Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Dan Goodin
@dangoodin@infosec.exchange  ·  activity timestamp 10 hours ago

Wow, the lack of ANY factual support for such a claim amounts to hyperbole. And from a CEO peddling a service to "guarantee content integrity." File this one under "Umbrella salesman predicts torrential rain."

https://www.wgcu.org/science-tech/2025-09-23/detection-expert-says-hackers-likely-used-ai-to-penetrate-airport-system

WGCU PBS & NPR for Southwest Florida

Detection expert says hackers likely used AI to penetrate airport system

As major airports across Europe have been targeted in a cyber-attack that began on Saturday, an expert is warning that artificial intelligence may have played a key role in the breach.The incident, which disrupted check-in and baggage systems at hubs including Dublin, London, Brussels and Berlin, left thousands of passengers stranded with canceled or delayed flights.Christian Perry, CEO of Undetectable AI, AI detection experts, explained how AI is reshaping the way cyber-attacks unfold.
  • Copy link
  • Flag this post
  • Block
James Milne
@jamesfmilne@mastodon.gamedev.place replied  ·  activity timestamp 9 hours ago

@dangoodin I just picture Secret Service Agent Richard "Dick" Gill from Hackers talking absolute bullshit.

  • Copy link
  • Flag this comment
  • Block
Ciarán McNally
@ciaranmak@mastodon.ie replied  ·  activity timestamp 10 hours ago

@dangoodin We blame LLMs for their nonsense but they very clearly are 2nd in line and were obviously modelled on the archetype supreme Bullshitter, the common executive media whore.

  • Copy link
  • Flag this comment
  • Block
Ciarán McNally
@ciaranmak@mastodon.ie replied  ·  activity timestamp 9 hours ago

@dangoodin I made the mistake of reading it a 2nd time...

"AI can disguise itself to look like a human making it very hard to spot",

because humans, you see, are incredibly hard to spot, we haven't been able to catch them well for the entire history of cyber crime, but alas, this latest AI trend is unstoppable because it can disguise itself AS A HUMAN

Your browser does not support the video tag.
GIF
GIF
Mind blown dot gif
Mind blown dot gif
  • Copy link
  • Flag this comment
  • Block
Jason Parker (he/they)
@north@xn--8r9a.com replied  ·  activity timestamp 10 hours ago

@dangoodin I found the destination of the "Undetectable AI" link to be pretty amusing (look at the URL).

  • Copy link
  • Flag this comment
  • Block
Jason Parker (he/they)
@north@xn--8r9a.com replied  ·  activity timestamp 9 hours ago

@dangoodin lol

Email from WGCU Managing Editor, Michael Braun.

"I archived (removed) the story and will check how and by whom that was used. Thanks"
Email from WGCU Managing Editor, Michael Braun. "I archived (removed) the story and will check how and by whom that was used. Thanks"
Email from WGCU Managing Editor, Michael Braun. "I archived (removed) the story and will check how and by whom that was used. Thanks"
  • Copy link
  • Flag this comment
  • Block
Bill Bennett
@billbennett@mastodon.nz replied  ·  activity timestamp 10 hours ago

@dangoodin I suspect even more attackers will now be considering this after seeing the post.

  • Copy link
  • Flag this comment
  • Block
JJ
@guitarfosec@cyberplace.social replied  ·  activity timestamp 10 hours ago

@dangoodin I was not expecting this to be PBS/NPR when I clicked. This is such a useless article.

  • Copy link
  • Flag this comment
  • Block
Dan Goodin
@dangoodin@infosec.exchange replied  ·  activity timestamp 10 hours ago

I mean, just listen to him talk:

Hackers aren’t just sitting in dark rooms typing away anymore. With AI, they can launch faster, smarter attacks that slip past traditional security systems. AI can be trained to find weaknesses in seconds, or even disguise itself to look like a human user, making it very hard to spot.

In this sort of attack, AI can do the heavy lifting that used to take hackers weeks. It can scan for weaknesses across huge systems in minutes, and once it finds a way in, it can copy normal user behavior so it doesn’t raise any alarms. That makes it far easier for criminals to slip through the cracks without being noticed.

That’s why this airport attack is so concerning. It shows how quickly the rules of cybersecurity are changing. If hackers are using AI to get in, we need AI detectors on the other side to keep them out.”

  • Copy link
  • Flag this comment
  • Block
Henryk Plötz
@henryk@chaos.social replied  ·  activity timestamp 8 hours ago

@dangoodin I very much like how he *doesn't* *actually* say that AI was used in this attack. Sure, this is pure marketing copy and not news, but it's extremely carefully worded to not technically be wrong — well, except for all the claims of things "AI" can do of course.

  • Copy link
  • Flag this comment
  • Block
Dan Goodin
@dangoodin@infosec.exchange replied  ·  activity timestamp 8 hours ago

Since I first tooted this, the article has. been taken down. It has been available for more than 5 weeks and suddenly it's gone, with no explanation from WGCU, the public radio station in Fort Meyers, Florida.

Here's an image showing the URL of the story. Accompanying that is an archive link.

https://web.archive.org/web/20250923164120/https://www.wgcu.org/science-tech/2025-09-23/detection-expert-says-hackers-likely-used-ai-to-penetrate-airport-system

URL in browser address bar: https://www.wgcu.org/science-tech/2025-09-23/detection-expert-says-hackers-likely-used-ai-to-penetrate-airport-system
URL in browser address bar: https://www.wgcu.org/science-tech/2025-09-23/detection-expert-says-hackers-likely-used-ai-to-penetrate-airport-system
URL in browser address bar: https://www.wgcu.org/science-tech/2025-09-23/detection-expert-says-hackers-likely-used-ai-to-penetrate-airport-system
  • Copy link
  • Flag this comment
  • Block
PetterOfCats
@PetterOfCats@mastodon.world replied  ·  activity timestamp 8 hours ago

@dangoodin I wonder if this is related

https://mastodon.social/@jeffjarvis/115537472002511811

  • Copy link
  • Flag this comment
  • Block
goedelchen
@goedelchen@mastodontech.de replied  ·  activity timestamp 10 hours ago

@dangoodin It would be great if those who set up these systems and their pentesters would have tools that can scan for weaknesses accros huge systems in minutes, and once it finds a way in, it can copy normal user behavior so it doesn't raise alarms. That would make it far easier for pentesters to find the cracks where criminals could slip through without being noticed.

  • Copy link
  • Flag this comment
  • Block
MorattiSec (Lizzie)
@morattisec@infosec.exchange replied  ·  activity timestamp 10 hours ago

@dangoodin smh, we need a better wall of shame for the people who are involved in this kind of thing. The entire industry is getting gish galloped

  • Copy link
  • Flag this comment
  • Block
SQLAllFather
@SQLAllFather@techhub.social replied  ·  activity timestamp 10 hours ago

@dangoodin

"Hackers aren’t just sitting in dark rooms typing away anymore. Now they have Windows!!"

...

...

I'll show myself out.

  • Copy link
  • Flag this comment
  • Block
Viss
@Viss@mastodon.social replied  ·  activity timestamp 10 hours ago

@dangoodin

Your browser does not support the video tag.
GIF
GIF
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this comment
  • Block
Viss
@Viss@mastodon.social replied  ·  activity timestamp 10 hours ago

@dangoodin wow mastodon murdered that gif with compression

  • Copy link
  • Flag this comment
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login