Forwarded from Tech Nerd (Tech Nerd)
“Comparison is the thief of joy” is advice for people already in motion … not for those who haven’t started
@selfmadecoder
@selfmadecoder
🔥12❤2⚡1
whaaaat an actual fuck is this man 😢🤯🤯 like those ai chatbot and agent companies should really test their agents especially their RAG pipeline
i was just chatting wiz one chatbot and suddenly i got an idea to test it and when i does boom this happened, it reveals its code base with snippets lol :)
sorry for the image quality btw
@AfroSec
i was just chatting wiz one chatbot and suddenly i got an idea to test it and when i does boom this happened, it reveals its code base with snippets lol :)
sorry for the image quality btw
@AfroSec
🤯6👏2👀1
Forwarded from Sirack's Universe
Anthropic's Claude Code Security Wipes Billions Off Cybersecurity Stocks in a Single Afternoon | Awesome Agents
https://awesomeagents.ai/news/claude-code-security-cybersecurity-stocks-crash/
https://awesomeagents.ai/news/claude-code-security-cybersecurity-stocks-crash/
Awesome Agents
Anthropic's Claude Code Security Wipes Billions Off Cybersecurity Stocks in a Single Afternoon
Anthropic announced Claude Code Security, an AI tool that found 500+ vulnerabilities missed for decades in open-source code. Within hours, JFrog lost 25%, CrowdStrike dropped 8%, and the cybersecurity ETF hit its lowest since November 2023.
👀3😭1
Forwarded from Florida🛸
Machine Learning Augmented Attacks
Recent threat reporting shows malicious actors are actively using AI as a force multiplier for offensive operations.
The interesting part isn’t that AI can generate code(i mean we already knew that)
The real shift is:
-Polymorphic Malware: rapid generation of variants to evade signature-based detection.
-Linguistic Smoothing: low skill actors are now bypassing "broken English" red flags in phishing.
-Condensed Attack Cycles: Reconnaissance and profiling that took days now take minutes.
🔴For Security & Red Teams
Focus less on what is generated,and more on how fast and how often:-
1.Content Velocity: abnormal speeds in phishing deployment.
2. LLM Wrappers: malicious use of open-source models in botnets.
3. Linguistic Patterns: Fluency ≠ legitimacy
4.Adaptive Payload Mutation: watch for rapid iteration patterns rather than static signatures.
AI is now part of both the exploit chain and the defense stack,the advantage won’t belong to whoever “uses AI”,it will belong to whoever understands how it changes execution speed.
Recent threat reporting shows malicious actors are actively using AI as a force multiplier for offensive operations.
The interesting part isn’t that AI can generate code(i mean we already knew that)
The real shift is:
-Polymorphic Malware: rapid generation of variants to evade signature-based detection.
-Linguistic Smoothing: low skill actors are now bypassing "broken English" red flags in phishing.
-Condensed Attack Cycles: Reconnaissance and profiling that took days now take minutes.
🔴For Security & Red Teams
Focus less on what is generated,and more on how fast and how often:-
1.Content Velocity: abnormal speeds in phishing deployment.
2. LLM Wrappers: malicious use of open-source models in botnets.
3. Linguistic Patterns: Fluency ≠ legitimacy
4.Adaptive Payload Mutation: watch for rapid iteration patterns rather than static signatures.
AI is now part of both the exploit chain and the defense stack,the advantage won’t belong to whoever “uses AI”,it will belong to whoever understands how it changes execution speed.
🔥3👌2
Forwarded from Ge'ez Tech® ግዕዝ ቴክ
#RandomThought
The Cyber sec Community here on telegram is not that active and known, so why dont we support each other and how many Enthusiast alu milewun lemasayet asbealewu so personal channel'm hone big channel sharing about cyber sec, ena if you want me to mention it here, send me your channel link @geez2012bot and i will check it ena if it looks helpful i will forward some posts from it, bezawu entewaweqalen.
tinish neger bihonm, let me support be aqme biye newu. Maqachewunm i will share some.
@geeztechgroup @geezsecurity #geeztech
The Cyber sec Community here on telegram is not that active and known, so why dont we support each other and how many Enthusiast alu milewun lemasayet asbealewu so personal channel'm hone big channel sharing about cyber sec, ena if you want me to mention it here, send me your channel link @geez2012bot and i will check it ena if it looks helpful i will forward some posts from it, bezawu entewaweqalen.
tinish neger bihonm, let me support be aqme biye newu. Maqachewunm i will share some.
@geeztechgroup @geezsecurity #geeztech
❤5
Forwarded from INSA Cyber Talent Center
በጉጉት ሲጠበቅ የነበረዉ የNathan Hailu Interview ዛሬ ማታ 2:00 LT በቀጥታ እዚዉ ቻናል ላይ ይጠብቁን 🔴 LIVE TONIGHT – 2:00 LT
Interview with Natan Hailu
Co-Founder @ GeezSecurity | HTB Certified Penetration Tester 🔐
Cybersecurity • Ethical Hacking • Bug Hunting
📍 t.me/insactc
Don’t miss it 🚀
#LiveTonight #CyberSecurity
Interview with Natan Hailu
Co-Founder @ GeezSecurity | HTB Certified Penetration Tester 🔐
Cybersecurity • Ethical Hacking • Bug Hunting
📍 t.me/insactc
Don’t miss it 🚀
#LiveTonight #CyberSecurity
👍3