#AIThreats

nemoโ„ข ๐Ÿ‡บ๐Ÿ‡ฆnemo@mas.to
2025-06-23

The 2025 Doomsday Clock ticks closer to midnight: now at 89 secondsโ€”the closest ever. Nuclear risks, climate change, pandemics, & AI threats push humanity to the brink. Urgent global action is needed to avoid catastrophe. โฐ๐ŸŒโ˜ข๏ธ #DoomsdayClock #ClimateCrisis #NuclearRisk #AIThreats Read more: thebulletin.org/doomsday-clock
#newz

Annexus Technologiesannexustechologies
2025-06-19

New Cato CTRLโ„ข research reveals WormGPT variants powered by Grok and Mixtralโ€”uncensored AI tools fueling cyberattacks. Threat actors use prompt hacks to bypass safeguards. Key insights to boost your security and SASE strategy.

catonetworks.com/blog/cato-ctr

2025-06-17

TechNadu interviewed John DiLullo, Deepwatch's CEO, to gain expert insights about the AI-driven adversaries and insider risks, asking for a re-evaluation of traditional defenses and digital resilience.

Dilullo discussed how Managed Detection and Response (MDR) is the answer to the problems faced by targeted companies that are struggling despite spending on security.

He expressed concern over threat actors persistently targeting the human element to profit from their errors and accessing confidential data.

He shed light on the following:

๐Ÿ‘โ€๐Ÿ—จThe silver bullet solution that is Managed Detection and Response for cyber resilience
๐Ÿ‘โ€๐Ÿ—จThe staggering number of malware detected daily and the growing number of security tools
๐Ÿ‘โ€๐Ÿ—จTackling business risk arising from challenges faced during communicating cyber risk to the Board

๐Ÿ”—Read the full interview: technadu.com/data-stewardship-

๐Ÿ”” ๐Ÿ‘‰ Follow @technadu for more Expert Insights and share your views in the comments below:

#MDR #HumanError #InsiderThreats #CEO #Cybersecurity #AIThreats #DataSecurity #CyberResilience #Interviews #ThoughtLeader

John DiLullo CEO Deepwatch
Jason Elrod :cupofcoffee: :donor:jasonelrod@infosec.exchange
2025-06-11

โ˜• Morning Latte of Evil - where I scan the dangerous corners of cybersecurity.

Todayโ€™s threats on my mind:
๐Ÿงจ Quantum decryption event horizons
๐Ÿ—ฃ๏ธ Real-time deepfake voice/video
๐Ÿ•ต๏ธ Privacy โ‰  anonymity
๐Ÿค– AI as friend, foe, & co-worker

#Cybersecurity #AIThreats #QuantumSecurity

Morning ritual setup: firepit, sunglasses, and coffee mug at sunriseโ€”quiet strategy time
Geekoogeekoo
2025-06-09

State hackers from Russia and China used ChatGPT to craft malware, evade detection, and automate cyber ops. AI is now part of the cyber battlefield.

geekoo.news/nation-state-hacke

Straikerstraikerai
2025-06-05

๐’๐ž๐œ๐ฎ๐ซ๐ข๐ง๐  ๐€๐ˆ ๐š๐ญ ๐’๐ฉ๐ž๐ž๐: ๐‚๐ˆ/๐‚๐ƒ, ๐‘๐ฎ๐ง๐ญ๐ข๐ฆ๐ž ๐ƒ๐จ๐œ๐ฌ, ๐š๐ง๐ ๐Œ๐จ๐ซ๐ž โšก๏ธ

straiker.ai/blog/shift-ai-risk

Straikerstraikerai
2025-06-05

๐‚๐จ๐Ÿ๐Ÿ๐ž๐ž. ๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค๐ข๐ง๐ . ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ง๐  ๐ฎ๐ง๐ฉ๐ซ๐ž๐๐ข๐œ๐ญ๐š๐›๐ฅ๐ž ๐›๐ž๐ก๐š๐ฏ๐ข๐จ๐ซ๐ฌ ๐ข๐ง ๐š๐ ๐ž๐ง๐ญ๐ข๐œ ๐ฌ๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ.

RSVP here:
lu.ma/kemttz2l

June 24 | 8am | Chicago

=

nickbalancomnickbalancom
2025-06-03

Day 10/10: Cyber AI Defense Checklist for Developers

Top 10 moves to make your web development safer:

This 10-day series has covered how to:
โ€ข Prevent prompt injection in your forms
โ€ข Catch fake users powered by LLMs
โ€ข Lock down AI tools, features, and webhooks
โ€ข Review every AI-generated line of code
โ€ข Build a real AI policy for your team

Build smarter. Defend sharper.
Follow @nickbalancom for future-proof security insights.

nickbalancomnickbalancom
2025-05-30

Day 8/10: Your AI Feature Is Also a Backdoor

โ€ข Limit who can access your AI tools
โ€ข Log everything the LLM sees + says
โ€ข Hide system prompts from users

AI isnโ€™t just smart โ€” itโ€™s a surface.
Follow @nickbalancom to build and protect.

nickbalancomnickbalancom
2025-05-29

Day 7/10: Webhooks = silent risk.

In this episode:
โ€ข What a webhook really is (and why bots love them)
โ€ข How attackers fake or flood webhook messages
โ€ข How to protect with secrets, and monitoring

Guard the door you didnโ€™t realize was open.
Follow @nickbalancom for simple, sharp security.

Straikerstraikerai
2025-05-29

๐Ÿธ๐Ÿถ+ ๐™ฐ๐™ธ ๐šŒ๐š‘๐šŠ๐š๐š‹๐š˜๐š๐šœ ๐šŒ๐š˜๐šž๐š•๐š๐š—โ€™๐š ๐š‘๐š˜๐š•๐š ๐š๐š‘๐šŽ ๐š•๐š’๐š—๐šŽ โ€” prompt injections slipped through in what we're calling the Yearbook Attack.

straiker.ai/blog/weaponizing-w

nickbalancomnickbalancom
2025-05-28

Day 6/10: Smarter Bots Need Smarter Signups
AI fakes are fast โ€” and your old signup flow wonโ€™t catch them.

โ€ข Track how people type + click
โ€ข Add friction where risk increases
โ€ข Use AI to catch AI-generated spam

Follow @nickbalancom for human-first security.

2025-05-28

๐Ÿšจ Cybercriminals are exploiting AI hype with fake social media ads for video tools like "Luma AI"โ€”but they deliver #malware instead. Stay sharp, donโ€™t click! ๐Ÿ›ก๏ธ #AIThreats ๐Ÿง 

go.theregister.com/feed/www.th

nickbalancomnickbalancom
2025-05-27

Day 5/10: Stop the Bots: Protect Your Websiteโ€™s Info
AI bots donโ€™t ask. They take.

โ€ข Use rate limits + CAPTCHAs
โ€ข Detect traffic that acts like a script
โ€ข Clean hidden data from your site

Your content is valuable. Donโ€™t give it away.
Follow @nickbalancom for real-world security.

The Internet is Cracktheinternetiscrack
2025-05-26
nickbalancomnickbalancom
2025-05-25

Day 4/10: Stop AI-Powered Account Takeovers
Your login page is where the AI attacks start.

โ€ข Use passkeys or app-based 2FA
โ€ข Block reused passwords
โ€ข Spot weird login behavior early

Strong systems start at sign-in.
Follow @nickbalancom for smarter security, day by day.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst