In this document we present in part 1 a categorization of genAI abuses, and we will use these categories in part 2 to propose possible approaches for prevention and detection of abuse. The goal is making it harder for the malicious users to reach their objectives.
Blog
In information security you have lots of people that learn to hack, that know how to find vulnerabilities and how to make exploits. They become pentesters or bounty hunters, or builders of hacking tools. They are the ethical variant of the hacker: they can break into systems but their intentions are good. Their skills are badly needed as they will...
The colorful world of security testing
The offensive security world is full of colors like red, blue, purple, black, grey, and white. Whether the last three are colors is a grey area. But what do these colors mean and which pieces of the security composition require which color?
Computerinbraak door een interne medewerker
Inbreken is gemakkelijker als je al toegang hebt
Paranoia, twijfels en veel angst…
Angst is geen goede raadgever, feiten wel, alternatieve feiten niet.
One wrong click and you lose...
What an unfair game that is!! The title is probably the worst possible advertisement for a game. You never want to play this game anyway, so why would you want to know the name. Unfortunately, you already know its name and play it daily: spot the phishing.
The magic of phishing
Maybe surprising at first, yet there is a clear link between magicians and phishers. Just think about it: a phisher tries to deceive you and making you take a risk, a magician deceives you by making you believe something impossible happened. Both of these professions use a combination of technical tricks combined with psychological understanding of...

