Fred Wilmot

1.6K posts

Fred Wilmot banner
Fred Wilmot

Fred Wilmot

@fewdisc

Co-founder Detecteam | product builder | practitioner | innovator | Dad | IT/OT apologist. my opinions - make it better

Washington, USA Katılım Temmuz 2010
935 Takip Edilen739 Takipçiler
Fred Wilmot
Fred Wilmot@fewdisc·
@AISecurityInst Interesting results and data. I think the setup of orchestration not just model usage has an impact.
English
0
0
0
47
Fred Wilmot retweetledi
AI Security Institute
AI Security Institute@AISecurityInst·
Can AI agents conduct advanced cyber-attacks autonomously? We tested seven models released between August 2024 and February 2026 on two custom-built cyber ranges designed to replicate complex attack environments. Here’s what we found🧵
AI Security Institute tweet media
English
16
89
391
96.8K
Fred Wilmot retweetledi
Guri Singh
Guri Singh@heygurisingh·
Holy shit... Microsoft open sourced an inference framework that runs a 100B parameter LLM on a single CPU. It's called BitNet. And it does what was supposed to be impossible. No GPU. No cloud. No $10K hardware setup. Just your laptop running a 100-billion parameter model at human reading speed. Here's how it works: Every other LLM stores weights in 32-bit or 16-bit floats. BitNet uses 1.58 bits. Weights are ternary just -1, 0, or +1. That's it. No floats. No expensive matrix math. Pure integer operations your CPU was already built for. The result: - 100B model runs on a single CPU at 5-7 tokens/second - 2.37x to 6.17x faster than llama.cpp on x86 - 82% lower energy consumption on x86 CPUs - 1.37x to 5.07x speedup on ARM (your MacBook) - Memory drops by 16-32x vs full-precision models The wildest part: Accuracy barely moves. BitNet b1.58 2B4T their flagship model was trained on 4 trillion tokens and benchmarks competitively against full-precision models of the same size. The quantization isn't destroying quality. It's just removing the bloat. What this actually means: - Run AI completely offline. Your data never leaves your machine - Deploy LLMs on phones, IoT devices, edge hardware - No more cloud API bills for inference - AI in regions with no reliable internet The model supports ARM and x86. Works on your MacBook, your Linux box, your Windows machine. 27.4K GitHub stars. 2.2K forks. Built by Microsoft Research. 100% Open Source. MIT License.
English
878
2.7K
15.4K
2.2M
Fred Wilmot retweetledi
GΔRRΞTT
GΔRRΞTT@libertybirb·
Space Force Chief Master Sergeant Ron Lerch: "The Chinese have published papers as far back as 2019 talking about the need to do light detection and ranging from space — LiDAR. That graphic is straight out of their research paper, and what its showing there is the ability to use potentially LiDAR to see under the water. So there’s obvious implications there for submarine hunting. Not just necessarily a civil application, but defense applications if that becomes a capability that becomes real here in the next five years. Like I said, they’ve been researching stealth on orbit for decades. They actually published in a research paper this "Olive B" test article. And they believe that this would be sort of the future of what stealthy objects — stealthy microsatellites, specifically — could potentially look like on orbit. Because not only are they difficult to visually acquire, but that shape, they believe, would be incredibly beneficial in terms of masking their radar cross-section. They’ve released a lot of research papers lately that are talking about how they could use satellites to negate the effects and the positive benefits that proliferated LEO constellations give you. And they’ve also talked about just using a swarm of drones that are just flooding say, the Taiwanese Straight, and just jamming, thereby preventing any subscribers to be able to access even pLEO. Because again, it’s a home game for them. They don’t necessarily need to be worried about jamming other parts of the globe in the event that there was some sort of conflict to kick off on their home turf." Link: youtube.com/shorts/QXBTtDj…
YouTube video
YouTube
GΔRRΞTT@libertybirb

China’s "Olive-B" Stealth Micro-Satellite Link: mdpi.com/2226-4310/9/12…

English
22
212
1.3K
367.9K
Fred Wilmot retweetledi
vx-underground
vx-underground@vxunderground·
Chat, we are cooked Discord is being extorted by the people who compromised their Zendesk instance They've got 1.5TB of age verification related photos. 2,185,151 photos tl;dr 2.1m Discord users drivers license and/or passport might be leaked. Unknown number of e-mails
English
344
1.2K
11.6K
902K
Fred Wilmot retweetledi
Detecteam
Detecteam@DetecteamInc·
We are focused on reducing the gatekeeping, minimizing the Detection Engineering plight, and maximizing the time to value of quality tested detections in minutes with @devo_Inc
Devo@devo_Inc

There's no gatekeeping detection rules here. We upload detection rules from the Devo + @DetecteamInc solution into Devo Exchange, our community-based app, so that all of our users can benefit from it and keep their organizations secure. Learn more: bit.ly/4lfEMeA

English
0
2
1
92
Fred Wilmot retweetledi
Lisa Martin
Lisa Martin@lisamartinmedia·
Are you pro retailers like Walmart and Amazon and hospitality giants like Expedia leaning into stablecoins? We dissected this on today's episode of Techstrong Gang, and shared that though stablecoins have prominent use cases, like payments, including cross-border payments, are they truly going to be less volatile than Bitcoin and Ethereum? Is this a plus for the consumer? What will the credit card companies think and how will they react? We also covered AI anxiety and an NBC News Decision Desk poll that found that only 14% of respondents said they used “AI tools like ChatGPT, Google Gemini or Microsoft Copilot. Where do you fall on this spectrum - Pro AI or Anti-AI? Check out the latest episode of Techstrong Gang that just dropped #Techstrong #TechstrongGang #TechstrongTV #Stablecoins #Bitcoin #Ethereum #AI Episode Link: techstrong.tv/videos/techstr… @ashimmy @jswartz @fewdisc @mvizard @TechstrongTV @TechstrongGroup
Lisa Martin tweet media
English
1
3
11
488
Fred Wilmot retweetledi
Fred Wilmot retweetledi
Lisa Martin
Lisa Martin@lisamartinmedia·
AI Blackmail, GoDaddy's major security issues, and tariffs and chips. We covered a lot of ground on today's Techstrong Gang. On the AI blackmail front, we talked about the new Anthropic AI system, Claude Opus 4, which has shown a concerning ability to threaten blackmail even against its own developers. We then talked about chips being well, chips or pawns in a game of geopolitical chess. Should US chipmakers be beholden to the US? And finally, the FTC may be making a poster child of GoDaddy, who's been accused of major cybersecurity failures after years of breaches. Episode link: techstrong.tv/videos/techstr… @TechstrongTV @TechstrongGroup @jswatz @mvizard @fewdisc #TechstrongTV #TechstrongGroup #TechstrongGang #FTC #GoDaddy #Anthropic #ClaudeOpus4 #Chipwars
Lisa Martin tweet media
English
0
4
7
480
Fred Wilmot retweetledi
LimaCharlie
LimaCharlie@limacharlieio·
Join us this week for our Defender Fridays session! Fred Wilmot (@fewdisc), Co-founder and CEO at Detecteam, will discuss practical approaches to cloud detection. The session begins at 10:30am PT / 1:30pm ET, bring your questions: lc.pub/4bxbl3R #defenders #infosec
LimaCharlie tweet media
English
0
1
1
95
Fred Wilmot retweetledi
John Hultquist
John Hultquist@JohnHultquist·
If you’ve been laid off from a cyber intel position, please reach out if you’d like to come to @SLEUTHCON.
English
3
60
97
18.1K
Fred Wilmot retweetledi
Byron Wan
Byron Wan@Byron_Wan·
Security researchers have uncovered a pre-installed, undocumented remote access tunnel in 🇨🇳 Unitree Go1 robot dogs. Each Unitree Go1 robot dog is shipped with a preconfigured tunnel client that initiates a connection to 🇨🇳 CloudSail — a remote access platform developed by 🇨🇳 Zhexi Technology, based in China. “Anybody with access to the API key can freely access all robot dogs on the tunnel network, remotely control them, use the vision cameras to see through their eyes, or even hop on the RPI via SSH.” “Most of the machines are located in China, but as expected some are outside of China, apart from some residential IPs, we were able to identify several University IPs and some corporate networks from around the world.” More than a dozen universities from the US, Canada, Germany, New Zealand, Australia, and Japan have experimented with Unitree Go1 robot dogs: USA: MIT, Princeton University, University of Massachusetts Amherst, Carnegie Mellon University Canada: University of Waterloo Germany: Hochschule Coburg New Zealand: University of Otago Australia: UNSW Sydney, Deakin University Japan: Shinshu University The discovery raises serious concerns about supply chain trust, especially as these robots are widely used in academic, corporate, and even defense-related environments. cyberinsider.com/remote-access-…
Byron Wan tweet media
English
167
970
2.8K
919.3K
Fred Wilmot retweetledi
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
Signal’s encryption is irrelevant to the discussion. The real problem with sharing Top Secret data over Signal is not the security of the app, it’s the security of the phone. And mobile phones are not secure against state level threat actors.
English
80
806
4.1K
213.8K
Fred Wilmot
Fred Wilmot@fewdisc·
@philvenables @philvenables you’ve been a thought leader in what the CISO role is, and I think about the impact your substantial voice has had outside your direct influence, and it’s massive. Excited to hear what you’ll be doing next.
English
0
0
1
32
Phil Venables
Phil Venables@philvenables·
Some news...... Over 4 years ago I became Google Cloud’s first CISO and brought many teams together into a unified security, compliance, privacy and risk team focused on securing the cloud, securing our customers and securing the planet. However, it’s now time for me to transition to something new (more news on that soon). But, I am pleased to be also staying on at Google Cloud in a part time Strategic Security Advisor role to support our executive team, customers, and some of our community activities, while also supporting my team through the transition to a new CISO. My team and colleagues at Google Cloud & Google Technical Infrastructure and the wider Google security teams have been and continue to be amazing. I’m so proud of what we have achieved and the team we built. But after being a CISO for 30 years spanning 4 CISO roles at some of the world’s largest organizations it’s time to do something a bit different. I owe so much thanks to so many people that I can’t possibly enumerate everyone here. It’s not just the many Googlers but also our customers and our partners in the wider ecosystem that have enabled us to do so much.
English
43
20
382
34.7K