Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up.

lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up.

Scheduled Pinned Locked Moved Uncategorized
27 Posts 24 Posters 22 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • fbarton@infosec.exchangeF fbarton@infosec.exchange

    @0xabad1dea @john_philip_bell @GossiTheDog the “weakest link” In security being the human is such a trope… and completely incorrect
    If anything the humans in the chain are the strongest link, and some of our best detectors!

    (Okay with that said… some specific humans may best detect by triggering malware…)

    J This user is from outside of this forum
    J This user is from outside of this forum
    john_philip_bell@defcon.social
    wrote last edited by
    #16

    @fbarton @0xabad1dea @GossiTheDog
    My earlier joking about LLMs aside...

    I too would not agree that humans are 'the weakest link', there surely are cases where 'a human' was 'a weakness', but in the context of Dr. Reason's swiss cheese model, rarely the weakest in the overall design of any system.

    After all, a key objective of proper cybersecurity is exactly to mitigate the human factor, so arguably, by definition if it came down to a human, something more critical failed. (Design, GRC, etc.)

    (From maker-checker to insider threat - the field is supposed to be designed to reduce the weakness of the human factor, if anything that failed.)

    1 Reply Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought 🤣 https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect

      klefstadmyr@social.vivaldi.netK This user is from outside of this forum
      klefstadmyr@social.vivaldi.netK This user is from outside of this forum
      klefstadmyr@social.vivaldi.net
      wrote last edited by
      #17

      @GossiTheDog And the next time you DO say something - correct or not 😉 - we have to check several times to make sure you actually said it. We live in interesting times indeed.

      meltedcheese@c.imM 1 Reply Last reply
      0
      • 0xabad1dea@infosec.exchange0 0xabad1dea@infosec.exchange

        @GossiTheDog I’m glad you can laugh it off, I’d be having a breakdown

        ireneista@adhd.irenes.spaceI This user is from outside of this forum
        ireneista@adhd.irenes.spaceI This user is from outside of this forum
        ireneista@adhd.irenes.space
        wrote last edited by
        #18

        @0xabad1dea @GossiTheDog yeah we'd be pursuing legal action. that's really fucked up.

        1 Reply Last reply
        0
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought 🤣 https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect

          adriano@lile.clA This user is from outside of this forum
          adriano@lile.clA This user is from outside of this forum
          adriano@lile.cl
          wrote last edited by
          #19

          @GossiTheDog ok but what is a "Bitch Eating Crackers attack"?

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            @john_philip_bell @0xabad1dea no, I don't think humans are the weakest link

            dmtomas@mastodon.socialD This user is from outside of this forum
            dmtomas@mastodon.socialD This user is from outside of this forum
            dmtomas@mastodon.social
            wrote last edited by
            #20

            @GossiTheDog @john_philip_bell @0xabad1dea but, but - I have read an article that says differently;) - and I’m already poking my llm to generate an article saying “cyber security experts (like Kevin Beaumont) are suggesting to swap people for AI’s in your corporations, because “people are the weakest link”

            1 Reply Last reply
            0
            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

              lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought 🤣 https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect

              kristen_d@mastodon.socialK This user is from outside of this forum
              kristen_d@mastodon.socialK This user is from outside of this forum
              kristen_d@mastodon.social
              wrote last edited by
              #21

              @GossiTheDog Fuck AI. I will never willfully use (yes I know banks and too many others are forcing it on us already) and if I know something was written with it, I won't read it.

              1 Reply Last reply
              0
              • klefstadmyr@social.vivaldi.netK klefstadmyr@social.vivaldi.net

                @GossiTheDog And the next time you DO say something - correct or not 😉 - we have to check several times to make sure you actually said it. We live in interesting times indeed.

                meltedcheese@c.imM This user is from outside of this forum
                meltedcheese@c.imM This user is from outside of this forum
                meltedcheese@c.im
                wrote last edited by
                #22

                @GossiTheDog @klefstadmyr was interviewed many times in my career and NOT ONCE was I quoted accurately or without sensationalism. #NothingToSeeHere

                klefstadmyr@social.vivaldi.netK 1 Reply Last reply
                0
                • meltedcheese@c.imM meltedcheese@c.im

                  @GossiTheDog @klefstadmyr was interviewed many times in my career and NOT ONCE was I quoted accurately or without sensationalism. #NothingToSeeHere

                  klefstadmyr@social.vivaldi.netK This user is from outside of this forum
                  klefstadmyr@social.vivaldi.netK This user is from outside of this forum
                  klefstadmyr@social.vivaldi.net
                  wrote last edited by
                  #23

                  @meltedcheese @GossiTheDog Good point.

                  1 Reply Last reply
                  0
                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                    lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought 🤣 https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect

                    ferricoxide@blahaj.zoneF This user is from outside of this forum
                    ferricoxide@blahaj.zoneF This user is from outside of this forum
                    ferricoxide@blahaj.zone
                    wrote last edited by
                    #24

                    @GossiTheDog@cyberplace.social

                    New "quoting" method:

                    <PERSON> would have said "<THINGS>" had we asked them and not used AI to extract a likely statement from their other writings and other works that our AI scraped.
                    ?

                    1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought 🤣 https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect

                      diami03@infosec.exchangeD This user is from outside of this forum
                      diami03@infosec.exchangeD This user is from outside of this forum
                      diami03@infosec.exchange
                      wrote last edited by
                      #25

                      @GossiTheDog Curious....what do you do in this situation?

                      1 Reply Last reply
                      0
                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                        lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought 🤣 https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect

                        ralph@hear-me.socialR This user is from outside of this forum
                        ralph@hear-me.socialR This user is from outside of this forum
                        ralph@hear-me.social
                        wrote last edited by
                        #26

                        @GossiTheDog

                        #alttext

                        techbuzz.ai the tech buzz.
                        "BEC attacks are incredibly effective because they don't require sophisticated malware or zero-day exploits," says cybersecurity researcher Kevin Beaumont. "They exploit the weakest link - human decision-making under time pressure. A single compromised email account can yield millions if the attacker times it right."

                        1 Reply Last reply
                        0
                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                          lol of the day - noticed I’m quoted in this article, but I never spoke to the publication and the quotes are made up. They use GenAI during article creation and just made up what I thought 🤣 https://www.techbuzz.ai/articles/hacker-siphons-700k-from-u-k-energy-firm-in-payment-redirect

                          cosvak@mastodon.worldC This user is from outside of this forum
                          cosvak@mastodon.worldC This user is from outside of this forum
                          cosvak@mastodon.world
                          wrote last edited by
                          #27

                          @GossiTheDog first that actor from the live action One Piece show, now you?

                          1 Reply Last reply
                          0
                          • R relay@relay.mycrowd.ca shared this topic
                            em0nm4stodon@infosec.exchangeE em0nm4stodon@infosec.exchange shared this topic
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups