#GTIG

Kanenaskanenas_gr
2025-06-06

escalated from who are increasingly targeting in addition to the , as identified by the Threat Group ().

workers employ sophisticated tactics such as posing as legitimate remote workers, using fabricated identities, and engaging in extortion by threatening leak sensitive company information, including proprietary and like and government in

cloud.google.com/blog/topics/t

𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕kubikpixel@chaos.social
2025-02-03

🧵 …verdient Google evt. doch daran (unbemerkt) obwohl die es offiziell nicht unterstützen?!

«Hacker-Gruppen nutzen Googles KI Gemini für Aufklärung und Angriffsvorbereitung:
Staatlich geförderte Hackergruppen missbrauchen Googles KI-gestützten Assistenten Gemini, um potenzielle Angriffsziele zu erforschen.»

🪖 heise.de/news/Hacker-Gruppen-n

#ki #armee #militar #google #geminiai #gemini #hacking #hack #ai #gtig #iran #china

2025-01-30

Google Threat Intelligence Group (GTIG) report: “Adversarial Misuse of Generative AI” details how threat actors (ATP and IO actors) are attempting to misuse Google’s Gemini web application and if these efforts have created any novel or unique AI-enabled attack techniques.

High level results: At this time, AI can be useful to threat actors for performing common tasks like troubleshooting, research, learning/training, and content generation. GTIG is indicating they are NOT seeing new or novel capabilities being created by threat actor activities with AI.

“Rather than enabling disruptive change, generative AI allows threat actors to move faster and at higher volume. For skilled actors, generative AI tools provide a helpful framework” … “For less skilled actors, they also provide a learning and productivity tool, enabling them to more quickly develop tools and incorporate existing techniques.”

DL report (PDF) here: services.google.com/fh/files/m

#AI #cybersecurity #Google #GTIG #LLMs #hackers #GenAI #Gemini

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst