#AIsec

It will unify finding the bugs, fixing the bugs, testing the bugs, exploiting the bugs, writing the bugs in the first place, slipping the bug into a competitor CI/CD wait am I still talking out loud?

securityweek.com/aistrike-rais

#aisec

2026-01-20

#OWASP #Ottawa would like to acknowledge the gracious support from Software Secured for our January Meetup. Their support for the Ottawa Security community through our chapter brings helps us all to skill up.

www.softwaresecured.com

#AppSec #infosec #aisec

2025-11-20

⚠️ Most breaches don’t require genius — just opportunity.

Attackers don’t need zero-days. They exploit what’s already exposed:
• Default creds still active
• Config drift no one monitors
• Cloud misconfigs after updates
• APIs exposed by accident

We’re building autonomous agents to close those gaps 24/7 at HACKTIVATE LABS.

The Reality:
Most orgs don’t need more security staff —
they need faster decision loops.
Executed by agents that never sleep.

What we’re testing now:
🧠 AI agents that shape the threat surface in real time
🛰️ Pre-attack recon using live intel feeds
⚔️ Automated red team prep using CVE correlation
🔄 Defense loops that execute without human approval

The goal isn’t alerts.
The goal is autonomous containment.

💬 If you’re building in #AIsec, #Cybersecurity, or #DevSecOps — let’s align.
Tag your team or @mention someone who should see this.

#Automation #RedTeam #AISecurity #SOC #NetOps #SecurityFuture #AIagents

2025-11-20

RE: infosec.exchange/@Hacktivate/1

⚠️ Most breaches don’t require genius — just opportunity.

Here’s what attackers actually exploit:
• Default creds still active
• Config drift no one monitors
• Cloud misconfigs after updates
• APIs exposed by accident

We’re building autonomous agents to close those gaps 24/7.

If you’re in #Cybersecurity #AIsec or #DevSecOps — let’s talk.
Tag a team that needs this operational.

#Automation #RedTeam #AISecurity #SOC #NetOps

2025-11-20

⚠️ Most breaches don’t require genius — just opportunity.

Here’s what attackers actually exploit:
• Default creds still active
• Config drift no one monitors
• Cloud misconfigs after updates
• APIs exposed by accident

We’re building autonomous agents to close those gaps 24/7.

If you’re in #Cybersecurity #AIsec or #DevSecOps — let’s talk.
Tag a team that needs this operational.

#Automation #RedTeam #AISecurity #SOC #NetOps

2025-11-20

🧠 AI + Security Automation — What do you want first?

Which agent should I open-source next?

🔘 Prompt injection defender
🔘 CVE → exploit correlator
🔘 Smart contract auditor
🔘 Recon bot for OSINT / endpoints

Vote, @mention, or drop your own idea.
I’ll build what the ecosystem needs.

#AIsec #Cybersecurity #Automation #Builders

2025-11-20

RE: infosec.exchange/@Hacktivate/1

⚡ 3 Fast Checks Every Network Should Run Today

1️⃣ Unknown devices on VLANs?
2️⃣ Unused open ports pre-attack?
3️⃣ Default creds still active anywhere?

You don’t need a full audit — just a disciplined recon loop.

AI + automation makes this continuous.

#Cybersecurity #AIsec #NetOps #DevSecOps
Want micro playbooks or scripts? @mention me.

2025-11-20

🛰️ HACKTIVATE LABS // Current Ops

Actively building:
🔹 AI ReconX – adversarial AI + prompt security scanner
🔹 NetMapper – network discovery & visual intel
🔹 RedOrch – automated red team ops & reporting
🔹 LoRaMonitor – secure LoRaWAN mesh analytics

Testing fusion models: AI + Offensive Security.
If you’re building in #AIsec, #redteam, #DeFiSecurity, @mention me — let’s align signals.

More drops coming. Stay operational. ⚔️

2025-11-20

RE: infosec.exchange/@Hacktivate/1

🛰️ HACKTIVATE LABS // Current Ops

Actively building:
🔹 AI ReconX – adversarial AI + prompt security scanner
🔹 NetMapper – network discovery & visual intel
🔹 RedOrch – automated red team ops & reporting
🔹 LoRaMonitor – secure LoRaWAN mesh analytics

Testing fusion models: AI + Offensive Security.
If you’re building in #AIsec, #redteam, #DeFiSecurity, @mention me — let’s align signals.

More drops coming. Stay operational. ⚔️

2025-11-19

#Agentic #AI and #MCP servers are all the rage right now. Vendors are racing to add MCP servers to their stacks and reassure their customers that they are secure. Okay, but are they safe to use? Our latest blog digs in. #cybersecurity #security #aisec ironcorelabs.com/blog/2025/mcp

Patrick Walshzmre
2025-10-22

I'm looking forward to attending this one. Added some new exploit demos showing how servers can go wrong, too.
infosec.exchange/@ironcore/115

2025-10-22

The lineup of talks and speakers at this year's #LASCon in #Austin looks fantastic. Our own @zmre will be there talking on Friday on the Hidden Risks of Integrating AI. Drop in and say hello! #aisec lascon.org/schedule/

2025-10-22

Our #defcon 33 talk is now available: Exploiting Shadow Data in AI Models and Embeddings (demos included). Enjoy! #aisec #security youtube.com/watch?v=O7BI4jfEFwA

Mario Pacchiarottijimjams@mastodon.art
2025-08-27

Non è più il mio lavoro e ne ho la nausea, quindi è escluso che lo faccia per hobby, ma se siete nella sicurezza informatica e non state studiando come matti tutto il mondo dei prompt e robaccia intorno, siete spacciati.

#aisec #aisecurity #promptinjection

secsolutionsecsolution
2025-07-08

La sicurezza aziendale nel 2025: previsioni e trend futuri: Il 2025, finora, ha rappresentato, e continuera’ a rappresentare nei prossimi mesi, un anno cruciale per la sicurezza aziendale, con sfide che hanno richiesto approcci...
dlvr.it/TLncft

Hack in Days of Future Pastallainyann@piaille.fr
2025-06-27

You had a good run, pentesters...
So apparently, @xbow — an AI — claims it topped @hackerone No burnout. No caffeine. No Twitter rants about payload encoding. Just pure, scalable exploitation.
It doesn’t even need a hoodie.
While you’re debugging payloads in staging, it’s farming triage points in prod like it’s Doom on God Mode.
Even if it's only half true… what are you doing with your career?
Maybe it's time to pivot. Maybe start offering “human context review” as a service?
We used to joke about Clippy becoming self-aware. Now Clippy does lateral movement and submits reports while you sleep.
#infosec #bugbounty #AIsec #pentest xbow.com/blog/top-1-how-xbow-d

secsolutionsecsolution
2025-06-06

La sicurezza aziendale nel 2025: previsioni e trend futuri: di Ufficio Stampa AISEC Il 2025, finora, ha rappresentato e continuera' a rappresentare nei prossimi mesi un anno cruciale per la sicurezza aziendale, con sfide che hanno richiesto approcci integrati ed innovativi. Attraverso una combinazione di tecnologie all'avanguardia, gestione strategica dei...
dlvr.it/TLC1bS

Slim Bill (He/Him)wjmalik@noc.social
2022-12-28

Spoke with a client who believes that AI will catch half of all computer security breaches in the future. That's wasteful. Here's why:
A mature solution should not just trap the breach, but it should also generate the appropriate use case so automation will catch any recurrences. That's what a CMMi level 3 organization will do; AI shouldn't regress the organization.
AI will catch about 5 percent of all security breaches. 95 percent will be caught by less resource-intensive technologies.
#aisec

Zate 🦘🇦🇺zate@infosec.exchange
2022-11-27

Listening to a book on #AI and they just said something to the tune of

Just as malware and spam have been reduced to merely occasional incidents, in the future, subversion of #AI will be rare.

Almost spat out my drink.

#aisec #fuckaroundandfindout #nothowthisworks

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst