Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

aristot73@infosec.exchangeA

aristot73@infosec.exchange

@aristot73@infosec.exchange
About
Posts
39
Topics
16
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • Yesterday I attended the first Democratic Tech Alliance (DTA) Assembly over at the European Parliament.
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @bert_hubert thanks for the writeup! I sincerely hope such a politically broad grouping can survive 🤞

    Uncategorized

  • "the [Microsoft] harness does the work, and the [other people's] model is one input."
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    "the [Microsoft] harness does the work, and the [other people's] model is one input." 🙃

    "Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark"
    By Taesoo Kim, Vice President, Agentic Security, Microsoft. 12 May 2026

    Link Preview Image
    Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark | Microsoft Security Blog

    Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH).

    favicon

    Microsoft Security Blog (www.microsoft.com)

    Uncategorized

  • Yesterday I attended the first Democratic Tech Alliance (DTA) Assembly over at the European Parliament.
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @bert_hubert link (pdf) to the JRC report "Open but Not Powerless: Towards a Common Understanding of EU Digital Sovereignty"

    https://publications.jrc.ec.europa.eu/repository/bitstream/JRC144908/JRC144908_01.pdf

    Uncategorized

  • This post did not contain any content.
    aristot73@infosec.exchangeA aristot73@infosec.exchange
    This post did not contain any content.
    Uncategorized

  • When you hear people abandoning Open Source because of the AI exploit threat, ask them if we should keep our laws secret as well.
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @buherator @icing so far I've come across two examples, one being the UK NHS. know of any others?

    Uncategorized

  • The scarce input to the vulnerability ecosystem was human attention.
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    The scarce input to the vulnerability ecosystem was human attention. That input is no longer scarce.

    The structures built on attention scarcity — pricing, disclosure norms, triage infrastructure, investment models — are breaking or bending.

    The scarce input is now remediation capacity: the people, institutions, and processes that can turn a finding into a fix and get the fix deployed.

    Every economic and policy question in this space should be re-read with that substitution in mind.

    None of this requires haste or drama. It requires the steady, well-resourced execution of commitments governments have already made, and the discipline to resist both complacency and overreaction.

    Uncategorized

  • https://www.faz.net/premium/digitalwirtschaft/thomas-dullien-zu-anthropics-mythos-software-war-nie-auf-perfekte-sicherheit-ausgelegt-das-raecht-sich-accg-200822228.html
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @HalvarFlake "The Wreckoning"

    Uncategorized

  • here we arehope you brought a helmet
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @Viss the "wreckoning"

    Uncategorized

  • I like the Register's headline: "Anthropic’s bug-hunting Mythos was greatest marketing stunt ever, says cURL creator"
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @bagder "you're right to push back on that. let me rephrase..." 🙂

    Uncategorized

  • Automation or Innovation?
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @meartur fully agree! there must be a measurable "return" to justify any, even negligible, investment.

    The best source i could find on the attacker perspective on this issue was the paper below.

    According to the the paper, attackers will squeeze all the juice out of a working exploit before looking for a new one. Attackers will keep "harvesting" the same field (subset of software) as long as it remains fertile (i love analogies 🙂).

    This was pre-LLM. We may have to wait for some empirical evidence...on modern farming practices.

    Allodi, L., Massacci, F. and Williams, J. (2022), "The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures."

    Checking your browser - reCAPTCHA

    favicon

    (pmc.ncbi.nlm.nih.gov)

    Uncategorized

  • Dance like nobody's watching,
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    Dance like nobody's watching,

    Code like every LLM is.

    Uncategorized

  • Automation or Innovation?
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    ☝️ @meartur

    Uncategorized

  • Automation or Innovation?
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    Automation or Innovation?

    Absorption or Containment?

    "Does AI-assisted vulnerability discovery represent a categorical innovation in offensive cyber capability — a new class of finding previously unreachable by any combination of human and tool — or does it represent the automation and scaling of methods that already existed in the security-research repertoire?

    The policy responses appropriate to each framing diverge sharply."

    https://codeberg.org/tzafaar/Buffers_overflow_into_policy/src/branch/main/briefing%20notes/innovation-or-automation-v5.md

    Uncategorized

  • #Mythos finds a #curl vulnerability
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @bagder spectacular result! Huge congratulations to the entire team! Made my day 🙂

    Uncategorized mythos curl

  • Hot take: Stop designing your websites with AI—it makes them look like your company is a CIA front or shell company.
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @fj I can neither confirm nor deny that I feel seen... 🙂

    Uncategorized

  • I‘m sure @bagder is already typing the toot/blog post about the avalanche of Mythos findings in #curl.
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @icing @bagder

    Uncategorized curl

  • I asked claude to check something.
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    I asked claude to check something. it did. I saved the result.

    I upload the result - again to claude - for a second pass. Hit the guard rail.

    2nd time today.

    Have no idea what's going on 🙂

    Uncategorized

  • The 3 recent Linux LPEs are sort of interesting in that each one took a different path from discovery to disclosure.
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @wdormann 😀

    Uncategorized

  • as @spaf very eloquently said in his recent blog: "Until the production process changes, the cleanup never ends."
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    RE: https://infosec.exchange/@cR0w/116534744285328166

    as @spaf very eloquently said in his recent blog: "Until the production process changes, the cleanup never ends."

    Uncategorized

  • Excited to announce that the @EUCommission has updated it's follow buttons on the website footer!
    aristot73@infosec.exchangeA aristot73@infosec.exchange

    @hpod16 share buttons next 🙂

    Uncategorized mastodon socialmedia europeancommiss
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups