eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

218
active users

#smb

2 posts2 participants0 posts today

AI is the new attack surface—are you ready?

From shadow AI to deepfake-driven threats, attackers are finding creative ways to exploit your organization’s AI tools, often without you realizing it.

Watch our new 3-minute video, How Attackers Target Your Company’s AI Tools, for advice on:

▪️ The rise of shadow AI (yes, your team is probably using it!)
▪️ Real-world examples of AI misconfigurations and account takeovers
▪️ What to ask vendors about their AI usage
▪️ How to update your incident response plan for deepfakes
▪️ Actionable steps for AI risk assessments and inventories

Don’t let your AI deployment become your biggest security blind spot.

Watch now: youtu.be/R9z9A0eTvp0

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Only one week left to register for our next Cyberside Chats Live event! Join us June 11th to discuss what happens when an AI refuses to shut down—or worse, starts blackmailing users to stay online?

These aren’t science fiction scenarios. We’ll dig into two real-world incidents, including a case where OpenAI’s newest model bypassed shutdown scripts and another where Anthropic’s Claude Opus 4 generated blackmail threats in an alarming display of self-preservation.

Join us as we unpack:
▪ What “high-agency behavior” means in cutting-edge AI
▪ How API access can expose unpredictable and dangerous model actions
▪ Why these findings matter now for security teams
▪ What it all means for incident response and digital trust

Stick around for a live Q&A with LMG Security’s experts @sherridavidoff and @MDurrin. This session will challenge the way you think about AI risk!

Register today: lmgsecurity.com/event/cybersid

june25 cyberside chats live!
LMG SecurityCyberside Chats: Live! When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines | LMG SecurityIn this quick, high-impact session, we’ll dive into the top three cybersecurity priorities every leader should focus on. From integrating AI into your defenses to tackling deepfake threats and tightening third-party risk management, this discussion will arm you with the insights you need to stay secure in the year ahead.

Ich versuche seit einem Jahrzehnt, 'illegale' Dateinamen über #SMB erlaubt zu bekommen, also die Zeichen ": \ * < > ?", die Windows nicht unterstützt, aber ich habe hier eh nur Linux-Systeme. Kein Wiki-Eintrag konnte mir bislang diesen wirklich BASALEN Wunsch erfüllen! Es funktioniert einfach kein Weg!
Warum ist das alles so schlimm, warum ist das so schrecklich schlecht dokumentiert?

wiki.archlinux.org/title/Samba

wiki.archlinux.orgSamba - ArchWiki

If you were on my mailing list, you would have had the chance to weigh in on the dates for my next Strategic Clarity Workshop: A No-BS Experience for Calm, Measurable Results.

Why might you care? 🤔

This Strategy Clarity Workshop is a live, expert-led, two half-day experience designed for small business leaders, solopreneurs, and purpose-driven people who want to set, clarify, and achieve their most important strategic goals—without overwhelm, overthinking, or wasted effort.

Continued thread

If you were on my mailing list, you would have had the chance to weigh in on the dates for my next Strategic Clarity Workshop: A No-BS Experience for Calm, Measurable Results.

Why might you care? 🤔

This Strategy Clarity Workshop is a live, expert-led, two half-day experience designed for small business leaders, solopreneurs, and purpose-driven people who want to set, clarify, and achieve their most important strategic goals—without overwhelm, overthinking, or wasted effort.

The FBI has issued an alert about cybercriminals hijacking outdated routers to power massive proxy-for-hire networks—masking malware, fraud, and credential theft right under your nose.

Watch the full Cyberside Chats episode to hear @sherridavidoff and @MDurrin 's insights on:

🔹 The FBI’s May 2025 alert
🔹 TheMoon malware and the Faceless proxy service
🔹 What these botnets mean for your enterprise
🔹 What you need to do now to stay protected

🎥 Watch the video: youtu.be/x_40BlvWsHk
🎧 Listen to the podcast: chatcyberside.com/e/outdated-r

When a chef I trust pulled me aside to tell me about someone who's fighting the odds to start a hot sauce company, I took notice. Jacob Wilkinson, who is visually impaired, turned a pandemic project into Blowing Smoke, featuring Ontario-grown produce with fantastic names like Devil’s Night and Yellow Snow.

Am so honoured he let me tell his story.

#EatLocal #WaterlooRegion #Entrepreneur #VisuallyImpaired #Accessiblity #SMB #Mastonom #Food

cbc.ca/news/canada/kitchener-w

Cybercriminals are using Google Ads to hijack accounts, steal data, and clone websites using AI—and it’s happening faster than you think.

Want to keep your company safe? Watch our latest video: Malvertising Attacks: How Google Ad Spoofed Account Attacks Work. You'll learn how these attacks work, why phishing is moving beyond email, and what practical steps you can take to defend your organization. youtu.be/Q_qTvyVlGwc

Microsoft 365 credential theft is evolving quickly!

Attackers are no longer just stealing your login—they’re using your own AI tools like Microsoft Copilot to accelerate fraud from inside your environment.

Our 4-minute video breaks down how threat actors are targeting Microsoft 365 accounts and weaponizing Copilot, Teams, SharePoint, and more to perform rapid reconnaissance, commit fraud, and exploit centralized trust systems.

Watch now to learn:

▪ How Copilot can be used against you
▪ Real phishing tactics mimicking Microsoft 365, Adobe & DocuSign
▪ Why SSO, OAuth, and poor access controls can make attacks worse
▪ What your organization must do to stay ahead

Watch the video! youtu.be/zaBwxy1Gjhc

How your team responds to a data breach can make a $1.5 million difference in damages. In our latest blog, Security Consultant Derek Rowe answers frequently asked questions about critical incident response training. This FAQ covers everything from what to look for in a class and how to grade your IT training maturity, to how IT training impacts compliance and BCDR.

Don’t wait for an attack to find out how prepared your team is. Read the blog: lmgsecurity.com/critical-incid

LMG SecurityCritical Incident Response Training: Your Top Questions Answered | LMG SecurityGet answers to your top questions about critical incident response training, and why it’s essential for cybersecurity success in 2025!

I have finally caved in and dove into the rabbit hole of #Linux Container (#LXC) on #Proxmox during my exploration on how to split a GPU across multiple servers and... I totally understand now seeing people's Proxmox setups that are made up exclusively of LXCs rather than VMs lol - it's just so pleasant to setup and use, and superficially at least, very efficient.

I now have a
#Jellyfin and #ErsatzTV setup running on LXCs with working iGPU passthrough of my server's #AMD Ryzen 5600G APU. My #Intel #ArcA380 GPU has also arrived, but I'm prolly gonna hold off on adding that until I decide on which node should I add it to and schedule the shutdown, etc. In the future, I might even consider exploring (re)building a #Kubernetes, #RKE2 cluster on LXC nodes instead of VMs - and if that's viable or perhaps better.

Anyway, I've updated my
#Homelab Wiki with guides pertaining LXCs, including creating one, passing through a GPU to multiple unprivileged LXCs, and adding an #SMB share for the entire cluster and mounting them, also, on unprivileged LXC containers.

🔗 https://github.com/irfanhakim-as/homelab-wiki/blob/master/topics/proxmox.md#linux-containers-lxc

GitHubhomelab-wiki/topics/proxmox.md at master · irfanhakim-as/homelab-wikiWiki about everything Homelab. Contribute to irfanhakim-as/homelab-wiki development by creating an account on GitHub.

Mass-targeting SMBs has become a new battleground in cybersecurity. Small businesses must be ready to face this threat or risk losing out on critical sales. Even the basic steps (backups, simple plans, 2FA) significantly reduce the impact of incidents.
#SMB #cybersecurity
financialpost.com/technology/t

Financial Post · OPINION: Reality of cybersecurity for small businesses  By Canadian Cybersecurity Network