The Wednesday Bit is still on holiday! A couple of weeks back, whilst walking in Scotland, I got involved with a prospective client in a discussion about the benefits of our cyber security stack and in particular our Security Operations Centre. The discussion was not about “how much” but what …
The Phishing Email and AI (pt. 3)
I have used the first two parts of this mini-series on Phishing attacks to look at the more general subject of social engineering because phishing is an application of social engineering aimed at you and your organisation. Start to understand the “how” of social engineering and you start to build …
This is where I was yesterday…
7th Intl. Conference on Big Data, Cybersecurity & Artificial Intelligence Held in the spectacular main Lecture theatre on Edinburgh Napier University’s Craiglockhart Campus. The photo is of Professor Bill Buchanan’s opening keynote talk about AI and us. In between looking at how ChatGPT words can be found in university submitted …
How to deceive an LLM AI
Bruse Schneier has an excellent article on how large language model AIs are being maliciously manipulated because of an old-style vulnerability being exploited. AT&T was probably the first organisation hit by such an attack that exploits systems that use the same channel for both data and commands. Back in the …
Includes “AI” for your convenience!
I have lost track of the number of services that I am being offered include “AI” to make them better, more helpful, intuitive, etc., etc., etc.. Even my Microsoft 365 for Business comes with AI interfering, sorry helping at every turn. But what happens when the threat actors get their …