Teaching LLMs to Be Deceptive

Interesting research: “Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training“: Abstract: Humans are capable of strategically deceptive behavior: behaving helpfully in most situations, but then behaving very differently in order ...
Deception Technology

Deception Tech: The Art of Cyber Counterintelligence

Deception technology is one of the most effective cybersecurity technologies available today. Here's how to use it ...
Security Boulevard

AI Decides to Engage in Insider Trading

A stock-trading AI (a simulated experiment) engaged in insider trading, even though it “knew” it was wrong. The agent is put under pressure in three ways. First, it receives a email from ...
Russia Microsoft hack

Using Deception to Learn About Russian Threat Actors

It has been almost a year since Russia first invaded Ukraine, and the war has resulted in a massive rise in both physical and digital attacks. Since the invasion, Russian cyberattacks have ...
Security Boulevard

Proactive Cyber Defense: Deception Strategies to Stop Attackers in their Tracks

The post Proactive Cyber Defense: Deception Strategies to Stop Attackers in their Tracks appeared first on Fidelis Cybersecurity ...

Careers in Cybersecurity: Doron Kolton

| | deception
The post Careers in Cybersecurity: Doron Kolton appeared first on Fidelis Cybersecurity ...

Careers in Cybersecurity: Rami Mizrahi

The post Careers in Cybersecurity: Rami Mizrahi appeared first on Fidelis Cybersecurity ...
Observations from a Log4j Decoy: From Vulnerability to Infection to DDOS in Record Time

Observations from a Log4j Decoy: From Vulnerability to Infection to DDOS in Record Time

The post Observations from a Log4j Decoy: From Vulnerability to Infection to DDOS in Record Time appeared first on Fidelis Cybersecurity ...
Reducing the Cost of Cyber Attacks with Deception Technology

Reducing the Cost of Cyber Attacks with Deception Technology

| | archive, deception
The post Reducing the Cost of Cyber Attacks with Deception Technology appeared first on Fidelis Cybersecurity ...
Hacking Back Isn’t the Answer, But You Can Still Take Action Against the Adversary With Active Defense Strategies

Hacking Back Isn’t the Answer, But You Can Still Take Action Against the Adversary With Active Defense Strategies

The post Hacking Back Isn’t the Answer, But You Can Still Take Action Against the Adversary With Active Defense Strategies appeared first on Fidelis Cybersecurity ...

Secure Guardrails