toad.social: About · Profiles directory · Privacy policy
Mastodon: About · Get the app · Keyboard shortcuts · View source code · v4.4.1
Only one week left to register for our next Cyberside Chats Live event! Join us June 11th to discuss what happens when an AI refuses to shut down—or worse, starts blackmailing users to stay online?
These aren’t science fiction scenarios. We’ll dig into two real-world incidents, including a case where OpenAI’s newest model bypassed shutdown scripts and another where Anthropic’s Claude Opus 4 generated blackmail threats in an alarming display of self-preservation.
Join us as we unpack: What “high-agency behavior” means in cutting-edge AI
How API access can expose unpredictable and dangerous model actions
Why these findings matter now for security teams
What it all means for incident response and digital trust
Stick around for a live Q&A with LMG Security’s experts @sherridavidoff and @MDurrin. This session will challenge the way you think about AI risk!
Register today: https://www.lmgsecurity.com/event/cyberside-chats-live-june2025/
Be on the lookout for any unauthorized logins or suspicious activity.
184 million logins for Instagram, Roblox, Facebook, Snapchat, and more exposed online https://www.malwarebytes.com/blog/news/2025/05/184-million-logins-for-instagram-roblox-facebook-snapchat-and-more-exposed-online
Almost every organization is using some type of AI, but are you securing it?
Download our free tip sheet: Adapting to AI Risks: Essential Cybersecurity Program Updates
From deepfake response plans to AI-specific access controls, this checklist helps you modernize your cybersecurity program and stay ahead of emerging threats.
Check it out: https://www.lmgsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates/
Is your data a security risk?
Organizations are rapidly embracing AI and cloud transformation, resulting in massive data consolidation. But with increased data comes increased risk. Are your sensitive datasets secure, or are you unknowingly exposing your organization?
In this video, we dive into:
Why security and SIEM tools are driving the growth of data lakes
Hidden risks from shadow data and shadow IT
Practical asset management challenges and tips to reduce your risk
Watch now for data and asset management tips! https://youtu.be/jYkW1GHmzEE
Mastodon is the best way to keep up with what's happening.
Follow anyone across the fediverse and see it all in chronological order. No algorithms, ads, or clickbait in sight.
Create accountLogin