#cybertalks
Explore tagged Tumblr posts
spinda-draws · 2 years ago
Text
I don't care if no one else cares. I want a Dracula with a Spanish (European) accent who is a bit shy and tries to fit in with the other Cybervillains.
He peeks out of his coffin like :3 can I hang with you guys?
He calls Hacker his "wonderful friend" and accidentally steals Wicked after season 4.
He and Hacker are definitely friends because he buys his wig gel. The Pompadorians and Poddles already seem to have a weird soft spot for Hacker it only makes sense especially since Drac is a villain already.
4 notes · View notes
jcmarchi · 11 months ago
Text
Deepfake misuse & deepfake detection (before it’s too late) - CyberTalk
New Post has been published on https://thedigitalinsider.com/deepfake-misuse-deepfake-detection-before-its-too-late-cybertalk/
Deepfake misuse & deepfake detection (before it’s too late) - CyberTalk
Tumblr media Tumblr media
Micki Boland is a global cyber security warrior and evangelist with Check Point’s Office of the CTO. Micki has over 20 years in ICT, cyber security, emerging technology, and innovation. Micki’s focus is helping customers, system integrators, and service providers reduce risk through the adoption of emerging cyber security technologies. Micki is an ISC2 CISSP and holds a Master of Science in Technology Commercialization from the University of Texas at Austin, and an MBA with a global security concentration from East Carolina University.
In this dynamic and insightful interview, Check Point expert Micki Boland discusses how deepfakes are evolving, why that matters for organizations, and how organizations can take action to protect themselves. Discover on-point analyses that could reshape your decisions, improving cyber security and business outcomes. Don’t miss this.
Can you explain how deepfake technology works? 
Deepfakes involve simulated video, audio, and images to be delivered as content via online news, mobile applications, and through social media platforms. Deepfake videos are created with Generative Adversarial Networks (GAN), a type of Artificial Neural Network that uses Deep Learning to create synthetic content.
GANs sound cool, but technical. Could you break down how they operate?
GAN are a class of machine learning systems that have two neural network models; a generator and discriminator which game each other. Training data in the form of video, still images, and audio is fed to the generator, which then seeks to recreate it. The discriminator then tries to discern the training data from the recreated data produced by the generator.
The two artificial intelligence engines repeatedly game each other, getting iteratively better. The result is convincing, high quality synthetic video, images, or audio. A good example of GAN at work is NVIDIA GAN. Navigate to the website https://thispersondoesnotexist.com/ and you will see a composite image of a human face that was created by the NVIDIA GAN using faces on the internet. Refreshing the internet browser yields a new synthetic image of a human that does not exist.
What are some notable examples of deepfake tech’s misuse?
Most people are not even aware of deepfake technologies, although these have now been infamously utilized to conduct major financial fraud. Politicians have also used the technology against their political adversaries. Early in the war between Russia and Ukraine, Russia created and disseminated a deepfake video of Ukrainian President Volodymyr Zelenskyy advising Ukrainian soldiers to “lay down their arms” and surrender to Russia.
How was the crisis involving the Zelenskyy deepfake video managed?
The deepfake quality was poor and it was immediately identified as a deepfake video attributable to Russia. However, the technology is becoming so convincing and so real that soon it will be impossible for the regular human being to discern GenAI at work. And detection technologies, while have a tremendous amount of funding and support by big technology corporations, are lagging way behind.
What are some lesser-known uses of deepfake technology and what risks do they pose to organizations, if any?
Hollywood is using deepfake technologies in motion picture creation to recreate actor personas. One such example is Bruce Willis, who sold his persona to be used in movies without his acting due to his debilitating health issues. Voicefake technology (another type of deepfake) enabled an autistic college valedictorian to address her class at her graduation.
Yet, deepfakes pose a significant threat. Deepfakes are used to lure people to “click bait” for launching malware (bots, ransomware, malware), and to conduct financial fraud through CEO and CFO impersonation. More recently, deepfakes have been used by nation-state adversaries to infiltrate organizations via impersonation or fake jobs interviews over Zoom.
How are law enforcement agencies addressing the challenges posed by deepfake technology?
Europol has really been a leader in identifying GenAI and deepfake as a major issue. Europol supports the global law enforcement community in the Europol Innovation Lab, which aims to develop innovative solutions for EU Member States’ operational work. Already in Europe, there are laws against deepfake usage for non-consensual pornography and cyber criminal gangs’ use of deepfakes in financial fraud.
What should organizations consider when adopting Generative AI technologies, as these technologies have such incredible power and potential?
Every organization is seeking to adopt GenAI to help improve customer satisfaction, deliver new and innovative services, reduce administrative overhead and costs, scale rapidly, do more with less and do it more efficiently. In consideration of adopting GenAI, organizations should first understand the risks, rewards, and tradeoffs associated with adopting this technology. Additionally, organizations must be concerned with privacy and data protection, as well as potential copyright challenges.
What role do frameworks and guidelines, such as those from NIST and OWASP, play in the responsible adoption of AI technologies?
On January 26th, 2023, NIST released its forty-two page Artificial Intelligence Risk Management Framework (AI RMF 1.0) and AI Risk Management Playbook (NIST 2023). For any organization, this is a good place to start.
The primary goal of the NIST AI Risk Management Framework is to help organizations create AI-focused risk management programs, leading to the responsible development and adoption of AI platforms and systems.
The NIST AI Risk Management Framework will help any organization align organizational goals for and use cases for AI. Most importantly, this risk management framework is human centered. It includes social responsibility information, sustainability information and helps organizations closely focus on the potential or unintended consequences and impact of AI use.
Another immense help for organizations that wish to further understand risk associated with GenAI Large Language Model adoption is the OWASP Top 10 LLM Risks list. OWASP released version 1.1 on October 16th, 2023. Through this list, organizations can better understand risks such as inject and data poisoning. These risks are especially critical to know about when bringing an LLM in house.
As organizations adopt GenAI, they need a solid framework through which to assess, monitor, and identify GenAI-centric attacks. MITRE has recently introduced ATLAS, a robust framework developed specifically for artificial intelligence and aligned to the MITRE ATT&CK framework.
For more of Check Point expert Micki Boland’s insights into deepfakes, please see CyberTalk.org’s past coverage. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.
2 notes · View notes
thoughtfulfangirling · 1 year ago
Text
Tumblr media
"It is expressive activities that have burgeoned on the Internet, and it turns out that cybertalk can be cheap. One study found that of the 1.2 million members of the Save Darfur "Cause" on Facebook around 2010, 'the vast majority... recruited no one else into the Cause and contributed no money to it-suggesting that in the case of the Save Darfur campaign, Facebook conjured an illusion of activism rather than facilitating the real thing.'"
— Bowling Alone: The Collapse and Revival of American Community by Robert D. Putnam
2 notes · View notes
rehman-coding · 5 years ago
Photo
Tumblr media
SQL injection is an attack technique that exploits a security vulnerability occurring in the database layer of an application. Hackers use injections to obtain unauthorized access to the underlying data, structure, and DBMS. #pentest #hacking #infosec #vulnerability #security #pentesting #cybertalks #linux #securitytalks #informationsecurity #cybersecurity #cyberseguridad #ciberseguridad #ethicalhacking #ethicalhacker #cybercrime #cyberattack #privacy #protectdata #sqlinjection - #regrann https://www.instagram.com/p/B6q040SAYeB/?igshid=di179ymn7eg6
1 note · View note
robpegoraro · 3 years ago
Text
Weekly output: Firefox update, 6G, Google Messages updates, Mudge speaks in D.C.
Weekly output: Firefox update, 6G, Google Messages updates, Mudge speaks in D.C.
This afternoon’s exciting plot twist: I successfully replaced the shattered screen of my Pixel 5a, using a Google-authorized iFixit replacement kit. Detaching the old screen was a lot more work than I expected, but everything after that was surprisingly easy. 10/18/2022: Mozilla Makes Private Browsing in Firefox Easier, Adds PDF Editing, ‘Firefox View’, PCMag Five days into using this update, I…
Tumblr media
View On WordPress
0 notes
tfprimereacts · 6 years ago
Text
cybertalk 6
Tumblr media
i was re-watching tfp and got nostalgic remembering my first transformers OTP 
188 notes · View notes
spinda-draws · 3 years ago
Text
Tumblr media
I fucking swear the review section of the fic has the funniest Cyberchase fans to ever exist. I love you guys. Thank you to anyone who’s left a review, especially if it’s stupid and amazing like this. 
15 notes · View notes
mysteriesofthehighspeech · 4 years ago
Text
+++DROID+++
Droids are a rare race of thinking machines found all across Ao. Thanks to the pre-ullas fall of technology, no droids are produced in modern Ao. Most of them are remnants of that forgotten era, and have spent thousands of years in slumber. Droids are of great value to the Orders, as their ability to sort and record information outpaces that of any scribe with a database. Most Droids aren’t humanoid, and are often no more than a talking metal box with legs or wheels. Those few made even vaguely in the shape of humans are normally diplomats, or soldier models. If ever you’re short on money, your Droid friend could easily sell for hundreds of thousands of denarius.
 ABILITY SCORE INCREASE: Droids receive +2 to Intelligence.
AGE: Droids aren’t immortal, and can die of old age due to the degradation of their components over time. The average Droid might live 200-300 years, discounting any time they might have spent in stasis
ALIGNMENT: Droids tend toward true neutral, they care little of the petty squabbles of their fellow High-Kin. 
SIZE: Droids vary greatly in their shape, so their size could range anywhere from 1-8 feet.
SPEED: Your speed is 30 feet.
DARKVISION: Since Droids visualize the world as data, extreme darkness often poses a threat to their ability to perceive their surroundings. To combat this, most have some manner of software that allows them to sense heat or movement in the dark, allowing them to navigate darkness. You can see in dim light within 60 feet of you as if it were bright light, and in darkness as if it were dim light.
MECHANICAL NATURE: Due to the circumstances of your biology, you gain the following attributes:
- You have advantage on saving throws against being poisoned, and you have resistance to poison damage.
- You are immune to disease, and you cannot mutate.
- You don’t need to eat, drink, or breathe.
- Instead of sleeping, you instead enter a four hour resting period in the place of a long rest. 
LANGUAGES: You can speak, read, and write in whatever language is common in your region, as well as Cybertalk. Cybertalk is really a coding language that can be used to interact with machines such as Databases.
DROID ATTRIBUTE: Droids may choose from one of three common attributes.
ARMOR PLATING: The Droid’s outer frame is especially thick, or made of a more durable material. Remove 2 from the +4 bonus to Intelligence and add it to Constitution. Alternatively, negate the Intelligence bonus and gain +4 to Con, but lose 5 movement speed.
AUTOMATIC DIPLOMAT: The Droid’s personality was made to be notably engaging. Remove 2 from the +4 bonus to Intelligence and add it to Charisma. Alternatively, negate the Intelligence bonus and gain +4 to Charisma, but reduce your Strength by 2.
WORKER: The Droid was made to perform skilled labor. Remove 2 from the +4 bonus to Intelligence, and gain proficiency in 2 skills and a tool set. Alternatively, negate the Intelligence bonus and gain proficiency in 3 skills and 2 tool sets.
2 notes · View notes
juweller · 4 years ago
Video
youtube
CYBERTALK: EP9 - Leadership is Influence, Not Authority
How to be an effective leader in this new way of working.
Hear it from our awesome President of Cyberbacker, Ms. Shiela Mie Empleo! 
CyberTalk, our podcast series is hosted by our awesome Growthbacker, Gelo! This podcast is powered by Cyberbacker and here is where we talk about life and how it is to be a Cyberbacker working from home.
You may also listen to our podcast on these platforms!
Spotify: https://open.spotify.com/…/0G3cwpqZDKMB…​
Google Podcast: https://www.google.com/podcasts…​
Breaker: https://www.breaker.audio/p/cy…/episodes​
Castbox: https://castbox.fm/channel/id3315243?...​
Be a leader of your life! Grow personally and professionally while working at home!
Apply at www.cyberbacker.ph 
 Follow us!
Facebook: https://www.facebook.com/cyberbacker​
Facebook Group: https://www.facebook.com/groups/Cyber​..
IG: https://instagram.com/cyberbackerph​
LinkedIn: https://www.linkedin.com/company/cybe​...
Website: www.cyberbacker.ph
YouTube Channel: https://www.youtube.com/c/Cyberbacker
1 note · View note
tfprimereacts · 6 years ago
Text
cybertalk #3 (・_・ヾ
Tumblr media
guess i like extremes 
86 notes · View notes
laracroftz · 6 years ago
Note
smh at cybertalks/rpslayed calling all this stuff about aave negativity
i mean i don’t check them peeps but it wouldn’t surprise me. the rpc never has and never will, listen to black people.
Tumblr media
4 notes · View notes
hackgit · 3 years ago
Text
[Media] BloodHound
BloodHound BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure environment. https://github.com/BloodHoundAD/BloodHound Introducing BloodHound 4.2 — The Azure Refactor: https://posts.specterops.io/1cff734938bd Active Directory Enumeration: BloodHound: https://www.hackingarticles.in/active-directory-enumeration-bloodhound/ #redteam #ad
YouTubeActive Directory Enumeration With BloodHoundIn this video, I cover the process of automating and visualizing Active Directory Enumeration with BloodHound. ----------------------------------------------------------------------------------- LINKS: BloodHound GitHub Repo: https://github.com/BloodHoundAD/BloodHound SharpHound Documentation: https://bloodhound.readthedocs.io/en/latest/data-collection/sharphound.html ----------------------------------------------------------------------------------- BLOG ►► https://bit.ly/3qjvSjK FORUM ►► https://bit.ly/39r2kcY ACADEMY ►► https://bit.ly/39CuORr ----------------------------------------------------------------------------------- TWITTER ►► https://bit.ly/3sNKXfq DISCORD ►► https://bit.ly/3hkIDsK INSTAGRAM ►► https://bit.ly/3sP1Syh LINKEDIN ►► https://bit.ly/360qwlN PATREON ►► https://bit.ly/365iDLK MERCHANDISE ►► https://bit.ly/3c2jDEn ----------------------------------------------------------------------------------- CYBERTALK PODCAST ►► https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7 ----------------------------------------------------------------------------------- We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. ----------------------------------------------------------------------------------- Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة ----------------------------------------------------------------------------------- #Pentesting#CyberSecurity
Tumblr media
1 note · View note
teckzy · 4 years ago
Photo
Tumblr media
Dear all, Greetings from TeckZy! TeckZy Research Analytics IT Solutions Pvt. Ltd., an IT and Research based company headquartered at Chennai, is organising a  LIVE webinar on 'Let's do the cybertalk - Diving Deep into Cybersecurity' on 30th October 2021 Saturday, 11:30 am - 12:30 noon (IST). ABOUT WEBINAR ▪ Introduction to Cybersecurity ▪ Understanding the Need for Cybersecurity ! ▪ Hackers, who are they ? ▪ How Hackers really hack ! ▪ Exploring Security ▪ Career Paths on Cybersecurity ▪ Becoming a Hacker to secure Organizations ▪ Q&A Who can attend? ▪ Students ▪ Faculty ▪ Research Scholars ▪ Professionals ▪ Anyone with interest in cybersecurity 🗓️ Date Of Event:      30.10.2021 🔗 Registration link: research.teckzy.com/registration-cyber.php What are you waiting for! Be ready to explore... See you soon!! 🤩 For more information: +91-7305181552 / +91-7358780922 Regards, Team TeckZy
0 notes
tfprimereacts · 6 years ago
Text
cybertalk 5
there MUST be a universe where OP and Megs have resolved their romantic tension
62 notes · View notes
venkatkworld · 5 years ago
Link
Artificial Intelligence in telecom is being transformed in various ways by technology. From Artificial Intelligence (AI) to the CyberTalk Threat, here are the 7 biggest technology trends that will transform telecoms in 2020.
0 notes
tomhardcomputer · 5 years ago
Video
tumblr
Montando CYBER TALK ROBOT https://ift.tt/2NmThjn Hola estimado lector, ayer Domingo estuve montando un robot CyberTalk, este robot para quiénes no lo sepan es un robot recomendado para niños, entre 8 y 12 años, si tienes menos edad, la persona que pensamos regalar podemos regalar RoboMaker pro, con la supervisión de un adulto. Además que para montarlo es necesario un adulto. Debo de decir que yo me entretuve bastante en el montaje de este robot, tardé alrededor de 30 minutos, entre leer manual, montar y volver a desmontar aunque una vez que lo has montado, al menos una vez, montarlo y desmontarlo, es un juego de muñecos, eso sí hay que tener cuidado con las piezas ya son literalmente de juguete.  En el montaje debo de decir que la mayor parte de las piezas no van atornillados sino por presión, esto significa que hay que tener cuidado cuando vayamos a cambiar las pilas de nuestro robot ya que hay que desmontarlo entero y se puede romper. Además de todo esto decir que el material no tiene pinta de ser buen material, sino que el plastico es de PVC bastante endeble, similar al de los equipos electrónicos. Yo por mi parte al ver este robot debo confesar que me esperaba que tuviera, sensor de proximidad por ultrasonido, pero no tiene ☹☹, lo único así es un altavoz, el cual puedes controlar con APP de Android, desde el móvil descargado en el PlayStore. El robot se puede controlar o programar con Scratch, desde la app de Android, y teniendo unos conocimientos mínimos de programación se puede controlar, en fin, el robot, lo recomiendo para niños, y si quieres algo más profesional o de adulto, te recomiendo Arduino, aquí en este website, tengo algún que otro tutorial de esta plataforma. Pues nada hasta aquí mi post de hoy, abajo dejo algunas fotos que me he hecho con el montaje de este aparato, y poco más, espero que os haya gustado el artículo, si es así  me lo podéis dejar en los comentarios, acepto también sugerencias, y si queréis podéis seguirme a trav��s de Feedly y LinkedIn, un saludo y hasta la próxima 😁😁. Donde comprar: https://amzn.to/3a3sBO8
0 notes