Fullstack CISO (@fullstackciso) 's Twitter Profile
Fullstack CISO

@fullstackciso

coder, sysadmin, startup co-founder, ethical hacker, reverse engineer, cybercrime researcher, security architect, ciso

These opinions are mine alone

ID: 989183453772922880

calendar_today25-04-2018 16:44:48

75 Tweet

89 Takipçi

143 Takip Edilen

Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

The latest Xeon processors provide on-chip isolation for virtual machines which will further enhance Cloud security by reducing the likelihood of escape to hypervisor attack. Interesting to see security moving more into silicon. #cloudsecurity #CyberSec buff.ly/3GA4QOI

The latest Xeon processors provide on-chip isolation for virtual machines which will further enhance Cloud security by reducing the likelihood of escape to hypervisor attack. Interesting to see security moving more into silicon.   #cloudsecurity #CyberSec buff.ly/3GA4QOI
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

ChatGPT as a Cybersecurity Assistant. Some interesting use cases in this article: * What happened in this log file? * Is this code vulnerable to XSS? * Convert this shellcode into Python #cybersecurity #chatgpt buff.ly/3isYEjP

ChatGPT as a Cybersecurity Assistant.  Some interesting use cases in this article:
* What happened in this log file?
* Is this code vulnerable to XSS? 
* Convert this shellcode into Python
#cybersecurity #chatgpt

buff.ly/3isYEjP
Br𝕏d Skggs (@brdskggs) 's Twitter Profile Photo

Trying to make my LinkedIn profile more interesting if a recruiter is using a large language model like GPT-4 to send me a message. Looks like it works on the public version of my profile!

Trying to make my LinkedIn profile more interesting if a recruiter is using a large language model like GPT-4 to send me a message.

Looks like it works on the public version of my profile!
Bill Gates (@billgates) 's Twitter Profile Photo

The development of AI is as fundamental as the creation of the microprocessor, the personal computer, the Internet, and the mobile phone. It will change the way people work, learn, travel, get health care, and communicate with each other. gatesnot.es/3FIamPU

Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

buff.ly/3Bot6kG Google recently released some great new security features including Dark web monitoring for your GMail account and passkey signin #cybersecurity #google buff.ly/3Bot6kG

buff.ly/3Bot6kG
Google recently released some great new security features including Dark web monitoring for your GMail account and passkey signin
#cybersecurity #google
buff.ly/3Bot6kG
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

If you your organisation is looking to leverage AI securely, take a look at the NIST AI Risk Management Framework (RMF). "The NIST AI RMF is intended for... the design, development, use, and evaluation of AI products, services, and systems." buff.ly/3MBY4ef.

If you your organisation is looking to leverage AI securely, take a look at the NIST AI Risk Management Framework (RMF). 

"The NIST AI RMF is intended for... the design, development, use, and evaluation of AI products, services, and systems."
 buff.ly/3MBY4ef.
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

Looking for a newsletter about the intersection of cybersecurity, GRC and AI? Sign up for our free newsletter at secure-ai.beehiiv.com #ai #CyberSecurity

Looking for a newsletter about the intersection of cybersecurity, GRC and AI?  Sign up for our free newsletter at secure-ai.beehiiv.com #ai #CyberSecurity
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

When regulation and compliance are a handbrake on business. I believe the EU's ambitions to regulate AI in a GDPR manner are going to inhibit AI innovation and investment in the EU, while other parts of the globe flourish. buff.ly/3ZOC2Lw #grc #ai

Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

'Log in with...' Feature Exposes Millions to Account Takeover Attackers could exploit these vulnerabilities to gain control over user accounts on multiple websites. #iam #idam #cybersecurity buff.ly/3Ft2m4C

'Log in with...' Feature Exposes Millions to Account Takeover
Attackers could exploit these vulnerabilities to gain control over user accounts on multiple websites. #iam #idam #cybersecurity
buff.ly/3Ft2m4C
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

Don't like writing security policies? Then check out this article: How to build a free ISMS with ChatGPT buff.ly/40hTJnf #grc #chatgpt #iso27001

Don't like writing security policies?  Then check out this article: How to build a free ISMS with ChatGPT buff.ly/40hTJnf #grc #chatgpt #iso27001
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

"An increase in the volume of these threats of over 1,000% corresponding with the time frame in which ChatGPT was launched is not a coincidence" - Report Links ChatGPT to 1,265% Rise in Phishing Emails buff.ly/47bxAJl #chatgpt #phishing #cybersecurity

"An increase in the volume of these threats of over 1,000% corresponding with the time frame in which ChatGPT was launched is not a coincidence" - Report Links ChatGPT to 1,265% Rise in Phishing Emails buff.ly/47bxAJl #chatgpt #phishing #cybersecurity
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

The ASD Cyber Threat Report 2022-2023 is out buff.ly/3sxTjwm * State actors focused on critical infrastructure * Cybercriminals continued to adapt tactics to extract maximum payment from victims. * One in 5 critical vulnerabilities was exploited within 48 hours.

The ASD Cyber Threat Report 2022-2023 is out buff.ly/3sxTjwm 
* State actors focused on critical infrastructure 
* Cybercriminals continued to adapt tactics to extract maximum payment from victims.
* One in 5 critical vulnerabilities was exploited within 48 hours.
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

How Some Experts See The Future Of AI In 2024 buff.ly/48oFsIl "There will be AI SOC analysts who will handle alert triage, AI ethical hackers tasked with uncovering vulnerabilities, AI code review tools capable of identifying software bugs" #ai #cybersecurity

How Some Experts See The Future Of AI In 2024 buff.ly/48oFsIl

"There will be AI SOC analysts who will handle alert triage, AI ethical hackers tasked with uncovering vulnerabilities, AI code review tools capable of identifying software bugs" 
#ai #cybersecurity
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

GenAI could make KYC effectively useless buff.ly/47yWzpM "leveraging open source and off-the-shelf software, an attacker could download a selfie of a person, edit it with generative AI tools and use the manipulated ID image to pass a KYC test " #iam #identity #ai

GenAI could make KYC effectively useless buff.ly/47yWzpM

"leveraging open source and off-the-shelf software, an attacker could download a selfie of a person, edit it with generative AI tools and use the manipulated ID image to pass a KYC test "

#iam #identity #ai
Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

Cybersecurity trends: Predictions for 2024 buff.ly/48p4Spy Some (mostly) realistic Cybersecurity predictions especially related to AI #cybersecurity #ai

Fullstack CISO (@fullstackciso) 's Twitter Profile Photo

Hopefully this trend continues... Ransomware payments drop to record low as victims refuse to pay buff.ly/48RzoIO #cybersecurity #ransomware

Hopefully this trend continues...

Ransomware payments drop to record low as victims refuse to pay buff.ly/48RzoIO

#cybersecurity #ransomware