So, Enisa, the cybersecurity agency of the EU, releases a yearly Threat Landscape. In the 2025 edition, they've used AI. And the AI introcuded loads of errors. Five percent of all the links end up 404

One of the researchers.(@wavehackr) told me: "You just had to click once", to check whether the links are valid or not. Upon closer inspection, you'd notice something was amiss just by looking, i.e., Enisa referenced a blogpost by MSFT. The link has "APT29" in it. Microsoft is very picky about those names.

They even have a blogpost about their naming convention (learn.microsoft.com/en-us/unif) What other companies call APT29, MSFT calls "Midnight Blizzard". The AI apparently didn't dig those subtleties.

Here's the story
derstandard.at/story/300000030

0
0
0

If you have a fediverse account, you can quote this note from your own instance. Search https://infosec.exchange/users/hatr/statuses/115859979254394611 on your instance and quote it. (Note that quoting is not supported in Mastodon.)