Do you use it to help with schoolwork / work? Maybe to help you code projects, or to help teach you how to do something?

What are your preferred models and why?

  • borari@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    10 days ago

    lol. Uhhhhhhh not so much lol.

    I work on an internal red team, so covert in prod operations instead of limited scope one off pen tests. We actively phish employees, but any victim user isn’t named in the report and we provide follow up training with them that’s not shame based and it’s with the operators directly, not some mandatory online class annual training bullshit.

    It sucks, but this is a huge vector of initial compromise for APTs, and I work in an industry and for a company that are both extremely frequently targeted by APTs, so we have to do what we do. It lets us identify gaps in security and signature known ttps so our defensive teams can id those alerts when they pop.

      • borari@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        10 days ago

        Bro it’s a huge problem, companies will blame the employee that opened the malicious document instead of blaming their fucking abysmal internal security controls, detection, and response.