Christina Lekati
banner
christinalekati.bsky.social
Christina Lekati
@christinalekati.bsky.social
#SocialEngineering, #Psychology, #HUMINT & #OSINT intertwined for the sake of security.
Report by Google (government-backed threat actor use of the Gemini): cloud.google.com/blog/topics/...
Adversarial Misuse of Generative AI | Google Cloud Blog
We share our findings on government-backed and information operations threat actor use of the Gemini web application.
cloud.google.com
August 4, 2025 at 10:11 AM
2 additional reports on how GenAI has been used in social engineering attacks. They provide a more holistic understanding on how these tools are being used by adversaries:

Report by Anthropic (Claude): www.anthropic.com/news/detecti...
Detecting and Countering Malicious Uses of Claude
Detecting and Countering Malicious Uses of Claude
www.anthropic.com
August 4, 2025 at 10:11 AM
🔹 I know that some of you in my network (and some of our clients) had to deal with the attacks documented. This will hit home.

🔹 Ultimately, we can use this report help us further improve our defense strategies with reality in mind.
August 4, 2025 at 10:11 AM
🔹 The operations described in the report help give us a better understanding of how threat actors are *realistically* trying to abuse GenAI models. No guesses, no fancy assumptions, just the observed TTPs.
August 4, 2025 at 10:11 AM
Always fun hanging out with you @cyber.coffee! 🙌🏻
June 17, 2025 at 11:37 AM
Note: HUMINT in CTI is not meant to replace the technical analysis, but to complement it. It fills in gaps with intel that cannot be found through the technical analysis or other passive intel disciplines - e.g. motives, future targets, skill/group developments, future plans, etc
May 2, 2025 at 4:00 PM
Class Details & Registration:
www.x33fcon.com?fbclid=IwAR2...
x33fcon
www.x33fcon.com
March 31, 2025 at 3:13 PM
...and of course:

🔹 Blue Team Countermeasures: How to disrupt social engineering attacks & create a defense strategy.

...but there will also be some surprises 🤫 ✨ ✨

If you're attending #x33fcon this year I look forward to seeing you there! 👋🏻
x33fcon
www.x33fcon.com
March 31, 2025 at 3:13 PM
🔹 The use of AI in all phases of the social engineering kill-chain.

🔹 OSINT: How to conduct reconnaissance on a target (business / person) and what to look for.

🔹 Highly practical open-source intelligence (OSINT) tools & techniques that facilitate attack scenarios.
March 31, 2025 at 3:13 PM
We will cover:

🔹 Timeless Social Engineering Attack Scenarios: The tricks that keep working (and why).

🔹 The Psychology behind social engineering (we will go well beyond influence tactics!!)

🔹 Hybrid & advanced attack techniques that combine multiple attack verticals.
March 31, 2025 at 3:13 PM
Sure, there is no perfect OPSEC, and there is no perfect intelligence department. However, that a pretty major error and we can all learn from it.
March 25, 2025 at 6:05 PM
🔹️ The fact that experienced, OPSEC-aware, national-security leaders in this administration don't act with security in mind, which we can assume happens in more than one ways. Even on such a fundamental level.
March 25, 2025 at 6:05 PM
Overall, this report is worth a read. If you are interested in the topic don't forget to check out the referenced resources within the report
January 28, 2025 at 3:17 PM