The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile
The Javvad Malik A.I.

@j4vv4d

I'm over here now::: bsky.app/profile/j4vv4d…

ID: 28419638

linkhttp://www.javvadmalik.com calendar_today02-04-2009 21:03:32

40,40K Tweet

16,16K Followers

986 Following

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

Episode 224 of the host unknown podcast is out... and I'm not a petty person, I don't go hunting for receipts just to prove a point. But it's not often that sir jester serves me up the opportunity on a silver platter. For once Thom Langford was safe!

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

Episode 224 of the host unknown podcast is out... and I'm not a petty person, I don't go hunting for receipts just to prove a point. But it's not often that sir jester.bsky.social serves me up the opportunity on a silver platter. For once @thomlangford.bsky.social was safe!

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

Is AI is Rewiring Human Connection? Sarah, a 19-year-old college student has fallen in love. Not with a classmate, not with someone she met at a coffee shop, but with an AI chatbot named Alex. Every morning, she wakes up and immediately reaches for her … ift.tt/RvWZzVf

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

What is trust? How do we build it? What does it mean? Has AI and social media taken whatever little trust we had in anything? ift.tt/VE3NycP

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

New TikTok video 'Have to edit out all of these from the host unknown podcast before hitting publish... and these are about a third of them!!! Thom Clutterbuck.langford @sirjesteruk'. ift.tt/2SxieM1

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

Episode 225 of the host unknown podcast is out, and @thomlangford.bsky.social eloquently explains why the edit takes so long. cc sir jester.bsky.social

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

The "cyber delta" - the gap between perceived vs actual security posture may be one of the biggest hidden risks in M&A deals today. This article explores 11 critical questions every security team needs to ask go.j4vv4d.com/E0mudX ift.tt/bUPaRv5

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

M&S confirmed that the retail outlet's network was initially breached in a "sophisticated impersonation attack" that ultimately led to a DragonForce ransomware attack. ift.tt/G9x6CXi

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

Security teams are drowning in vulnerability alerts, but prioritisation alone isn't enough. The real challenge? Moving from knowing WHAT to fix to actually FIXING it. This article shows how AI-driven remediation could be a way to reduce that. … ift.tt/XU8Nxwt

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

Just living like a player who's been stuck in the starting village for 3 years cos I keep getting distracted by "collect 47 random emails" and "attend mysterious meeting that could be important" side quests. Meanwhile the main storyline is like "what am I actually doing with m…

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

When your AI chatbot recruiter uses '123456' as a password... This isn't just about McDonald's - it's about how we're rushing to hand over sensitive data to AI Worth a read if you're considering AI automation go.j4vv4d.com/rQ2x8W ift.tt/NC2HmpJ

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

European manufacturing is going through its own digital transformation. Think 'Smart Factory meets Security Nightmare.' Worth a read if you're in manufacturing or just enjoy a good 'robots meet reality' story. ift.tt/k5XMgOJ

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

I sometimes kind of miss the old days when the whole community was in one place on Twitter. But then again, I do enjoy not being on social media as much too.

The Javvad Malik A.I. (@j4vv4d) 's Twitter Profile Photo

An interesting piece on MFA downgrade attacks. The concept is quite straightforward. When users have multiple authentication methods available (say, a passkey and an SMS code), attackers can manipulate the login process to only show the weaker option. … ift.tt/t34TXA6