Brian Greenberg
@briangreenberg.net
590 followers 460 following 1.2K posts
CIO/CTO, Forbes contributor, CyberSecurity Professor @ DePaul, systems thinker, hiker, entrepreneur, philosopher, actor, improviser, storyteller, & coffeehouse addict. 📍Chicago, IL 🦋🥾☕️🎭🤖🪴✍️ https://linktr.ee/brian.greenberg https://briangreenberg.net
Posts Media Videos Starter Packs
Pinned
briangreenberg.net
Proud to share my new @forbes.com article: Deepfakes And Social Engineering: A Growing Threat To Everyone.
These aren’t future risks—they’re here now. MFA and layered verification are our best defense.
www.forbes.com/councils/for...
#cybersecurity #deepfakes #Forbes #leadership
Deepfakes And Social Engineering: A Growing Threat To Everyone
Deepfakes and social engineering are real, they're happening today, and they are an immediate threat to organizations and families.
www.forbes.com
briangreenberg.net
F5 confirms a breach exposing BIG-IP source code — likely nation-state operators behind it.

TL;DR
⚠️ Source code + vuln data stolen
🧠 Long-term access in dev systems
🔐 No sign of active exploitation

thehackernews.com/2025/10/f5-b...
#cybersecurity #infosec #breach
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion
F5 confirms nation-state breach exposing BIG-IP source code and vulnerabilities; containment completed, customers urged to update.
thehackernews.com
briangreenberg.net
China-linked hackers infiltrated a Russian IT firm for 5 months — a reminder that espionage has no “friends.”

TL;DR
⚠️ 5-month breach via renamed debugger
🧠 Supply chain risk to Russian clients
🔐 Data exfil to Yandex Cloud

thehackernews.com/2025/10/chin...
#cybersecurity #threatintel #infosec
Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months
Chinese group Jewelbug hacked a Russian IT provider, exploiting Microsoft tools and exfiltrating data via Yandex Cloud.
thehackernews.com
briangreenberg.net
The AI bubble is 17 times the size of the dot-com frenzy — and four times the subprime bubble, analyst says. A sobering take on why it might be.
TL;DR
💰 Fueled by cheap money
🤖 LLMs show less gain
💸 Costs up, moat zero
www.marketwatch.com/story/the-ai...
#AI #Bubble #Economics
AI bubble is 17 times the size of that of the dot-com frenzy, analyst says
A research firm is arguing not just that AI is in a bubble, but that it is 17 times the size of the dot-com bubble.
www.marketwatch.com
briangreenberg.net
Hackers can steal 2FA codes and private messages from Android phones. Android's app sandbox is being tested.
TL;DR
・ "Pixnapping" steals pixels 👾
・ Grabs 2FA codes & more
・ No permissions needed ⚠️
arstechnica.com/security/202...
#Android #Security #privacy #infosec #cybersecurity
Hackers can steal 2FA codes and private messages from Android phones
Malicious app required to make “Pixnapping” attack work requires no permissions.
arstechnica.com
briangreenberg.net
🚨 There's a critical Oracle ERP flaw targeting U.S. hospitals.
TL;DR
⚠️ Remote access, no login
🧠 Ransomware groups already exploiting
🔐 Patch needs prior update
📞 The FBI is urging hospitals to report incidents

nationalcioreview.com/articles-ins...

#Cybersecurity #HealthcareIT #Infosec
"Act Now": Critical Oracle ERP Vulnerability Threatens U.S. Health Systems - The National CIO Review
Stop what you're doing!
nationalcioreview.com
briangreenberg.net
ICE is back to buying mass phone tracking data — billions of location pings daily. 🤬

TL;DR
📱 Tracks hundreds of millions
⚙️ Updated daily from SDK + ad tech
⚠️ Reverses Biden-era ban

www.404media.co/ice-to-buy-t...

#Privacy #Surveillance #ICE #GRC #Cybersecurity
ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day
Documents show that ICE has gone back on its decision to not use location data remotely harvested from peoples' phones. The database is updated every day with billions of pieces of location data.
www.404media.co
briangreenberg.net
Gen AI “actress” Tilly Norwood isn’t a breakthrough, she’s a psyop to make fake actors feel normal. robot

TL;DR
⚠️ Marketing stunt, not innovation
🎭 Human oversight still needed
🧠 Goal: normalize AI in Hollywood

www.theverge.com/ai-artificia...

#AI #Hollywood #Ethics #deepfakes
Tilly Norwood is a gen AI psyop
The point is to normalize generative AI in your mind.
www.theverge.com
briangreenberg.net
Deloitte’s $290K AI-generated report to the Australian gov included fake citations and even a made-up judge quote. 🤦🏻‍♂️

TL;DR
⚠️ AI hallucinations caught
🔍 Researcher flagged errors
💸 Partial refund issued

fortune.com/2025/10/07/d...

#AIethics #Deloitte #Accountability #GRC
Deloitte was caught using AI in $290,000 report to help the Australian government crack down on welfare after a researcher flagged hallucinations | Fortune
The updates “in no way impact” the report’s findings and recommendations, the Big Four firm said.
fortune.com
briangreenberg.net
LinkedIn is feeding your data to Microsoft’s AI—unless you say no.

TL;DR
⚠️ Auto opt-in for AI training
🔐 Opt out in Settings > Data Privacy
🧠 Deadline: Nov 3, 2025

www.malwarebytes.com/blog/news/20...
#Privacy #AIethics #LinkedIn
LinkedIn will use your data to train its AI unless you opt out now
LinkedIn has changed its Terms to include users data for Microsoft's AI training. Read here how you can opt out
www.malwarebytes.com
briangreenberg.net
Check out my new post!
I wrote a piece that breaks down the deepfake threat. It's easy to get lost in the tech, but what's really happening is that AI is supercharging the oldest hack in the book, social engineering.

open.substack.com/pub/briangre...

#AI #SocialEngineering #cybersecurity
Deepfakes And Social Engineering: A Growing Threat To Everyone
Deepfakes—AI‑generated video or audio—are used by attackers to impersonate executives, family members, and government officials, convincing victims to send money or share sensitive information.
open.substack.com
briangreenberg.net
Rewriting federal workers’ OOO replies to pin the shutdown on Dems
🔎 Wired reports OOO replies were changed without consent
⚖️ Hatch Act violations
🧑‍💼 Staff tried to revert and saw changes return
www.wired.com/story/govern...
#Security #GovTech #Ethics #PublicSector #Governance
Government Workers Say Their Out-of-Office Replies Were Forcibly Changed to Blame Democrats for Shutdown
Some employees at the Department of Education changed their responses back to the more neutral language, only to have it changed yet again to the partisan response, multiple sources tell WIRED.
www.wired.com
briangreenberg.net
It's a new kind of misinformation: bogus quotes invented by sloppy AI assisted reporting.

TL;DR
🧪 AI tools forged attributions
📨 Editor admitted 'AI slop'
🔍 Verify quotes and sources
www.eff.org/deeplinks/20...

#AI #Misinformation #Ethics #cybersecurity
Wave of Phony News Quotes Affects Everyone—Including EFF
Whether due to generative AI hallucinations or human sloppiness, the internet is increasingly rife with bogus news content—and you can count EFF among the victims. WinBuzzer published a story June 26 ...
www.eff.org
briangreenberg.net
The other shoe just dropped. Meta is now officially using your conversations with its AI to target ads, and there's no way to opt out.
TL;DR
AI chat data for ads 🤖
No user opt-out 🚫
Your chats = ad revenue 💰
arstechnica.com/tech-policy/...
#Privacy #AI #security #cloud #cybersecurity
Meta won’t allow users to opt out of targeted ads based on AI chats
US users stuck with AI ad targeting as EU users win more control over their feeds.
arstechnica.com
briangreenberg.net
Zero day flaws in $20 YoLink hub let attackers control smart locks

TL;DR
🔐 Authorization bypass
📡 Unencrypted MQTT leaks creds
⏳ Session management flaw

hackread.com/20-yolink-io...

#IoT #IoTSecurity #YoLink #security #privacy #cloud #infosec #cybersecurity
$20 YoLink IoT Gateway Vulnerabilities Put Home Security at Risk
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
briangreenberg.net
This Red Hat data breach is all about the keys to their customers' kingdoms. Attackers got the blueprints.

TL;DR
🗺️ Customer network maps stolen
🔑 Auth tokens compromised
🎯 Downstream risk is huge

www.theregister.com/2025/10/02/c...
#RedHat #CyberSecurity #DataBreach #SupplyChain
Red Hat repos raided, claims cybercrew, files stolen
: 570GB of data claimed to be stolen by the Crimson Collective
www.theregister.com
briangreenberg.net
Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite

TL;DR
⚠️ Injects prompts via history
☁️ Hijacks AI with logs
🌍 Browsing tool leaks data

hackread.com/google-gemin...
#AIsecurity #PromptInjection #Cybersecurity #security #privacy #cloud #infosec
Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
briangreenberg.net
Well, this is a big one. CISA ending its agreement with CIS is going to send some serious shockwaves through state and local government IT shops.
TL;DR
💰 Ends free tools for SLTTs
🛡️ Creates a major defense gap

www.theregister.com/2025/09/30/c...
#CISA #Cybersecurity #GovTech #SLTT #SLED
CISA kills agreement with nonprofit that runs MS-ISAC
: The federal government's not the only thing shutting down on Oct. 1
www.theregister.com
briangreenberg.net
This article nails a problem I've seen play out for years: unmanaged digital asset sprawl. Marketing's forgotten microsite is security's next breach.

TL;DR
👻 Unpatched systems
⚖️ Compliance violations

www.cmswire.com/digital-mark...
#Cybersecurity #AssetManagement #Marketing #Risk
Trick or Threat? The Hidden Footprint That Spooks Your Digital Team
Forgotten pages rise from the grave, bringing security, compliance and reputational nightmares for brands.
www.cmswire.com
briangreenberg.net
Those who control the infrastructure control the narrative. Taliban shuts down the complete internet in Afghanistan 🇦🇫

TL;DR
⚠️ Total internet blackout
☎️ Telecom services cut
🔇 Information isolation

www.bbc.com/news/article...
#Afghanistan #InternetBlackout #Cybersecurity
Afghanistan hit by internet blackout as Taliban cuts fibre optic cables
Phone and internet connections are down nationwide after the Taliban cut fibre-optic connections to prevent "immorality".
www.bbc.com
briangreenberg.net
Trusting the firewall itself is the new risk. This isn't just a breach, it's a crisis of confidence in core infrastructure.
TL;DR
🕵️ State actors exploit Cisco
👻 Persistent access via FW
⚠️ CISA issues emergency order
www.washingtonpost.com/technology/2...
#CyberSecurity #CISA #SupplyChainRisk
U.S. government scrambles to stop new hacking campaign blamed on China
U.S. cybersecurity officials ordered civilian federal agencies to check for vulnerable Cisco equipment being exploited by attackers targeting the government.
www.washingtonpost.com