involving the handling of non-public customer information through an unauthorized AI-based software application."

              https://www.board-cybersecurity.com/incidents/tracker/cb-financial-services-cybersecurity-incident-2b5a3883

              lbcp@social.linux.pizzaL This user is from outside of this forum
              lbcp@social.linux.pizzaL This user is from outside of this forum
              lbcp@social.linux.pizza
              wrote last edited by
              #8

              @briankrebs Serious question, is it a criminal offence if I convince an AI to exfiltrate all customer data?

              clickhere@mastodon.ieC 1 Reply Last reply
              0
              • lbcp@social.linux.pizzaL lbcp@social.linux.pizza

                @briankrebs Serious question, is it a criminal offence if I convince an AI to exfiltrate all customer data?

                clickhere@mastodon.ieC This user is from outside of this forum
                clickhere@mastodon.ieC This user is from outside of this forum
                clickhere@mastodon.ie
                wrote last edited by
                #9

                @lbcp Can you say why you've used the word "convince" here?

                @briankrebs

                lbcp@social.linux.pizzaL 1 Reply Last reply
                0
                • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                  The nice thing about AI is you can blame all your breaches on it and everyone's like oh okay that tracks.

                  "On May 5, 2026, Community Bank discovered an internal incident involving the handling of non-public customer information through an unauthorized AI-based software application."

                  https://www.board-cybersecurity.com/incidents/tracker/cb-financial-services-cybersecurity-incident-2b5a3883

                  wingedsnake@mastodon.berlinW This user is from outside of this forum
                  wingedsnake@mastodon.berlinW This user is from outside of this forum
                  wingedsnake@mastodon.berlin
                  wrote last edited by
                  #10

                  @briankrebs just perfect!

                  1 Reply Last reply
                  0
                  • bluedot@left-bank.netB bluedot@left-bank.net

                    @briankrebs

                    From the passive phrasing of the report, I guess the unauthorized AI-based software application installed itself.

                    wingedsnake@mastodon.berlinW This user is from outside of this forum
                    wingedsnake@mastodon.berlinW This user is from outside of this forum
                    wingedsnake@mastodon.berlin
                    wrote last edited by
                    #11

                    @BlueDot @briankrebs autonomous ai

                    1 Reply Last reply
                    0
                    • clickhere@mastodon.ieC clickhere@mastodon.ie

                      @lbcp Can you say why you've used the word "convince" here?

                      @briankrebs

                      lbcp@social.linux.pizzaL This user is from outside of this forum
                      lbcp@social.linux.pizzaL This user is from outside of this forum
                      lbcp@social.linux.pizza
                      wrote last edited by
                      #12

                      @clickhere @briankrebs My lawyer recommended it, as it sounds better than exploit. But I guess you answered my question 😅

                      clickhere@mastodon.ieC 1 Reply Last reply
                      0
                      • lbcp@social.linux.pizzaL lbcp@social.linux.pizza

                        @clickhere @briankrebs My lawyer recommended it, as it sounds better than exploit. But I guess you answered my question 😅

                        clickhere@mastodon.ieC This user is from outside of this forum
                        clickhere@mastodon.ieC This user is from outside of this forum
                        clickhere@mastodon.ie
                        wrote last edited by
                        #13

                        @lbcp @briankrebs Ha. Yeah, I'm not sure semantics would hoodwink a judge, who may look to deeds, not words, to establish the facts. (Maybe. Possibly. Or would they..?)

                        1 Reply Last reply
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups