Infosec.Pub

4,699 readers
110 users here now

To support infosec.pub, please consider donating through one of the following services:

Paypal: jerry@infosec.exchange

Ko-Fi: https://ko-fi.com/infosecexchange

Patreon: https://www.patreon.com/infosecexchange

founded 2 years ago
ADMINS
1076
 
 

Researchers from the University of Melbourne and Imperial College London have developed a method for using LLMs to improve incident response planning with a focus on reducing the risk of hallucinations. Their approach uses a smaller, fine-tuned LLM combined with retrieval-augmented generation and decision-theoretic planning. The three steps of the method for incident response planning The problem they target is familiar: incident response is still largely manual, slow, and reliant on expert-configured playbooks. Many organisations … More → The post Using lightweight LLMs to cut incident response times and reduce hallucinations appeared first on Help Net Security.

1077
 
 

Comments

1078
 
 

Comments

1079
1080
1081
1082
1083
1084
1085
1086
1087
 
 

For incentives remember the three Fs – finance, fame, and fixing it feature  Thirty years ago, Netscape kicked off the first commercial bug bounty program. Since then, companies large and small have bought into the idea, with mixed results.…

1088
 
 

Bus Pirate is nearly a household name in the hardware hacking world. The first version came out way back in 2008, and there have been several revisions since then. You …read more

1089
7
Revealing Taste (www.nytimes.com)
submitted 1 month ago by lemmydev2 to c/pulse_of_truth
 
 

A clever leak exposed the music habits of some famous people — and two Times journalists.

1090
 
 

Comments

1091
 
 

Hi

Any recommandations for an actively maintained AI user-agent list please ?

This is not perfect but I use that trick to block or slow down some of them... If you have a better way I'm all ears.

1092
1093
 
 

If you're using a VPN to stay safe, this will anger you.
You were told a VPN would shield you. Protect your data. Keep you anonymous. But what if the tool you downloaded for privacy was literally designed to watch you?

This video uncovers the full story behind the most dangerous VPN ever made—used by Facebook to spy on teenagers—and how today’s most trusted VPNs are following the same exact blueprint.

If you’ve ever felt unsure about who to trust online, this video will give you the receipts, the checklist, and the countermeasures you actually need.

Inside this video, you’ll learn:
• How Facebook turned a “privacy app” into a surveillance weapon
• The Israeli cyber intel unit behind Onavo and why it matters
• What Project Ghostbusters did to break HTTPS encryption
• Why 20+ top VPNs are secretly owned by spyware vendors
• The real story behind ExpressVPN, Kape Technologies, and fake “independent” review sites
• The 7-point checklist every VPN must pass to be trusted
• Better tools to protect yourself: DoH, hardened Firefox, Tor, browser isolation, and more

1094
1095
2
submitted 1 month ago* (last edited 1 month ago) by digicat to c/blueteamsec
1096
 
 

Comments

1097
1098
1099
2
Surprise AMA 08/22/2025 (www.youtube.com)
submitted 1 month ago by rss@ibbit.at to c/cardano
1100
view more: ‹ prev next ›