AI Security Roundup

Daily feed of AI security, malware, and defensive research updates.

ai-security EN

5 Reasons Why Attackers Are Phishing Over LinkedIn

Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps. LinkedIn in …

ai-security EN

Upcoming Speaking Engagements

Upcoming Speaking Engagements This is a current list of where and when I am scheduled to speak: My coauthor Nathan E. Sanders and I are speaking at the Rayburn House Office Building in Washington, DC …

ai-security EN

Friday Squid Blogging: Pilot Whales Eat a Lot of Squid

Friday Squid Blogging: Pilot Whales Eat a Lot of Squid Short-finned pilot wales ( Globicephala macrorhynchus ) eat at lot of squid: To figure out a short-finned pilot whale’s caloric intake, Gough …

ai-security EN

The Role of Humans in an AI-Powered World

The Role of Humans in an AI-Powered World As AI capabilities grow, we must delineate the roles that should remain exclusively human. The line seems to be between fact-based decisions and …

ai-security EN

Book Review: The Business of Secrets

Book Review: The Business of Secrets The Business of Secrets: Adventures in Selling Encryption Around the World by Fred Kinch (May 24, 2004) From the vantage point of today, it’s surreal reading about …

ai-security EN

On Hacking Back

On Hacking Back Former DoJ attorney John Carlin writes about hackback, which he defines thus: “A hack back is a type of cyber response that incorporates a counterattack designed to proactively engage …