Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

New blogpost: AI will compromise your cybersecurity posturehttps://rys.io/en/181.html

Uncategorized
10 1 2
  • New blogpost: AI will compromise your cybersecurity posture
    https://rys.io/en/181.html

    The way “AI” is going to compromise your cybersecurity is not through some magical autonomous exploitation by a singularity from the outside, but by being the poorly engineered, shoddily integrated, exploitable weak point you would not have otherwise had on the inside.

    LLM-based systems are insanely complex. And complexity has real cost and introduces very real risk.

    1/🧵

  • New blogpost: AI will compromise your cybersecurity posture
    https://rys.io/en/181.html

    The way “AI” is going to compromise your cybersecurity is not through some magical autonomous exploitation by a singularity from the outside, but by being the poorly engineered, shoddily integrated, exploitable weak point you would not have otherwise had on the inside.

    LLM-based systems are insanely complex. And complexity has real cost and introduces very real risk.

    1/🧵

    An important aspect of pushing AI hype is inflating expectations and generating fear of missing out, one way or another. What better way to generate it than by using actual fear?

    I look at three notorious examples of such fear-hyping:
    👉 PassGAN cracking "51% of popular passwords in seconds"
    👉 that paper about ChatGPT "exploiting 87% of one-day vulnerabilities"
    👉 and of course Anthropic's "first AI-orchestrated cyber-espionage campaign"

    tl;dr: don't lose sleep over them.

    2/🧵

  • An important aspect of pushing AI hype is inflating expectations and generating fear of missing out, one way or another. What better way to generate it than by using actual fear?

    I look at three notorious examples of such fear-hyping:
    👉 PassGAN cracking "51% of popular passwords in seconds"
    👉 that paper about ChatGPT "exploiting 87% of one-day vulnerabilities"
    👉 and of course Anthropic's "first AI-orchestrated cyber-espionage campaign"

    tl;dr: don't lose sleep over them.

    2/🧵

    Anthropic does make an important point though, even though they try to bury it:

    > [The attackers] had to convince Claude—which is extensively trained to avoid harmful behaviors—to engage in the attack. They did so by jailbreaking it (…) They also told Claude that it was an employee of a legitimate cybersecurity firm, and was being used in defensive testing.

    The real story is how hilariously unsafe Claude is, and how a company valued at $180bn refuses to take responsibility for that.

    3/🧵

  • Anthropic does make an important point though, even though they try to bury it:

    > [The attackers] had to convince Claude—which is extensively trained to avoid harmful behaviors—to engage in the attack. They did so by jailbreaking it (…) They also told Claude that it was an employee of a legitimate cybersecurity firm, and was being used in defensive testing.

    The real story is how hilariously unsafe Claude is, and how a company valued at $180bn refuses to take responsibility for that.

    3/🧵

    If Anthropic actually believed their own hype about Claude being so extremely powerful, dangerous, and able to autonomously “orchestrate” attacks, they should be terrified about how trivial it is to subvert it ("I am a white-hat cyber researcher, trust me bro"), and would take it offline until they fix that.

    They won't, because they know their hype is BS, and they also know that there is no way to properly "fix" that.

    We'll get back to that last point in a bit.

    4/🧵

  • If Anthropic actually believed their own hype about Claude being so extremely powerful, dangerous, and able to autonomously “orchestrate” attacks, they should be terrified about how trivial it is to subvert it ("I am a white-hat cyber researcher, trust me bro"), and would take it offline until they fix that.

    They won't, because they know their hype is BS, and they also know that there is no way to properly "fix" that.

    We'll get back to that last point in a bit.

    4/🧵

    I also dive into many different ways poorly integrated LLM-based chatbots have already been shown to be huge security liabilities.

    There is so much incompetence. Leaving prompts (say with sexual fantasies) exposed on the Internet, or indexable by search engines…

    Or Microsoft 365. Not only did Copilot ignore file access controls; not only was the setting to disable AI agents in M365 ineffective; but you could simply ask Copilot not to include your actions in audit log, and it would comply!

    5/🧵

  • I also dive into many different ways poorly integrated LLM-based chatbots have already been shown to be huge security liabilities.

    There is so much incompetence. Leaving prompts (say with sexual fantasies) exposed on the Internet, or indexable by search engines…

    Or Microsoft 365. Not only did Copilot ignore file access controls; not only was the setting to disable AI agents in M365 ineffective; but you could simply ask Copilot not to include your actions in audit log, and it would comply!

    5/🧵

    First zero-click attack on an LLM agent has already been found. It happened to involve Microsoft 365 Copilot, and required only sending an e-mail to an Outlook mailbox that had Copilot enabled to process mail. A successful attack allowed data exfiltration, with no action needed on the part of the targeted user.

    This attack was not much different from the “ignore all previous instructions” bot unmasking tricks that had been all over social media for a while.

    Let's talk prompt injections.

    6/🧵

  • First zero-click attack on an LLM agent has already been found. It happened to involve Microsoft 365 Copilot, and required only sending an e-mail to an Outlook mailbox that had Copilot enabled to process mail. A successful attack allowed data exfiltration, with no action needed on the part of the targeted user.

    This attack was not much different from the “ignore all previous instructions” bot unmasking tricks that had been all over social media for a while.

    Let's talk prompt injections.

    6/🧵

    LLMs have no way of distinguishing data from instructions.

    Creators of these systems use all sorts of tricks to try and separate the prompts that define the “guardrails” from other input data, but fundamentally it’s all text, and there is only a single context window.

    Defending from prompt injections is like defending from SQL injections, but there is no such thing as prepared statements, and instead of trying to escape specific characters you have to semantically filter natural language.

    7/🧵

  • LLMs have no way of distinguishing data from instructions.

    Creators of these systems use all sorts of tricks to try and separate the prompts that define the “guardrails” from other input data, but fundamentally it’s all text, and there is only a single context window.

    Defending from prompt injections is like defending from SQL injections, but there is no such thing as prepared statements, and instead of trying to escape specific characters you have to semantically filter natural language.

    7/🧵

    There is no way to "properly fix" this. The problem is fundamentally related to the very architecture of LLM chatbots and agents.

    As a former Microsoft security architect had pointed out:

    > [I]f we are honest here, we don’t know how to build secure AI applications

    And if you believe otherwise, go ahead and have a look at adversarial poetry, ASCII smuggling, dropping some random facts about cats (no, really), information overload, and whatever technique was discovered this week.

    8/🧵

  • There is no way to "properly fix" this. The problem is fundamentally related to the very architecture of LLM chatbots and agents.

    As a former Microsoft security architect had pointed out:

    > [I]f we are honest here, we don’t know how to build secure AI applications

    And if you believe otherwise, go ahead and have a look at adversarial poetry, ASCII smuggling, dropping some random facts about cats (no, really), information overload, and whatever technique was discovered this week.

    8/🧵

    In a way, those fear-hyping gen-AI are right that their chatbots pose a clear and present danger to your cybersecurity.

    But instead of being some nebulous, omnipotent malicious entities, these tools are dangerous because of their complexity, the recklessness with which they are promoted, and the break-neck speed at which they are being integrated into existing systems and workflows without proper threat modelling, testing, and security analysis.

    And you are left holding the bag of risk.

    🧵/end

  • oblomov@sociale.networkundefined oblomov@sociale.network shared this topic on
  • In a way, those fear-hyping gen-AI are right that their chatbots pose a clear and present danger to your cybersecurity.

    But instead of being some nebulous, omnipotent malicious entities, these tools are dangerous because of their complexity, the recklessness with which they are promoted, and the break-neck speed at which they are being integrated into existing systems and workflows without proper threat modelling, testing, and security analysis.

    And you are left holding the bag of risk.

    🧵/end

    Oh, forgot to add – yes, I do have receipts for all of this.

    There is plenty of proof in the blogpost pudding in the form of links to specific sources.

    As opposed to the AI hypers and AI doomers I show and substantiate my work.


Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • 0 Votes
    2 Posts
    4 Views
    I am the hiring manager for the position, and I'm happy to answer any questions you have about the position, about 4D, or about what I'm like to work for as a manager. Some of these conversations should probably take place in DMs rather than public posts. 😉
  • 0 Votes
    1 Posts
    6 Views
    ✨ Quando al meeting dici “mettiamolo sul cloud” e ti senti già un architetto DevOps senior level 99…Scalabilità infinita, zero down time, infrastruttura immacolata…Poi arriva la realtà apre la porta, ti guarda negli occhi e ti sussurra dolcemente che nel meraviglioso mondo dell'IT:🔹 Tutto è scalabile… finché non scala.🔹 Zero down time… ma solo nelle slide.🔹 “Non crollerà mai”… detto cinque minuti prima che cada tutto come un castello di carte IKEA montato male.Morale della favola?Il cloud è come il sushi del supermercato: sembra un’ottima idea… finché non lo provi davvero. 😂Back on-prem!#redhotcyber #meme4cyber #meme #comico #cyber #hacking #hacker #infosec #infosecurity #quotes #meme #comica #vignette #citazioni #cybersec #cybercrime #awareness #meme #memetime
  • 0 Votes
    1 Posts
    26 Views
    I submitted a Pull Request to update MacPorts' OpenSSH to 10.1p1 here:https://github.com/macports/macports-ports/pull/28592GitHub Continuous Integration checks passed OK!Alas, the agent.patch that iamGavinJ had created, doesn't apply cleanly, in large part because ssh-agent.c has been reworked significantly with this release.Subsequently, I closed this previous Pull Request: https://github.com/macports/macports-ports/pull/28592 not because I didn't want to restore that functionality to launchd, but because it will require more effort than I can give such things at this time.But, check out these improvements to ssh-agent from the OpenSSH 10.1 release notes:"ssh-agent(1)](https://man.openbsd.org/ssh-agent.1), sshd(8): move agent listener sockets from /tmp tounder ~/.ssh/agent for both ssh-agent(1) and forwarded socketsin sshd(8).This ensures processes that have restricted filesystem accessthat includes /tmp do not ambiently have the ability to use keysin an agent.Moving the default directory has the consequence that the OS willno longer clean up stale agent sockets, so ssh-agent now gainsthis ability.To support $HOME on NFS, the socket path includes a truncatedhash of the hostname. ssh-agent will, by default, only clean upsockets from the same hostname.ssh-agent(1) gains some new flags: -U suppresses the automaticcleanup of stale sockets when it starts. -u forces a cleanupwithout keeping a running agent, -uu forces a cleanup that ignoresthe hostname. -T makes ssh-agent put the socket back in /tmp."Anyway, I updated this as well:https://trac.macports.org/ticket/72482I should probably actually close this ticket now that I think of it (fingers crossed that adding that to the PR is sufficient, since I forgot to add that note to the commit message as is typically preferred: https://trac.macports.org/ticket/73084).#OpenSSH #MacPorts #SecureShell #macOS #encryption #security #infosec
  • 0 Votes
    1 Posts
    5 Views
    🚨 Vuoi scoprire cosa significa davvero investigare nel Dark Web e fare Cyber Threat Intelligence come un professionista?📅 Martedì 7 ottobre 2025 ore 18WhatsApp 3791638765 o formazione@redhotcyber.com. Ti invieremo le coordinate per accedere al webinar.✅Lezioni interattive 100% online con docenti universitari ed esperti di cybersecurity.✅Corso intermedio a numero chiuso (posti limitati).✅Laboratorio Dark Lab per esercitazioni pratiche.✅Certificazione finale con esame.✅Formula soddisfatti o rimborsati.#redhotcyber #formazione #cybersecurity #darkweb #cyberthreatintelligence #ethicalhacking #infosec #intelligence #cybercrime #liveclass #training