Using hooks to block potentially dangerous operations in Claude Code (like rm -rf) and thinking everything's totally secure now?

Ask your assistant how they'd bypass it — if they wanted to.

Mine didn't spell out the obvious one, but they'd definitely figure it out: write a script to execute those operations and run it.

Take care and be safe.

#SecurityAwareness #AITools #ClaudeCode

⚡⚡⚡ Lightning Talk Announcement! ⚡⚡⚡

👀 ⚖️ 𝗛𝗢𝗪 𝗧𝗢 𝗕𝗘 𝗝𝗨𝗦𝗧 𝗧𝗛𝗘 𝗥𝗜𝗚𝗛𝗧 𝗔𝗠𝗢𝗨𝗡𝗧 𝗢𝗙 𝗣𝗔𝗥𝗔𝗡𝗢𝗜𝗗 (𝗖𝗬𝗕𝗘𝗥𝗦𝗘𝗖𝗨𝗥𝗜𝗧𝗬 𝗘𝗗𝗜𝗧𝗜𝗢𝗡) - 𝗗𝗘𝗡𝗜𝗠 𝗟𝗔𝗧𝗜ć 🧠😎

Are you too relaxed? Or too paranoid? In this talk, Denim shares how to find the sweet spot where awareness protects without paralyzing. Find a perspective to to measure your security mindset.

Denim Latić https://pretalx.com/bsidesluxembourg-2026/speaker/9GTVXC/ is a security analyst and part of the CSIRT for Fondation Restena, the NREN of Luxembourg. He is passionate about raising awareness on cybersecurity issues to both small and large audiences.

📅 Conference Dates: 6–8 May 2026 | 09:00–18:00
📍 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
📅 Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #CyberSecurity #Mindset #SecurityAwareness

Just Announced for BSides Luxembourg 2026!

𝗔𝗗𝗩𝗔𝗡𝗖𝗘𝗗 𝗧𝗛𝗥𝗘𝗔𝗧 𝗛𝗨𝗡𝗧𝗜𝗡𝗚: 𝗦𝗧𝗔𝗬𝗜𝗡𝗚 𝗢𝗡𝗘 𝗦𝗧𝗘𝗣 𝗔𝗛𝗘𝗔𝗗 𝗢𝗙 𝗔𝗗𝗩𝗘𝗥𝗦𝗔𝗥𝗬 - Alex Holden

Cyber defenders must go beyond reactive security as attackers constantly evolve their tactics. This session dives into real-world attack techniques used by threat actors, including the exploitation of stolen credentials, session tokens, and authentication flaws to bypass security controls. It highlights how attackers manipulate verification systems and leverage logic gaps to infiltrate infrastructure and supply chains—and shows how defenders can use this knowledge to strengthen threat hunting and stay ahead of adversaries

Alex Holden https://www.linkedin.com/in/aaholden is the founder and CISO of Hold Security, LLC, a recognized leader in threat intelligence, who studies cybercriminal behavior to help organizations build stronger defenses against evolving cyber threats.

📅 Conference Dates: 6–8 May 2026 | 09:00–18:00
📍 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
📅 Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #CyberSecurity #ThreatHunting #InfoSec #CyberDefense #SecurityAwareness

⚛ Review Day! ⚛

Thomas Laugle provides a "niche" recommendation for Dr. Rogayeh Tabrizi's 𝘽𝙚𝙝𝙖𝙫𝙞𝙤𝙧𝙖𝙡 𝘼𝙄: 𝙐𝙣𝙡𝙚𝙖𝙨𝙝 𝘿𝙚𝙘𝙞𝙨𝙞𝙤𝙣 𝙈𝙖𝙠𝙞𝙣𝙜 𝙬𝙞𝙩𝙝 𝘿𝙖𝙩𝙖

✍️ Read Thomas' thorough analysis: https://cybercanon.org/behavioral-ai-unleash-decision-making-with-data/

#CybersecurityBooks #AISecurity #GRC #SecurityAwareness

Information Security terms that sound fake but aren’t:
“Watering Hole attack.”

Which sounds like wildlife photography but actually means attackers waiting for users to visit a compromised site.

#CyberSecurity #ThreatIntel #SecurityAwareness #SecurityTermsThatSoundFake

IoT privacy compliance development.
Samsung will revise ACR data practices after legal action by the Texas Attorney General.

Key elements:
• Real-time viewing habit collection under scrutiny
• Enhanced disclosure & consent flow promised
• Emphasis on consumer transparency
• Broader regulatory pressure on smart device telemetry

ACR data monetization highlights a persistent tension:
Device intelligence vs user autonomy
Advertising revenue vs explicit consent
Convenience vs continuous telemetry
As regulatory enforcement increases, IoT vendors may face stricter consent design expectations.
Question for security & privacy professionals:
Should connected consumer devices require periodic re-consent for telemetry collection?

Source: https://therecord.media/samsung-updates-acr-privacy-practices-texas

Engage below.
Follow TechNadu for privacy law, IoT security, and compliance updates.
Repost to broaden awareness.

#Infosec #PrivacyEngineering #ACR #IoTSecurity #DataGovernance #ConsumerPrivacy #RegulatoryCompliance #SmartDevices #CyberLaw #SecurityAwareness #DigitalRights

🎤 𝗜𝗻𝘁𝗲𝗿𝘃𝗶𝗲𝘄: 𝗙𝗶𝗿𝗲𝘄𝗮𝗹𝗹 𝗠𝗲𝗻𝘀𝗰𝗵 | #DFNmitteilungen

#SecurityAwareness ist ein zentraler Baustein der #informationssicherheit.
🔹 Doch wie lassen sich Mitarbeitende & Studierende nachhaltig sensibilisieren? 🔹 Welchen Nutzen haben Security-Awareness-Schulungen?
🔹 Und welche Rolle spielt der Mensch bei Cyberangriffen?

💬 Die Antworten hat Prof. Dr.-Ing. Sebastian Schinzel
@seecurity von der FH Münster.
👉 Lesen Sie jetzt das Interview: https://www.dfn.de/firewall-mensch/