🌉 bridged from https://infosec.exchange/@grecs on the fediverse by https://fed.brid.gy/
"Large language models work the same way as a carnival psychic. Chatbots look smart by the Barnum Effect — which is where you read what’s actually a generic statement about people […]
"Large language models work the same way as a carnival psychic. Chatbots look smart by the Barnum Effect — which is where you read what’s actually a generic statement about people […]
The bag of tricks includes a bunch of command line tools like cut, sort […]
The bag of tricks includes a bunch of command line tools like cut, sort […]
"We recently accelerated this work on our product roadmap after identifying threat intelligence involving leaked credentials from other […]
"We recently accelerated this work on our product roadmap after identifying threat intelligence involving leaked credentials from other […]
https://tisiphone.net/2025/04/01/lesley-what-happened-to-the-cybersecurity-skills-shortage/
I'm sorry.
https://tisiphone.net/2025/04/01/lesley-what-happened-to-the-cybersecurity-skills-shortage/
I'm sorry.
Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a Disney employee's mishap with an AI tool that led to a significant hack, vulnerabilities in VMware ESX […]
Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a Disney employee's mishap with an AI tool that led to a significant hack, vulnerabilities in VMware ESX […]
Charity infosec D&D steam
But it’s Kevin, Brian, Alyssa, Tarah, Deviant, and Patrick
And they have to rob a museum.
Charity infosec D&D steam
But it’s Kevin, Brian, Alyssa, Tarah, Deviant, and Patrick
And they have to rob a museum.
Microsoft Plans to Kill Skype, but Did It Ever Truly Live? […]
Microsoft Plans to Kill Skype, but Did It Ever Truly Live? […]
Me: “Ok”
Me: “Ok”
I'm still confident I've found the problem, but now I have a better appreciation for how drive spotlight indexing can also eat up a lot of […]
I'm still confident I've found the problem, but now I have a better appreciation for how drive spotlight indexing can also eat up a lot of […]
Become a Patreon supporter of the show here: Links:
https://defensivesecurity.org/defensive-security-podcast-episode-297/
Become a Patreon supporter of the show here: Links:
https://defensivesecurity.org/defensive-security-podcast-episode-297/
https://defcon.social/@hotline/113930513720940297
https://defcon.social/@hotline/113930513720940297
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the alarming statistics surrounding ransomware attacks, the implications of paying ransoms, and the evolving nature of […]
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the alarming statistics surrounding ransomware attacks, the implications of paying ransoms, and the evolving nature of […]
"On November 20, 2024, Shubham Shah and I discovered a security vulnerability in Subaru’s STARLINK connected vehicle service that gave us unrestricted targeted access to all vehicles and customer accounts […]
"On November 20, 2024, Shubham Shah and I discovered a security vulnerability in Subaru’s STARLINK connected vehicle service that gave us unrestricted targeted access to all vehicles and customer accounts […]