fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.7K
active users

#aisecurity

9 posts9 participants0 posts today
knoppix<p>Microsoft paid a record $17M to 344 security researchers across 59 countries over the past year 🛡️💰<br>1,469 valid reports helped fix 1,000+ security flaws across Windows, Azure, Xbox, 365 &amp; more.<br>Highest single bounty: $200K.</p><p>AI &amp; identity systems now see expanded bounty scopes.</p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@serghei" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>serghei</span></a></span> <br><span class="h-card" translate="no"><a href="https://infosec.exchange/@BleepingComputer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BleepingComputer</span></a></span> </p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-pays-record-17-million-in-bounties-over-the-last-12-months/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-pays-record-17-million-in-bounties-over-the-last-12-months/</span></a></p><p><a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Bug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bug</span></a> <a href="https://mastodon.social/tags/Bugs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bugs</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://mastodon.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.social/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a> <a href="https://mastodon.social/tags/Xbox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xbox</span></a> <a href="https://mastodon.social/tags/M365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>M365</span></a> <a href="https://mastodon.social/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a></p>
Wulfy<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@dangoodin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dangoodin</span></a></span> </p><p>Weird thing I observed in <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a><br>There is an incredible amount of disinterest/contempt for <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> amongst many practitioners.</p><p>This contempt extends to willful ignorance about the subject.<br>q.v. "stochastic parrots/bullshit machines" etc.</p><p>Which, in a field with hundreds of millions of users, strikes me as highly unprofessional. Just the other day I read a blog post by a renown hacker (and likely earned a mute/block) "Why I don't use AI and you should not too". </p><p>Connor Leahy, CEO of <a href="https://infosec.exchange/tags/conjecture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conjecture</span></a> is one of the few credible folks in the field. </p><p>But to the question at hand.<br>The prompts are superbly sanitised.<br>In part by design, in part due to the fact that you are not connecting to a database but to a multidimensional vector data structure.</p><p>The <a href="https://infosec.exchange/tags/prompt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prompt</span></a> is how you get in through the backdoor. Though I haven't looked into fuzzing, but I suspect because of the tech, the old <a href="https://infosec.exchange/tags/sqlinjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sqlinjection</span></a> tek and similar will not work.</p><p>Long story short; It is literally impossible to build a secure <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>. By the virtue of the tech.<br><a href="https://infosec.exchange/tags/promptengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>promptengineering</span></a> is the key to open the back door to the knowledge tree.</p><p>Then of course there are local models you can train on your own datasets. Including a stack of your old <a href="https://infosec.exchange/tags/2600magazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2600magazine</span></a> </p><p><a href="https://infosec.exchange/tags/hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hack</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a> <a href="https://infosec.exchange/tags/aisafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisafety</span></a></p>
Hackread.com<p>A new attack called <a href="https://mstdn.social/tags/Promptware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Promptware</span></a> uses a Google Calendar invite to hijack a user's Gemini AI, allowing access to personal data and even smart home controls.</p><p>Read: <a href="https://hackread.com/promptware-attack-hijack-gemini-ai-google-calendar-invite/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/promptware-attack</span><span class="invisible">-hijack-gemini-ai-google-calendar-invite/</span></a></p><p><a href="https://mstdn.social/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/Goolge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Goolge</span></a> <a href="https://mstdn.social/tags/GeminiAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GeminiAI</span></a></p>
Winbuzzer<p>ChatGPT Flaw Allows Zero-Click Data Theft From Google Drive via ‘Poisoned’ Documents</p><p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a> <a href="https://mastodon.social/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatGPT</span></a> <a href="https://mastodon.social/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a> <a href="https://mastodon.social/tags/GoogleDrive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleDrive</span></a> <a href="https://mastodon.social/tags/GoogleWorkspace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleWorkspace</span></a> <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://mastodon.social/tags/Alphabet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Alphabet</span></a></p><p><a href="https://winbuzzer.com/2025/08/07/chatgpt-flaw-allows-zero-click-data-theft-from-google-drive-via-poisoned-documents-xcxwbn" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/08/07/chatg</span><span class="invisible">pt-flaw-allows-zero-click-data-theft-from-google-drive-via-poisoned-documents-xcxwbn</span></a></p>
OWASP Foundation<p>💥 3 Days. 4 Elite Trainings. Unlimited AppSec Growth.</p><p>Join us in Washington, D.C., Nov 3–5, 2025 for immersive, hands-on 3-day sessions at OWASP Global AppSec USA:<br>⚡ Threat Modeling with AI – Adam Shostack<br>⚡ AI Security for Developers – Jim Manico<br>⚡ Attacking &amp; Defending Cloud Apps – AWS, Azure, GCP<br>⚡ Full-Stack Pentesting Lab – 100% hands-on + lifetime access</p><p>Register: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a></p>
Winbuzzer<p>Microsoft’s ‘Agentic Web’ Ambition Hit by Embarrassing Security Flaw</p><p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/NLWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NLWeb</span></a> <a href="https://mastodon.social/tags/AgenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgenticAI</span></a> <a href="https://mastodon.social/tags/AIAgents" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIAgents</span></a> </p><p><a href="https://winbuzzer.com/2025/08/06/microsofts-agentic-web-ambition-hit-by-embarrassing-security-flaw-xcxwbn" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/08/06/micro</span><span class="invisible">softs-agentic-web-ambition-hit-by-embarrassing-security-flaw-xcxwbn</span></a></p>
Beth Pariseau<p>The beta release of Google's <a href="https://hachyderm.io/tags/GeminiCLI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GeminiCLI</span></a> for <a href="https://hachyderm.io/tags/GitHubActions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHubActions</span></a> is now available free to users with a Google AI Studio API key. </p><p>The news comes amid an ongoing flood of <a href="https://hachyderm.io/tags/codingagents" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>codingagents</span></a> from multiple vendors, and a mounting tide of concerns about their security and reliability following a set of high-profile incidents. <a href="https://hachyderm.io/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://hachyderm.io/tags/AIagents" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIagents</span></a> <a href="https://hachyderm.io/tags/AIcoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIcoding</span></a> <a href="https://hachyderm.io/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://www.techtarget.com/searchsoftwarequality/news/366628210/Google-adds-Gemini-CLI-for-GitHub-Actions-coding-agent" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techtarget.com/searchsoftwareq</span><span class="invisible">uality/news/366628210/Google-adds-Gemini-CLI-for-GitHub-Actions-coding-agent</span></a></p>
Winbuzzer<p>Project Ire: Microsoft Unveils Autonomous AI Malware Hunter</p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/ProjectIre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectIre</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.social/tags/AIAgents" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIAgents</span></a></p><p><a href="https://winbuzzer.com/2025/08/05/project-ire-microsoft-unveils-autonomous-ai-malware-hunter-xcxwbn" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/08/05/proje</span><span class="invisible">ct-ire-microsoft-unveils-autonomous-ai-malware-hunter-xcxwbn</span></a></p>
Doug Ortiz<p>The rise of AI-powered database interaction is changing the dev game! 🤯 </p><p>But, is the inherent lack of transparency in AI-generated SQL queries a ticking time bomb for security? </p><p>What measures should developers prioritize to ensure the reliability and safety of these systems?</p><p>Blog post: <a href="https://dougortiz.blogspot.com/2025/07/the-ai-database-interaction-paradox-why.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dougortiz.blogspot.com/2025/07</span><span class="invisible">/the-ai-database-interaction-paradox-why.html</span></a></p><p><a href="https://mastodon.social/tags/Aidrivendatabaseinteraction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aidrivendatabaseinteraction</span></a> <a href="https://mastodon.social/tags/ExplainableAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExplainableAI</span></a> <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.social/tags/DeepTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeepTech</span></a></p>

📢 OWASP Ottawa August 2025 Meetup 📢

OWASP Ottawa is back from our summer break! Join us in person at the University of Ottawa for our next OWASP Ottawa meetup on August 20, 2025, where we’ll dive into not one, but two timely and impactful talks at the intersection of cybersecurity, AI, and real-world application security.

📅 Date: August 20, 2025
⏰ Time: 6:00 PM EST – Arrival, setup & pizza 🍕
6:30 PM EST – Technical Talks
📍 Location: 150 Louis-Pasteur Private, University of Ottawa, Room 117

🎙️ Talk 1: "Doing More with Less: An Adaptive, Label-Efficient Approach to Fraud Detection from Day One" with Bahar Afshar
👥 Speaker: Bahar Afshar, Master’s in Computer Science candidate with specialization in AI at University of Ottawa
Discover an innovative approach on how to detect financial fraud using adaptive, label-efficient AI approaches, even when labeled, fraudulent data is scarce. A must-see for those in finance, security, and AI research.

🎙️ Talk 2: "Beyond APIs: MCP Security for AI Integrations" with Harsh Makwana
👥 Speaker: Harsh Makwana, M.Eng, Aplication Security Consultant at Software Secured
Model Context Protocol (MCP) is becoming the standard for LLM integration with external tools, but this increasingly fast adoption rate is coming at the cost of missed security challenges. Learn the security strategies necessary to build hardened AI agents.

📺 Can’t join in person? We’ll livestream on YouTube on our channel: youtube.com/@OWASP_Ottawa

🔗 RSVP now: meetup.com/owasp-ottawa/events

Come learn, network, and grab some pizza 🍕 with Ottawa’s cybersecurity community!
.
.
.
.
.
.
.
.
#OWASP #Ottawa #Cybersecurity #InfoSec #Networking #AI #AISecurity #FraudDetection #MachineLearning

We’re excited to welcome Simran Kaur to the BSides Vancouver Island 2025 speaker lineup! With over 15 years of experience in the IT industry, Simran is a force in cybersecurity and AI-driven innovation. Her expertise spans LLMOps, cloud security, risk management, and beyond all grounded in building secure, resilient systems. 🔐⚙️

This year, she’ll be taking us into the evolving world of AI security with her talk: “Navigating AI Security: Identifying Risks and Implementing Mitigations”. Get ready to explore the hidden vulnerabilities of AI systems and walk away with actionable insights to defend against emerging threats. 🧠⚠️

You won’t want to miss this one!
#BSidesVI2025 #victoriabc #vancouverisland #techconferencespeaker #artificialintelligence #Cybersecurity #AIsecurity